Hello,

please select your language

devices
arrow-down

What exactly makes blindeagle fail-proof ?

Using SSL or Cloud technologies can be harmful for your private data.

Thanks to blindeagle, we guarantee you total confidentiality and absolute security for your instant conversations and e-mails.
No cloud, no synchronization : no data is stored on our servers.

In addition, blindeagle uses the only fail-proof encryption system known to this day unlike industrial standards used by your e-mail and real-time chat applications.
This way you can chat with your friends or manage your business in a completely confidential manner, on your favorite devices, just by plugging in your personal unit through the 3.5 mm audio jack. Your private life is now protected.
Did you know ?

half a million

important web services were affected by Heartbleed in 2014

learn more about
In the IT world, security is a crucial issue. It is supposed to guarantee the integrity and confidentiality of our data in both professional and private life.

The contents of our computers, messaging applications and even banking systems are secured using the industry standards. All this coding makes it hard to decrypt the protected information yet it is still possible to do.

Nowadays, world-class cryptologists agree on the fallibility of the most popular computer securities. So no, your data is not 100% secure when transiting through the different web services.

The working principle of these encryption systems is also one of their weaknesses. In short, their goal is to make the decrypting process as hard as possible but not impossible (depending on mathematical complexities). This principle is closely related to a compromise between the level of security wanted and the cost for setting up the system in terms of equipment.


In the future, quantum computers will easily break standard encryption systems while blindeagle will still be fail-proof.


The more an encryption algorithm is complex, the more likely it is that an internal error goes unnoticed.

The situation took place in 2014 when a serious vulnerability known as Heartbleed was disclosed in the OpenSSL cryptograhic software library.

Due to its excellent reputation in terms of security, the SSL/TLS protocol is massively used to secure your banking transactions, your online shopping or your conversations on social networks. Heartbleed affected half a million web services including some of the biggest IT companies such as Google, Yahoo! and a few Amazon services. It had been present for at least two years before being discovered and web giants immediately tried to sweep it under the rug to protect their image. Consequences of this flaw might come back and bite us if we are not careful...

Nowadays, you have no choice whether or not you share your private data. Actually, when you chat with your family, friends or colleagues, you automatically allow companies selling your private data to make a living off your moral and sometimes physical integrity.

That's where blindeagle comes in with a one-time pad (OTP) applied to the letter. The only unbreakable and fail-proof encryption system ever invented.
Close

icon

The SSL/TLS protocol has already shown its weaknesses.

It is the cornerstone of applications pretending to be focused on privacy protection while they give users an illusion of security.

At blindeagle, no need to compromise : we use the only fail-proof encryption system that ever existed.

icon

The confidentiality of Cloud Computing is still unclear.

All the applications able to relay the same contents in all your devices are necessarily copying the data on their servers.

At blindeagle, you can keep your data on your external unit whereas our servers won't store anything.

icon

Rijndael is a key player at the heart of the SSL protocol.

It is also an encryption system massively used to protect your private data.

In 2000, it was selected by the NSA as the proposed AES and started the process of making it the official encryption system standard in 2002.

the Vernam theory

The Vernam cipher, or one-time pad, is a simple, effortless and fast encryption algorithm. It is the only one that cannot be unlocked. As it requires additional materials in order to secure interactions on the Internet this stopped its democratization.

The unconditional security can only be guaranteed if and only if these 3 basic rules are strictly respected.

1

The encryption key needs to be as long as the data to protect it.


The blindeagle external unit includes up to 2Gb of internal key ensuring you up to 3 years of autonomy to chat and share in an unconditionally secure way.

2

The key needs to be truly random. Indeed, computers are deterministic devices and can't generate random numbers.

The key existing in the external unit is generated using quantum phenomena (photon counting based QRNG).

3

Each key can only be used once. The blindeagle external unit behaves like a single use memory.


Every time you use it to encrypt your communications, a piece of key is consumed and destroyed from the internal memory of the external unit.

arrow-down

1. Servers mainly based in Switzerland

blindeagle servers are based in Switzerland, Belgium, Holland and Austria.
Those are some of the last countries where your privacy is still respected and where data protection is the strongest.

We are concerned with the location of our servers, not for the security of your communications (which is based on an unconditionally secure system) but for the best availability.

2. Quantum key generation.

The quantum chaos at the service of the only perfect encryption system
In order to be unconditionally secure, the Vernam cipher needs truly random encryption keys. Indeed, computers are deterministic devices and can't generate truly random numbers even if their ability to create pseudorandom numbers is used in every encryption systems. This might be a good compromise for people not really caring about their private information but that's not our case, and it's probably not yours.

To offer you a completely fail-proof system, we must use a RNG (Random Number Generator) relying on quantum optics : one of the only sources of truly random numbers that meets the needs of the Vernam cipher.

