EviPost Démo de messagerie chi

10+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

⚠️ WARNING 👉 THIS IS A DEMONSTRATION TOOL. CAUTION DO NOT USE THIS APPLICATION TO PERFORM ENCRYPTION. THIS IS A DEMONSTRATOR FOR ILLUSTRATION OF THE OPERATING PRINCIPLE OF EVICRYPT AND EVIPDF TECHNOLOGIES ONBOARD IN EVIPRO NFC and EVIPLUS NFC SOLUTIONS. THE PRIVATE KEY IS FIXED IN THE APPLICATION. THIS IMPLIES THAT ANYONE WHO USES THIS APPLICATION CAN READ THE MESSAGES SENT BY THE PUBLIC KEY GENERATED BY THIS APPLICATION 👇
 
🏁 EviPost was previewed at the 4th Occitanie Cybersecurity Meeting in Toulouse (France) # RCO2018.

👻 This is a 100% anonymous, stand-alone messaging system that runs cloud-free, without a database, on the volatile memory of a smartphone, even without NFC technology. This makes it possible to exchange messages with the owners of EviPro NFC products, who need NFC Smartphones under Android.

🆕 EviPost is a new service for the encryption of individual messages in Text and / or QR code format, compatible with all encrypted or non encrypted digital communication systems, including social networks, such as SMS, MMS, Facebook, WhatsApp, Linkedin, Twitter, Snapchat , Skype, Instagram, Gmail, Instagram, Scoop It, Pinterest, Slack, Youtube ...
📱 The EviPost application is completely autonomous, without any connection to remote servers directly and / or indirectly and / or connected. Totally independent, it is a barrier to any form of attack of the middle man (HDM). In fact, EviPost can therefore operate in airplane mode, without any mobile network connection, wifi, Bluetooth and even to the extreme without a SIM card.

💪 Thus, EviPost benefits from an extreme encryption power, capable of generating, in real time, encryption keys AES256, RSA4096 as well as AES + RSA + physical blockchain + clear display coding system.

⚖️ EviPost is protected by two patents under the numbers PCT / FR2018 / 050450 and PCT / FR2017 / 050139 in the field of Cybersecurity and Cybersecurity. Without any data collection and identification of the user, he leaves no digital trace of the decrypted message. EviPost works in volatile memory making any attempt at traceability, from detection to initialization, listening to the transport of the data, intercepting the reception of the data, reading the encrypted data and making it extremely difficult. decrypted.

😎 EviPost can anonymise its user to the extreme, even vis-à-vis third parties. This includes the operating system like Android, especially when the smartphone is physically disconnected from all means of communications, such as airplane mode and without a SIM card.

EviPost is compatible with advanced EviCrypt technology, integrated into EviPro or EviPlus solutions to exchange online encrypted messages offline.

🔐 The EviToken NFC application is used to exchange encrypted messages whose encryption keys are generated by the EviPro NFC or EviPlus NFC electronic safes. These safes are end-to-end encrypted NFC devices from the NFC communication protocol to unencrypted display on a screen. These safes feature multiple hardware and digital multi-factor authentication (MFA) access control systems with physical blockchain.

📩 EviPost can be used as a mobile telegraph that uses all existing Web 5.0 communication, messaging services as well as all telecommunication networks available in the world.
Updated on
May 25, 2018

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection

What's new

Première version démonstration du service EVIPOST des solutions EVITAG NFC PRO & EVICARD NFC