Faqs

Encrypt Fortress® COMPANY FAQ’S

    Getting Started
  • What is Encrypt Fortress® and what type of services do you offer?
  • Encrypt Fortress® is a global encrypted communications service company headquartered in Panama City, Republic of Panama that provides a global platform of encrypted services. These secure communication services include: Email, Mobile Chat, Mobile Voice, Mobile Text, Umbra with Document Sharing and Screen Sharing, Cloud Storage & File Sharing, and Desk-Top Phone Service. A CRM System is in development. VPN/IP cloaking and a private cell phone, containing only Encrypt Fortress® applications are expected to launch in the first quarter of 2018.
  • How easy is it to transition from my former provider and move my domain and email to the Encrypt Fortress® services?
  • All that is necessary to move your domain, is to move your DNS records to point to our servers and we take care of the email setup. Depending upon who houses your DNS records, it may take anywhere from 1 hour to 48 hours for the records to propagate through the Internet. Your current email can be safely moved to the new server. We recommend that you clean up old email before moving as a best practice, which will speed up the process. Contact customer support for further instructions and help.
  • Is Encrypt Fortress® on the Google Play Store?
  • Yes. When on the Google Play Store, type the word Encrypt Fortress together in the search bar.
    Encryption
  • What is Encryption?
  • Encryption is the conversion of data into a form, called a ciphertext. ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol (VoIP) phone telephony call based on the Real-time Transport Protocol. It uses Diffie–Hellman key exchange and the Secure Real-time Transport Protocol (SRTP) for encryption.
  • I understand encryption, how does yours work?
  • We encrypt and decrypt your incoming and outgoing email at the gateway level, meaning before it leaves the server and as soon as it comes back to the server. We use S/MIME and PDF Encryption. S/MIME provides authentication, message integrity and non-repudiation (using X.509 certificates) and protection against message interception. S/MIME uses public key encryption (PKI) for encryption and signing. All of this is done automatically for you.
  • If I need to email outside the Encrypt Fortress® network, how do you secure my PDF documents?
  • When you are ready to send, choose 'Send Encrypted' (If using Outlook, see Email Functionality below to send encrypted email while using Outlook.) We use a 20 byte one-time password encryption key which can be changed per user. Your receiver can generate his one-time password (OTP) by our 4096-Bit encrypted portal. The receiver can then reply directly from the encrypted PDF for continued end-to-end encryption.
  • What is Hardware Security Module (HSM) and does Encrypt Fortress® use it?
  • We have full server and disk encryption and in addition we run a Hardware Security Module (HSM) which is a tamper proof device and can be used to offload certain security related functionality to the attached hardware device. For example our HSM is used to securely generate and store private keys and provide a true random generator based on a physical random source. Our HSMs are FIPS 140 certified. HSM is used for most Encrypt Fortress® services.
    General
  • What is the difference in Encrypt Fortress® and other servers?
  • Encrypt Fortress® offers end to end encryption. This means that the flow of data from one end to the other is encrypted. We offer offshore jurisdiction, which means that your data is only subject to Panamanian law. Panama has fast become the world's number one country for both internet privacy and eCommerce security. Here, privacy is a constitutional right.
  • If I need help, how do I get it?
  • The Encrypt Fortress® call center is available 24/7 to serve you and will solve your problems as quickly as possible.
  • Do I need these products?
  • If you have security concerns about communication, you need real secure communication tools that are in a jurisdiction that values and protects your privacy and does NOT spy on you. The solution is Encrypt Fortress®. If you want to make sure that no one is reading your email, reading your instant messaging (chat), listening to your phone calls, and watching your Umbra, then it is time to make the change to Encrypt Fortress® and privatize your communications. It’s widely known that the U.S. and other governments are watching and reading whether you desire them to do so or not. Also, remember hackers, identity thieves, and many more are very interested in your information.
  • How can the products benefit me and my company?
  • Peace of mind and security. As long as you follow our best practices, you can be assured that your communication is fully encrypted and protected from prying eyes. Ease of use allows for companies of all sizes to move sensitive information discreetly and quickly, thus improving performance while not sacrificing security and privacy.
