Absolute control over your private information. All Cipher Contact data (id,keys,contacts) are encrypted at all times.
Ability to create your unique personal encryption system that is beyond military and security agencies decryption capabilities. Cipher Contact rules out the suspicion of hacking or content disclosure.
* The underlying encryption does not use or relates to any known encryption systems. Fundamentals of the encryption model could be found at arXiv ( http://arxiv.org/vc/cs/papers/0409/0409039v9.pdf ), enabling anyone to verify its security by auditing the cryptosystem * Based on user credentials (Id, Key) a dynamically unique cryptosystem is configured. The new cryptosystem is part of a virtually infinite family of cryptosystems and gives no information regarding its underlying algebraic structure and key space * For any Key length, the brute force is impossible on sequential machines * To brute force a slight Key length <= 13 there are necessary 2^92 parallel machines (which is approximately the number of atoms in the human body). The same number of parallel machines is not sufficient to brute force a Key length > 13.