Warfare
We have always been at war.
We tell you about some of the battles we fought.
2012
Our devices were stolen by the pseudo Italian state, which, attempting to access them by force, clashed with our cryptographic implementations.
Unable to access the devices, they turned to a sort of postal and telecommunications police, which repeatedly failed in its attempt.
Last resort, rely on forensic analysts and hackers in an attempt to violate our encryptions. After months of failed attacks, they too have had to surrender to the inviolability of our cryptographic systems.
CR1PT0 was born there.
2014
After the defeat we suffered, the pseudo state of Italy tried to monitor us for years.
Trying to intercept us several times, trying to understand what kind of data was coming out of our devices, showing interest in the data, chats and calls of both our notebooks and smartphones.
Our encryption and anonymity technology has allowed us to maintain privacy and keep prying eyes away.
Unable to geolocate or decode our communications, they again stole some of our devices to physically access them and obtain files, chats and calls.
But our cryptographic technology remained inaccessible.
2015
An attack sponsored by someone who claims to be an attacker has attempted to hijack our Twitter account.
Informed by the social network, we made ourselves available to assist them in the forensic analysis of the attack, but they did not take advantage of this opportunity. This choice did not allow them to find the person responsible.
Another bizarre episode, our CR1PT0 account is assigned to others.
We are still waiting for an adequate solution from the social network.
Do you want maximum security for your data?
Our technology is created to meet the need for extreme security.
Contact us now