  • Is the service going to cost more than what I already use?
  • Encrypt Fortress® offers an incredible value for the cost. The real question is, 'What value do you place on keeping your life, business, and information private and secure?' Encrypt Fortress® is unique in that there are no other companies offering the array of secure communication tools that are truly private and secure. There is a lot of misinformation offered by companies who say they offer you security, thereby giving many a false sense of security. All security is not the same and all are in the wrong jurisdiction. That being said, we believe that you will find that Encrypt Fortress® services are very reasonably priced.
    Legal
  • How do I know that the US government can’t shut down Encrypt Fortress® after I subscribe?
  • Encrypt Fortress® is not subject to US jurisdiction. The US can request information from Panama as long as a law has been broken according to Panama.
  • Is there a protocol that keeps criminals from using the service?
  • There is no where to 100% guarantee that people will use the service correctly. Encrypt Fortress® does not condone nor will it knowingly tolerate ANY use of the service that is for nefarious purposes. We place users on notice when they sign up what our policy is and have them agree to such usage.

Encrypt Fortress® EMAIL FAQ’S

    Getting Started
  • What is Encrypt Fortress email?
  • Encrypt Fortress strips all metadata and replaces it with the information of the servers in Panama. Encrypt Fortress encrypts and decrypts your email at the gateway level meaning it never leaves the server with your information exposed. We also offer enterprise level spam and antivirus protection. You can rest assured that your data is protected.
  • How easy is it to transition from my old email provider and move my domain to the Encrypt Fortress services?
  • Encrypt Fortress will work with you to help you move your domain. All that is necessary to move your domain, is to move your DNS records to point to our servers and we take care of the email setup. Depending upon who houses your DNS records, it may take anywhere from 1 hour to 48 hours for the records to propagate through the Internet. Your current email can be safely moved to the new server. We recommend that you clean up old email before moving as a best practice, which will speed up the process. Contact customer support for further instructions and help.
  • Why should I pay for email when Gmail, Yahoo, Outlook and some others are free?
  • The answer is simple, if your concern is privacy. Simply put, there is NO email privacy within these and other US companies. With Encrypt Fortress encrypted email you not only get absolute privacy and security in a jurisdiction that is known for protecting internet information, but you also receive the following: ease-of-use, privacy protection, enterprise spam and virus protection, offshore location for added protection, message interception protection, PDF document encryption, and use of your own domain.
  • Can I use Outlook, Thunderbird, etc.?
  • Yes, you can use Outlook, Thunderbird, and other similar application to manage your emails.
  • Is there an online webmail interface?
  • Yes, you can access and manage your email from webmail interface.
  • Do you offer IMAP or POP support?
  • Yes, we provide IMAP/POP configure settings for setting up your mail account on Outlook, Thunderbird, etc.
    Features
  • Is there a way to import an address book from another email account?
  • Sure. Click on the ‘Address’ button on the top right of your email page. On the page that opens, at the top, you are given choices to import and to export contacts.
  • How do I create a folder?
  • Click on ‘Settings’, on the next page click on ‘Folders’, at the bottom of the second column there is a plus sign to ‘Add Contacts’.
  • How do I change my settings?
  • To the left of your ‘Logout’ button you will see a ‘Tool’ icon. This is your Settings. Place your cursor over that and click.
  • How do I change my password?
  • Click on ‘Settings’, on the next page click on ‘Password’, and then change your password.
  • Does Encrypt Fortress have an 'Email Notification' that will send a message to my main email letting me know that I received an encrypted email?
  • Yes. You may want to use your Encrypt Fortress email for communicating securely when needed and retain a “normal” email for everyday use. We have created an optional alternative email notification system, where an email will be sent to your alternate email with the subject only notifying you have a new Encrypt Fortress email. To set this up, when your webmail is open: Select settings (top right corner), in first pane click filters, in 3rd pane at bottom click the “+”, click the bubble for “all messaged”, drop down menu select “send notification”, fill in the “to email address” with your alt email, click 'Save' at the bottom.
    Security
  • What is Data Leak Prevention (DLP)?
