top of page

BLOG
Your source for insights from our team on secure communications and encryption,
with tips and tricks to get the most from using Cellcrypt


CELLCRYPT
Dec 5, 2023
Understanding the Need for Quantum Safe Encryption
In an era where data breaches and cybersecurity threats loom large, the importance of robust encryption cannot be overstated. With the...
100 views


CELLCRYPT
Aug 25, 2023
Cryptography: Hardware VS Software
In today's digitized age, securing our mobile communications is paramount. With threats from hackers, malware, and other cyber...
66 views

CELLCRYPT
Nov 11, 2022
What are Key Fingerprints and how do they work?
As experts in encrypted communications, technical details are our daily bread and butter. However, we understand that not everyone is...
106 views


CELLCRYPT
Nov 4, 2022
The Risks of Using Telephone Numbers as your ID with Signal and WhatsApp.
When you installed Cellcrypt, you may have noticed that we asked for your email address rather than your telephone number. There are...
126 views


CELLCRYPT
Jun 2, 2021
Demystifying Access Control and Zero-Trust
As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology....
201 views
bottom of page