Technical support
- Popular questions
- What is "an encryption key generator" ? Why unencrypted communication is insecure? What is "crypto chat"? What is "a crypto network"? What is a hardware encryptor Stealthphone Hard? What is a "crypto conference"? How can I secure Skype calls? Can hackers intercept an Internet call and decrypt it? How is an encryption key generator used? What languages does Stealthphone Hard support? What types of files can be sent in encrypted messages? What is Stealthphone information security system designed for? Are your products designed to facilitate criminal and terrorist activity? How safe is encryption used in Stealthphone information security system? How can I check my crypto number and the number of my crypto network? Does your product have an open source code?
- Does Stealthphone information security system have analogs? Has your product been certified for FIPS 140-2 or common security criteria? Can I use Stealthphone Soft in my personal IP network? What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them? Is it possible to install Stealthphone Tell and Stealthphone Soft simultaneously on the same mobile phone (a tablet)? What is "an encryption key"? How many subscribers may there be in one crypto network? Why are you offering a stand-alone encryption device instead of a phone with a built-in encryption device? Can the hardware encryption device Stealthphone Hard be used as a phone? Shall I be able to use as before Skype (Viber) to make VoIP calls from a mobile phone or a tablet? Is encrypted communication between a hardware encryption device Stealthphone Hard and encryption software Stealthphone Soft available? Is it possible to secure information on a PC using a hardware encryption device Stealthphone Hard? What type of encryption is used in the corporate information security system Stealthphone? The signal is sometimes delayed during the transmission of encrypted voice. Is it normal? Our organization appreciated your solution, but do we really need Stealthphone information security system? I am using Stealthphone Tell . Can I make an encrypted call to a subscriber using Stealthphone Soft ?
- Technical questions
- What types of files can be sent in encrypted messages? What is "crypto chat"? What is "an encryption key"? What is "a crypto network"? What are “man-in-the-middle (MITM)” attacks? Does Stealthphone information security system prevent them? The signal is sometimes delayed during the transmission of encrypted voice. Is it normal? Shall I be able to use as before Skype (Viber) to make VoIP calls from a mobile phone or a tablet? Is it possible to secure information on a PC using a hardware encryption device Stealthphone Hard? Is it possible to install Stealthphone Tell and Stealthphone Soft simultaneously on the same mobile phone (a tablet)? I am using Stealthphone Tell . Can I make an encrypted call to a subscriber using Stealthphone Soft ? How can I secure Skype calls? Can the hardware encryption device Stealthphone Hard be used as a phone? Can I use Stealthphone Soft in my personal IP network?
- General
- Why unencrypted communication is insecure? Why are you offering a stand-alone encryption device instead of a phone with a built-in encryption device? What type of encryption is used in the corporate information security system Stealthphone? What languages does Stealthphone Hard support? What is Stealthphone information security system designed for? What is a hardware encryptor Stealthphone Hard? What is a "crypto conference"? What is "an encryption key generator" ? Our organization appreciated your solution, but do we really need Stealthphone information security system? Is encrypted communication between a hardware encryption device Stealthphone Hard and encryption software Stealthphone Soft available? How safe is encryption used in Stealthphone information security system? How many subscribers may there be in one crypto network? How is an encryption key generator used? How can I check my crypto number and the number of my crypto network? Has your product been certified for FIPS 140-2 or common security criteria? Does your product have an open source code? Does Stealthphone information security system have analogs? Can hackers intercept an Internet call and decrypt it? Are your products designed to facilitate criminal and terrorist activity?
Assistenza
Non hai trovato la risposta?contatta il nostro servizio clienti