  • Data Leak Prevention (DLP) is a feature that prevents certain information to leave the organization via email. What information this is, is defined in the configuration of the DLP system. Typically, it includes credit card numbers, bank account numbers, excessive amounts of email addresses or other personal information in one email message, etc. The DLP engine has been integrated with the Encrypt Fortress encrypted email. DLP can monitor email at various levels: • email body content • email headers • email attachments of various types • nested attachments of various types Encrypt Fortress DLP currently filters email bodies, attachments and nested attachments of type text, html, xml and other text-based formats. Filtering attachments of type pdf, doc, xls etc. will be part of a future offering of Encrypt Fortress DLP. Configuring DLP is customized according to client request setup to Encrypt Fortress. (PLEASE note there may be an additional cost for customization.) You may specify keywords and sentences that outgoing email messages should not contain. More elaborate filtering is achieved via regular expressions, a specification format that allows you to specify virtually any combination of characters, words or sentences that should be filtered. DLP can be configured on 2 levels, similar to how encryption is configured: at domain level (if client has their own domain with us) and at individual user level. The latter is useful as they can have a Encrypt Fortress email or in specific cases where some users can send out information via email that other users cannot. Features • Outgoing email can be scanned on keywords and regular expressions. • Keywords and regular expressions can be specified at gateway, domain and user level. • Messages can be blocked or quarantined when a rule is violated. • Email encryption can be forced when a rule matches. • DLP managers will be notified when a rule is violated. • DLP managers can release quarantined email. • If allowed, users can manage their own quarantined email. • Email bodies, attachments and nested attachments of type text, html, xml and other text-based formats are supported (support for pdf, doc, xls, zip etc. will be added to future versions of Encrypt Fortress DLP).
  • What happens if I email someone outside of the network?
  • Although the email has excellent military-grade encryption, once your email leaves the Encrypt Fortress network and travels outside our network it will be exposed. The email is subject to be intercepted and there is now a record of your email going to another email address. If you need to send important information, click ‘Send Encrypted’ when you are ready to send your email. The recipient will receive an encrypted email where the entire body including all attachments will be private. Anything you type in the subject line will NOT be encrypted. NOTE: It is not recommended to use Outlook on your local computer. Please read about remote desktop service below. You can send an encrypted email from Outlook by typing the following EXACTLY on the subject line: [encrypt]
    General
  • How do I update to the latest version?
  • Encrypt Fortress services are designed to receive available updates.
    Technical/Troubleshooting
  • What if I forget my password?
  • Log in and submit a ticket on https://my.encryptfortress.com/clientarea.php click ‘Support Login’ and then login to your account and submit a ticket.
    Mobile Email
  • What is Encrypt Fortress Mobile Email?
  • Encrypt Fortress Mobile Email is end-to-end email encryption that safeguards your message from outbox to inbox and back. Send an encrypted email from anywhere to any recipient. No additional software or plug-ins required. The Encrypt Fortress mobile email and data encryption ensure that individuals and enterprises can communicate securely no matter which encryption platform they have. With the push of a button, Encrypt Fortress mobile email makes intelligent decisions to encrypt messages using the best possible delivery method, such as PGP, S/MIME and PDF encryption. Encrypt Fortress mobile email provides a completely secure, but an easy-to-use experience for encrypted email. Encrypt Fortress strips all metadata and replaces it with the information of the servers in Panama. Encrypt Fortress encrypts and decrypts your email at the gateway level meaning it never leaves the server with your information exposed. We also offer enterprise level spam and antivirus protection. You can rest assured that your data is protected.
  • How do I access my mobile email account?
  • You can access your encrypted email account using your browser and going to mail.encryptfortress.com. You may also access your email using the Encrypt Fortress mobile email app that is available for download from the Google Play Store. NOTE: It is NOT recommended that you use Outlook on your local computer as your computer will maintain records on your computer. Consider the remote desktop service that Encrypt Fortress offers so that your information is protected on your remote desktop in the Republic of Panama and not on your local computer. Should your computer be stolen, lost, or subpoenaed, there will be no information on your laptop if you work completely from your remote desktop.

