Safety

Technology that secures servers and apps

Using Blowfish prevents information from leaking out of scope. The app was designed to prevent potential infiltrators from using it to send information outside or to avoid any interceptions by Spyware, Trojans, fraudulent access to servers or by foreign authorities or services/agencies.

Blowfish prevents your phone from turning into a bug by preventing environmental interceptions.

For your security we adopt all these strategies:

Zero die algorithms: we identify Spyware and/or Trojans in real-time on the device, without the help of specialists, automatically, using artificial intelligence technologies. This distinguishes us from normal antivirus technologies because these require human intervention and analysis to release the signature. Blowfish with multiple strategies detects and/or blocks the functionality of spyware without the help of continuous updates. With this strategy, when a spyware is released, the platform immediately detects it.

Multiple encryption Blowfish and/or Twofish end to end. We encrypt text messages, images, audio, video, voice messages... both with Blowfish and Twofish with multiple keys in addition to the channel using 4096-bit RSA keys. Multiple encryption guarantees double quadratic security (2 * n * n, where n is the number of attempts to use to discover the original message) compared to that used by simple algorithms.

Multiple keys: each chat has its own encryption keys and the key exchange is based on algorithms on multiple RSA 4096-bit levels.

Tunnel app detection: apps spread on the Play Store in common use that in reality hide ulterior motives such as spying on governments towards its own population or towards the population in different geographical areas of the planet. I would like to point out that even the military are ordinary people who have a private life and telephones that can potentially be spied on and intercepted. I refer you to the interception of German generals by the Russians for the supply of weapons to Ukraine.

Anti-phishing/anti-spoofing: impossibility of accessing the app itself and its conversations by third parties even after losing credentials, including password. You can even give away the password and no one will be able to access your conversations from another device even if they have downloaded the same app.

AI-based sql injection protection. Thanks to a new technology, anyone who tries to intrude the servers using sql injection would not be able to gain any access. Blowfish has 5 to 10 different protection contexts that intervene before accessing any database function, which protect the app from various intrusions at every single call to the servers.

Impossibility to take screenshots. No user, Spyware or Trojan will be able to access chats via the screenshot which is blocked both on the smartphone and towards external applications such as ADB.

Choice of servers on 4 continents in 12 different countries. In various scenarios, such as war, having servers located in the same place is highly risky because you can easily be blinded by destroying the data center or neutralizing it with different methodologies. We provide servers in different geo-political areas so that they cannot be neutralized following military events. The servers are not managed by any foreign competitor such as Microsoft, Amazon AWS, Google etc. VPS are installed at providers that host services unaware of what they contain and domains hidden behind fake services.

Automatic server rotation around the world with IP change even within the app. This service allows a fast switch, a few dozen seconds, and can be managed in an automatic way, with our activation or activation by the customer himself. The data is moved from one geographical area to another for security or to avoid communications blinding. With appropriate satellite phones, even in war contexts, it is possible to never lose communications between the various nodes or with the base.

Secure procedure based on unique codes issued only upon registration for password reset , account reactivation or reactivation after a security block. It is not possible to remotely reactivate accounts disabled for any reason or change a password without the security codes. In the event of loss of these, we intervene with postal means that cannot be intercepted by hackers (registered letter with return receipt with new codes, slow but safe).

We do not manage data for commercial use such as WhatsApp, Facebook or Google, we get paid to give you the best possible service and we do not archive your conversations for absolute security, in fact every 12 hours we delete the contents from our servers.

When you decide to close your account, we will delete all your data from our servers.

 

No need for dedicated hardware often very expensive. Blowfish has been designed to provide maximum security with commercial hardware and therefore at low cost. On request we can offer smartphones, which follow our construction specifications,  produced in Taiwan (NOT IN China) with high security standards. Furthermore, for government agencies, FIPS 140-3 and Common Criteria certification can be requested. See link https://www.entrust.com/legal-compliance/hsm-solutions/certifications/fips-140-2. However, we prefer that the customer be free to purchase the hardware wherever he wants and with any security standard he likes. It is the software that makes the real difference.

Blowfish, the safe choice.

We protect yours privacy from spyware, trojans and interferences.

Communicate freely!

Opening hours

Our support hotline is available 9 hours a day.

  • Monday to Friday: 9am to 6pm
  • Saturday and Sunday: closed