3. Personal encryption keys, personal external units

Personal encryption keys, personal external units
The encryption keys ensuring you an unconditional security are therefore unique because of their quantum origin. Those keys are included in the memory of the external units which are delivered to your door under seal. Your external unit allows more than 3 years of during which you will be able to chat and share in a secure way thanks to our fail-proof system.

The Twins & Quads system

The system

separator

1. The external unit

Although it's a high-tech device, its functioning is effortless. The external unit works in perfect symbiosis with the app available for each of your devices.

The apps are freely available for download. You just need to plug in the external unit through the audio jack of your devices and you are ready to protect your interactions with friends or colleagues.
separator
Animation
separator
separator

2. Encryption

The encryption strictly follows Vernam basic rules. It's a really simple operation which is perfectly fit for a low energy consumption device such as the blindeagle external unit.

It also deals with the whole encryption and decryption process: it receives the data to encrypt, fuses it with a fragment of its internal key and sends them back to your device while the piece of key used is destroyed.
separator
Animation
separator
separator

3. Relay

Our servers, based in Switzerland, Belgium, Holland and Austria, are only used to relay your communications giving you a real end-to-end encryption
separator
Animation
separator
separator

4. Decryption

The decryption is based on the same basic operation as the encryption, and is as effortless and fast. The one-time use and the instantaneous destruction of the encryption keys ensure you a complete reliability.
separator
Animation

1. The external unit

Although it's a high-tech device, its functioning is effortless. The external unit works in perfect symbiosis with the app available for each of your devices.

The apps are freely available for download. You just need to plug in the external unit through the audio jack of your devices and you are ready to protect your interactions with friends or colleagues.
separator
Animation
separator
separator

2. Encryption

The encryption strictly follows Vernam basic rules. It's a really simple operation which is perfectly fit for a low energy consumption device such as the blindeagle external unit.

It also deals with the whole encryption and decryption process: it receives the data to encrypt, fuses it with a fragment of its internal key and sends them back to your device while the piece of key used is destroyed.
separator
Animation
separator
separator

3. Relay

Our servers, based in Switzerland, Belgium, Holland and Austria, are only used to relay your communications.

The encrypted message is sent to our servers ready to be converted.
separator
Animation
separator
separator

4. Conversion

The conversion is as effortless and fast as the encryption.

The encrypted message is then converted, still according to the Vernam theory, in order to be decrypted by the recipient.
separator
Animation
separator
separator

5. Decryption

The decryption is based on the same basic operation as the encryption, and is as effortless and fast. The one-time use and the instantaneous destruction of the encryption keys ensure you a complete reliability.
separator
Animation

Frequently asked questions

icon How is the external unit locally protected ?
Once the quantum keys are generated and implemented into the internal flash memory of our external unit, the PCB connector is cut out. Before sealing the external unit, we put a special resin on the PCB. It’s called potting. In less than four hours the entire thing solidifies itself to have a compact and completely sealed device. If someone tries to open the sealed device, he will destroy all PCB connectors by snatching out the resin. It is physically impossible to continue using an open external unit. From now on it’s impossible for someone to copy your personal key without opening it and without you noticing it.
icon How is the sealed delivery carried out ?
The physical transmission of the encryption key is a fundamental step for a perfect Vernam cipher. You will receive your sealed external unit at home in a one-time opener package. Therefore you can check the integrity of the package and start using it or in the opposite case you can contact our customer service and report a corrupt package. We will send you a new one.
icon Why are the blindeagle servers located in Switzerland, Belgium, Austria and Holland ?
The Swiss neutrality makes it an excellent choice for hosting part of our web service. Our main chatting servers are based in Belgium since it's a country where no law forces a company to store users' data. We also have other servers who are managing secondary functions. Located in Holland and Austria, they don’t interfere with the safety of your communication. Those countries care about individual freedom and privacy.
icon Where do your random quantum generators come from ?
Our random generators used to create the encryption keys use quantum physics – the only true source of randomness that we use to comply with the Vernam cipher.

Schematically the generator (SWISS METAS approved) is counting the photons passing (or not) through a semi-transparent mirror. And generate the corresponding binary sequence immediately stored on the internal flash memory of the PCB. Then we add the resin and seal the package. Everything is done by our care.

The encryption keys are created by crossing multiple results and binary sequences. The generators we use come from different providers.
icon What if I don’t trust the delivery intermediates ?
If the modules high degree of local protection and the sealed delivery does not satisfy you, you can always come and pick up your external unit directly in Belgium.
icon You said that SSL/TLS is not fail-proof but you still use it on your website !
Yes, indeed. We use it because it’s the only existing ciphering technology directly compatible with the HTTP protocol. None of your communications are transiting through the website. In this case the SSL/TLS encryption is useful for the SEO (encrypted connexion websites ranking).
arrow-down

Technical questions ?

feel free to contact us