Encrypt Fortress™ CLOUD FAQ’S

    Getting Started
  • What is Encrypt Fortress Cloud?
  • Encrypt Fortress Cloud is a cloud based folder system that acts similar to Dropbox but offers encryption when uploading or downloading files to keep your data safe and secure.
  • How do I access Encrypt Fortress Cloud?
  • The best recommended way it to log in to the server at cloud.EncryptFortress.com to work with the cloud. Files may be uploaded, downloaded, edited, and worked on. You are given the option to download Encrypt Fortress Cloud directly to your computer, although this is not recommended. The reasons that this method is not recommended is that should your computer be lost, stolen, or subpoenaed, the information stored on your computer is exposed to risk. Logging in to the Encrypt Fortress Cloud server and working off of the server protects your data.
  • What’s wrong with using a service like Dropbox?
  • It is important to consider the strength of the encryption and the jurisdiction. The vast majority of cloud providers do have have sufficient encryption and are located in a jurisdiction where your information is not truly private. As noted here, https://www.dropbox.com/help/27/en, Dropbox employees have access to your files when they deem it legally required or for “legitimate reason”. Legitimate reason is a very broad term under which your information can be compromised.
  • Why should I use Encrypt Fortress Cloud over Dropbox?
  • Our servers are located 100% offshore in the Republic of Panama with over 70 years of privacy & secrecy laws including corporate, banking, and internet. Your data is protected by world class ZRTP encryption.
  • How do I use the Encrypt Fortress Cloud?
  • Encrypt Fortress Cloud acts as an online storage for your data that is available from anywhere. Think of it as a USB drive that you don’t have to carry with you or plug into a computer. It is recommended, for best practices, that you log into the server from any secure device or you can install the software on a computer, which is not recommended. Either way, once you are logged into the server you can download and upload any file that you wish to be made available to yourself or your colleagues.
    Features
  • Is it possible to share my files with a colleague through Encrypt Fortress Cloud?
  • Yes, unlike Dropbox, we offer an Encrypted Content Repository with sharing and collaboration. You can seamlessly transfer files and folders between co-workers, clients and partners from any location and designate specific access permissions.
  • Does Encrypt Fortress Cloud allow easy integration of files between various devices such as Androids, Windows, and Apple Equipment?
  • Encrypt Fortress Cloud does facilitate availability of business content on any user device. Of course, it’s up to you to share files that are compatible between Mac, Windows, and Android devices.
  • How much data can my company store in the Encrypt Fortress Cloud?
  • There is no limit.
    Security
  • What is client-side encryption?
  • There is full disk encryption and Hardware Security Module (HSM) and in addition we implement client-side encryption. This feature enables you to encrypt your files PRIOR to sending them to the Encrypt Fortress server. To encrypt a file library, you need to set a password when you create a library. The password is not stored on Encrypt Fortress cloud platform. This prevents even the administrator of the servers from viewing your encrypted data without the password.
  • Can I put an encrypted library on the Encrypt Fortress Cloud?
  • To download and sync an encrypted library to your computer, you need to provide the password. The Encrypt Fortress client program will download the encrypted data and decrypt it on your computer. To share an encrypted library with your co-workers or team members you will need to provide them the password.
  • How does an encrypted library work?
  • When you create an encrypted library, you will provide a password for it. All the data in that library will be encrypted with the password prior to uploading to the server. The encryption procedure is: 1. Generate a 32-byte long cryptographically strong random number. This will be used as the file encryption key ("file key"). 2. Encrypt the file key with the user provided password. We first use PBKDF2 algorithm to derive a key/iv pair from the password, then use AES 256/CBC to encrypt the file key. The result is called the "encrypted file key". This encrypted file key will be sent to and stored on the server. When you need to access the data, you can decrypt the file key from the encrypted file key. 3. All file data is encrypted by the file key with AES 256/CBC. We use PBKDF2 algorithm to derive key/iv pair from the file key. After encryption, the data is uploaded to the server. (The above encryption procedure can be executed on the desktop and the mobile client.)
  • Can I set a time limit on sharing a file from Encrypt Fortress Cloud?
