Thor Stealth ECC PGP Mobile Encryption secured your mobile communications and is an ultra high grade Chat & PGP application
Why using Thor Mobile Chat Encryption? We protect sensitive and confidential business information with top-grade Elliptic Curve Cryptography (ECC) end-to-end encryption on an impenetrable closed messaging / chat platform. We Ensure Your Private Conversations Remain Private – the motto, that make us outstanding, we don’t compromise with your privacy no matter what. Our all activations & channels use Samsung Knox for device security, a first level endpoint security combined with Digital Security premier BlackBerry’s Secure Connect Plus (VPN) a network level security guard.
Thor newest ECC Chat Encryption has never been easier to use
Designing a better and modern way to communicate. Our powerful easy-to-use Chat interface gives you instant access to the strongest ECC encryption algorithms at this moment available. Elliptic Curve Cryptography (ECC) is 10 times stronger then the old RSA what is made in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman. RSA is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private) We don't use RSA anymore. Some colleagues still do. Thor use the latest Post-Quantum Elliptic Curve Cryptography (ECC) wowered with Samsung Knox and BlackBerry Secure Connect Plus
Thor ECC Private Global Communication Chat Network
Clients can use their Samsung mobile phones or tablets world-wide without additional roaming charges. Thor ECC Chat transmits data on a secure private international network with an prepaid data sim card valid for 6 months on fair use policy.
- Impenetrable Infrastructure
- Our Thor multi-layer system provides maximum protection, closing vulnerabilities and stopping all attacks. Security exists at all levels: the network, devices, and the messaging system.
Thor Authentication & Account Security
Our Thor platform eliminates the risk and liability that result from the interception of sensitive business data.
- The Thor platform is designed to stop any attempts to take over your account.
- Account(s) can only be used once, Thor blocks all other access.
- If detected our system will secure the device and wouldn’t allow any login.
- Resistant to Brute Force Attacks.
- Redundant Authentication.
- Strong password requirements for the device and the messaging system prevent the wrong user from accessing messages and data exchanged.
Thor Secured Mobile Device Management
Our Thor platform protects devices by ensuring full control of the business information in the event if a device is lost or stolen.
- Tamper-Resistant Hardware.
- We only use devices that have security built-in to protect users from data breaches and withstand any hacking or tampering attempts.
- Control to wipe the device remotely.
Thor Encryption Protocols
Thor provides an integrated end-to-end encrypted messaging protocol.
Key Exchange utilizes the Double Ratchet Algorithm which combines the cryptographic ratchet based on the Diffie–Hellman key exchange and a ratchet based on the the key derivation function.
- DH Ratchet: Elliptic curve Diffie–Hellman (ECDH) with Curve25519.
- Message Authentication Codes: HMAC based on SHA256.
- Symmetric Encryption: AES-256 in Counter Mode (CTR).
- Verification: Automatic verification is done with your public identity key.
Thor PGP e-mail for contacting no Thor users
Thor PGP e-mail is an extra option to contact other relations who don't have an secured Thor Chat Application on their device. That is the only reason we offer this PGP e-mail option. We can guarantee our side but not the the secured PGP application made by our conculega. So it is always better to have al our Thor ECC Chat application.