Hello,

please select your language

Loading

What is blindeagle ?

Nowadays, our global freedom is more and more threatened from Internet. While the biggest actors in the field of technology are selling your personal life in return for free services (remember : « if it's free, you're the product »), governments launch mass surveillance programs to collect more information about you.

All your movements, your communications, your searches, your preferences, your ideas and beliefs are massively collected, analyzed and stored in order to classify you in huge databases.
What are we afraid of ?
At blindeagle, we are afraid of not being able to speak freely, be it online, on the phone or even in real life (with the advent of the Internet of Things, our everyday devices are more and more interconnected).

We are afraid of no longer being able to vote freely without it coincidently leading to negative repercussions for our carreer or life. What about you ?
« Those who surrender freedom for security will not have, nor do they deserve, either one » - B. Franklin
Close

Logo blindeagle

blindeagle allows you to communicate in a completely confidential way via instant chat and e-mails from all your devices.

  • icon   real-time discussions strictly private and confidential
  • icon   business e-mails strictly private and confidential
  • icon   a familiar interface for all your devices
  • icon   maximum confidentiality : no recorded data
  • icon   no cloud, SSL/TLS nor AES approved by NSA
  • icon   encryption keys of quantum origin
  • icon   authentification based on a physical unit
  • icon   secret sharing of files : ideal for your business
Demo on devices

Our strengths

Completely undecipherable

Our system is based on the only unbreakable encryption algorithm known to this day.

Quantum keys

Our encryption keys are personal for every customer and are generated by a TRNG using quantum physics.

Only your key

The authentification is using a physical medium which will be delivered directly to your door under seal. So no registration is required and no long and complicated password to memorized.

Mainly based in Switzerland

The servers ensuring the relay of your encrypted discussions and e-mails are located in Switzerland, Belgium, Netherlands and Austria - where privacy concerns are the strongest.

Why blindeagle ?

In order to appreciate the current cryptography issue, it's important to understand modern security.
Nowadays, the large majority of websites and apps (on mobile or desktop devices) use the TLS protocol (often called SSL) to secure communications between users and servers (recognizable by a green lock or simply the address bar turning green in the case of a website).

Who is Edward Snowden ?

He's an American computer scientist, former CIA and NSA employee, who revealed details about American and European mass surveillance programs.
timeline icon

Big change in the security field

The encryption done with SSL/TLS protocol is based on the AES (Advanced Encryption Standard). Invented by two Belgian researchers, the algorithm was approved in 2000 by the NSA before becoming the encryption standard for the American government and its organizations. Since then, it has massively spread in web-based applications.
October 2000
timeline icon

Expansion of the SSL/TLS protocol

The SSL/TLS protocol is massively used on online shopping websites, social networks but also by banks because it provides one of the best compromises in the establishment of a security system.
Since 2000
timeline icon

Internet is growing more and more

Things have changed and the Internet has become hugely important. Nowadays, new devices are connected to the internet, your refrigerator, your dishwasher and even your alarm system. Public transport paper tickets are replaced by swipe cards. From now on, knowing the past, present and future behaviour of a person is quite easy. And that's something the NSA fully understands.
Since 2000
timeline icon

« Being spied on ? Me ? No way ! »

The American media reveals the existence of an NSA information system which allows for the automatic generation of a summary scoreboard storing every piece of information gathered in real time by NSA spywares. It can also detect the surveillance level applied to a certain country. Thus, more than 97 billion pieces of data from telecommunication networks have been stored in March 2013.
March 2013
timeline icon

Edward Snowden's first revelations

The Guardian reveals that Verizon and presumably other telephone operators provide information to the NSA, at the request of the FBI, every day. Basically every telephone communication within the United States and abroad.
June 2013
timeline icon

PRISM surveillance program

The American media exposed the PRISM surveillance program which allows the NSA and FBI to monitor Internet users. They would use backdoors in software produced by major American computing companies before accessing the servers of 9 of them, including Microsoft, Yahoo!, Google, Facebook and Apple.
timeline icon

Europe is affected

Snowden told the Guardian that the British government was spying on telecommunications transiting through fibre-optic cables able to relay up to 21 petabytes of data per day, connecting the US to Europe. Since 2011, this project allowed for the collecting of e-mails, Facebook messages and search histories of any Internet user. Those vast amounts of data are said to be shared with the NSA.
June 2013
timeline icon

a SSL/TLS security bug known as Heartbleed

In 2014, a major flaw was found in the SSL/TLS protocols (implemented in the OpenSSL library). It affected the biggest IT groups such as Google, Yahoo!, Amazon and also banks which immediately tried to close the loophole and sweep it under the rug. Edward Snowden supports that the NSA knew everything about this flaw and probably made a massive use of it.
March 2014
timeline icon

Mass surveillance in France

Despite the huge citizen mobilization, a very controversial intelligence bill has been passed by the National Assembly. The legislation allows for the expansion of the scope and the resources allocated to the French monitoring services. France is now gathering more than just basic’s metadata.
May 2015
timeline icon

British bill

On November 4, 2015, the British government published a bill allowing authorities to access all the research, histories and communications of web users living in the UK or abroad. Accessing metadata, remote access to data with more intrusive measures, setting up backdoors, banning specific coding systems : it may no longer be any limits.
November 2015
Location

2016

Finally, a fail-proof communication system

and accessible to all

Separator
separator

The golden rule in Cryptography is don't roll your own crypto.

At blindeagle, we are well aware of that.

Discover what makes blindeagle fail-proof