  • Even if sharing an unencrypted library with Encrypt Fortress cloud you can set a password and also an auto expiration. For example you can send a randomly generated download link with a 128 key password that expires in 1 day. As always, all connections occur via encrypted https connection from user to the Encrypt Fortress server.
    General
  • How do I update to the latest version?
  • Encrypt Fortress services are designed to receive available updates.

Encrypt Fortress™ OFFICE PHONE FAQ’S

    Getting Started
  • Can I use my own phone?
  • Yes
  • Can I purchase a phone from Encrypt Fortress®?
  • Yes
  • Can I take my phone with me when I travel and use it?
  • Yes. This is very convenient and can connect to a LAN cord.
    Features
  • How do I check my voicemail?
  • When a user receives a voice mail a copy of that voice mail can be checked on the user’s email account. Also voice mails can be checked by dialing *97 on the dial pad, then mailbox number (example User_100 the mail box number is 100), then the 4 digit passcode that the user will receive with the initial setup. The PIN may be changed in settings as you access your email.
  • How do I call In-Network numbers?
  • Dial the Encrypt Fortress® assigned number extension for the user you desire to call.
  • How do I call Out-of-Network numbers?
  • Dial the Country Code and the phone number.

Encrypt Fortress™ Umbra FAQ’S

Getting Started
    • What is Encrypt Fortress® Mobile Call?
Encrypt Fortress® Mobile Call is global encrypted private calling made simple. When a Encrypt Fortress® Member makes a phone call with another Encrypt Fortress® Member, that transmission is encrypted end-to-end from your own mobile device or computer. Encrypt Fortress® calls are encrypted end-to-end, but function just like you're used to.
    • How do I download Encrypt Fortress® Mobile Call to my device?
Download the app from the Google Play Store and follow prompts to install. When on the Google Play Store, type Encrypt Fortress altogether in the search bar.
Features
    • How do I make a phone call?
When you open the application, a dialpad appears and you may dial extensions or phone numbers.
    • How do I initiate a conference call?
Dial the first number that you want to call. After you connect to the first call, press the '+' button toward the bottom of the Mobile screen and then dial the second number.
    • How do I set up Favorite Contacts?
Open the application and press the 'Star' button toward the top of the Mobile screen. Press 'Choose Android Group'.
    • How do I dial Out-of-Network numbers?
Dial the country code and the phone number. For numbers in the US, dial 1 plus the phone number. For all other countries, dial 011 plus the phone number.
    • How do I dial In-Network numbers?
Dial the extension number of the Member that you are trying to reach.
    • How do I mute the audio during a call?
Press the microphone button on the screen.
    • How can I access the dialpad during a call?
The dialpad icon is on the bottom left of your screen.
    • Can I use this service to make emergency calls?
This service is not meant to support making Emergency-Type calls.
Security
    • What type of security encryption does Encrypt Fortress® Mobile Call employ?
Encrypt Fortress® Mobile Call utilizes the open sourced ZRTP encryption protocol used worldwide by many for optimal security. ECDH-384 and AES 256 encryption algorithms.
    • In a Device-to-Device connection, can someone listen into my phone call?
Using a true device-to-device connection, it is impossible even for system administrator to monitor / listen to a call on the encrypted system. When you connect to another Member and your encryption keys match, you are secure. This is a common concern in a company phone system, where management may wish to listen in on conversations. Many systems, by design, will record calls or allow for “supervisor” monitoring. The problem in the traditional system is when officers, directors, and other high level positions discuss sensitive / valuable corporate information all departments are vulnerable to the “technical staff”.
    • What is a Man in the Middle attack (MiTM) and why do I need to verify the authentication keywords?
In a Man-in-The-Middle attack, a malicious user inserts himself between two parties in a communication and impersonates both sides of the exchange. The attacker then intercepts, sends and receives data meant for either user, such as account numbers or passwords.
    • Are there any back doors on the Encrypt Fortress® Mobile application?
No! Encrypt Fortress® takes Privacy very serious. Both yours and ours. We are committed to this principle and will not waiver, which is a large part of why our Jurisdiction is in the Republic of Panama.
    • How do I authenticate another Member and what are the differences?
There are various methods in which to authenticate each other. One is a Device Fingerprint and the most popular is question in which the two Members will choose a unique question and answer that only they will know.
General
    • How do I know that I have the latest version?
Encrypt Fortress® services are designed to receive available updates.
Technical/Troubleshooting
    • My colleagues use Macs and I use Windows. Some of my clients need to view files on Android phones. Can we still share files?
We facilitate availability of business content on any user device. Of course, it’s up to you to share files that are compatible between Mac, Windows and Android devices.
    • Is there an online webmail interface?
Yes, you can access and manage your email from webmail interface.
    • Do you offer IMAP or POP support?
Yes, we provide IMAP/POP configure settings for setting up your mail account on Outlook, Thunderbird, etc.

Encrypt Fortress™ MOBILE CALL FAQ’S

    Getting Started
  • What is Encrypt Fortress® Mobile Call?
  • Encrypt Fortress® Mobile Call is global encrypted private calling made simple. When a Encrypt Fortress® member makes a phone call with another Encrypt Fortress® member, that transmission is encrypted end-to-end from your own mobile device or computer. Encrypt Fortress® calls are encrypted end-to-end, but function just like you're used to.
  • How do I download Encrypt Fortress® Mobile Call to my device?
  • Download the app from the Google Play Store and follow prompts to install. When on the Google Play Store, type Encrypt Fortress altogether in the search bar.
    Features
  • How do I make a phone call?
  • When you open the application, a dialpad appears and you may dial extensions or phone numbers.
  • How do I initiate a conference call?
  • Dial the first number that you want to call. After you connect to the first call, press the '+' button toward the bottom of the mobile screen and then dial the second number.
  • How do I set up favorite contacts?
  • Open the application and press the 'Star' button toward the top of the mobile screen. Press 'Choose Android Group'.
  • How do I dial out-of-network numbers?
  • Dial the country code and the phone number. For numbers in the US, dial 1 plus the phone number. For all other countries, dial 011 plus the phone number.
  • How do I dial in-network numbers?
  • Dial the extension number of the member that you are trying to reach.
  • How do I mute the audio during a call?
  • Press the microphone button on the screen.
  • How can I access the dialpad during a call?
  • The dialpad icon is on the bottom left of your screen.
  • Can I use this service to make emergency calls?
  • This service is not meant to support making emergency-type calls.
    Security
  • What type of security encryption does Encrypt Fortress® Mobile Call employ?
  • Encrypt Fortress® Mobile Call utilizes the open sourced ZRTP encryption protocol used worldwide by many for optimal security. ECDH-384 and AES 256 encryption algorithms.
  • In a device-to-device connection, can someone listen into my phone call?
  • Using a true device-to-device connection, it is impossible even for system administrator to monitor / listen to a call on the encrypted system. When you connect to another member and your encryption keys match, you are secure. This is a common concern in a company phone system, where management may wish to listen in on conversations. Many systems, by design, will record calls or allow for “supervisor” monitoring. The problem in the traditional system is when officers, directors, and other high-level positions discuss sensitive/valuable corporate information all departments are vulnerable to the “technical staff”.
  • What is a Man in the Middle attack (MiTM) and why do I need to verify the authentication keywords?
  • In a Man-in-The-Middle attack, a malicious user inserts himself between two parties in a communication and impersonates both sides of the exchange. The attacker then intercepts, sends and receives data meant for either user, such as account numbers or passwords.
  • Are there any back doors on the Encrypt Fortress® Mobile application?
  • No! Encrypt Fortress® takes privacy very serious. Both yours and ours. We are committed to this principle and will not waiver, which is a large part of why our jurisdiction is in the Republic of Panama.
  • How do I authenticate another member and what are the differences?
  • There are various methods in which to authenticate each other. One is a device fingerprint and the most popular is question in which the two members will choose a unique question and answer that only they will know.
    General
  • How do I know that I have the latest version?
  • Encrypt Fortress® services are designed to receive available updates.
    Technical/Troubleshooting
  • My colleagues use Apple and I use Windows. Some of my clients need to view files on Android phones. Can we still share files?
  • We facilitate availability of business content on any user device. Of course, it’s up to you to share files that are compatible between Mac, Windows and Android devices.
  • Is there an online webmail interface?
  • Yes, you can access and manage your email from webmail interface.
  • Do you offer IMAP or POP support?
  • Yes, we provide IMAP/POP configure settings for setting up your mail account on Outlook, Thunderbird, etc.
    Encrypt Fortress® Messenger (Chat)
    Getting Started
  • What is Encrypt Fortress® Messenger?
  • Encrypt Fortress® Messenger delivers encrypted messaging with secure file transfer for mobile devices. Encrypted and private messaging with your contacts at Encrypt Fortress® Messenger, Google Talk/Hangouts, Facebook Chat, xmpp servers & more! Offers peer-to-peer key management – keys are on your device, not on our servers.
  • How do I activate Encrypt Fortress® Messenger on my device?
  • Encrypt Fortress® Messenger is located on the Google Play Store. When on the Google Play Store, type the word Encrypt Fortress altogether in the search bar.
  • Which devices does Encrypt Fortress® Messenger currently support?
  • Encrypt Fortress® Messenger is currently compatible with Android phones and tablets. Support for Apple, Blackberry, and Windows phones is under development.
    Features
  • How do I initiate a new text message?
  • Click the contact you wish to Messenger with. Then type your message in the text field.
  • What does the gear icon allow you to do?
  • Clicking the gear icon will bring up the sign in screen.
  • Can I send encrypted pictures/video?
  • Yes. When you have a contact open, click the attachment icon located at the top of your screen. Locate the picture/video you want to attach and send.
  • Can I send audio files?
  • Yes. When you have a contact open, click the attachment icon located at the top of your screen. Locate the audio file you want to attach and send.
  • How do I add a contact?
  • Click the lock icon located at the top left of your screen. Click 'Add Contact'. Type in the member's email address. Choose which list you want to add them to and click 'Send Invitation'.
  • How do I delete a message conversation?
  • When you have a contact open, click the 3 periods located at the top right of your screen. Click 'End Chat' and the entire conversation will delete.
  • How do I authenticate a contact?
  • When you have a contact open, click the yellow lock and click 'Verify Key'. You are given an option to authenticate. The most popular is a device fingerprint and a question/answer.(Choose a question/answer that only you two would know.)
  • What does it mean when the Lock is 'unlocked'?
  • Your connection is NOT encrypted nor secure.
  • What does it mean when the lock is yellow, at the top of the screen on a contact?
  • When the lock is yellow, your connection is secure through ZRTP encryption but you have not authenticated each other through a password or device fingerprint. Meaning that you have not confirmed the identity of the member you are chatting with.
  • What does it mean when the lock is green, at the top of the screen on a contact?
  • When the lock is green, your connection is secure through ZRTP encryption and it means that you have authenticated each other through a password or device fingerprint. Meaning that you have confirmed the identity of the member you are chatting with.
  • What is the 'Destroy Button' for?
  • It will quickly uninstall Encrypt Fortress® Messenger, and permanently delete all conversations. When you click the 'Destroy Button', you must confirm you wish to proceed.
    Security
  • Is Encrypt Fortress® IM secure?
  • Yes. Encrypt Fortress® Messenger delivers private and secured messaging and media with device-to-device encryption, meaning your information does not travel through our servers. Military-Grade encrypted end-to-end. We keep your messages 100% private using state of the art Off-The-Record (OTR) encryption. Your conversations cannot be logged or intercepted by anyone. NOTE: These security measures only apply when the person you are chatting with also uses Encrypt Fortress® Messenger, or at least a compatible OTR client like Encrypt Fortress® Messenger.
  • What is a Man in the Middle attack (MiTM) and why do I need to verify the authentication keywords?
  • In a Man-in-The-Middle attack, a malicious user inserts himself between two parties in a communication and impersonates both sides of the exchange. The attacker then intercepts, sends and receives data meant for either user, such as account numbers or passwords
    General
  • How do I check if I have latest version of the Encrypt Fortress® Messenger?
  • Encrypt Fortress® services are designed to receive available updates.