Search This Blog

Friday, July 8, 2016

New Location of TCC's CipherONE Blog

With the launch of our new website platform, TCC's CipherONE blog will now be hosted at

Please bookmark this link and also visit us to check out our new mobile responsive site.

Thursday, April 21, 2016

Phone Hacking Is Easy and All Phones Are Vulnerable

With just a phone number, hackers can hear and record voice conversations, track a person’s whereabouts, read text messages, spy on a person, and steal information — such as contacts data, giving hackers the phone numbers of others for additional malicious actions.

In the investigation conducted by the CBS News Network, which aired "Hacking Your Phone" on the 60 Minutes television program, hackers quickly and without detection intercepted and recorded a congressman’s phone conversation by just knowing his phone number. 

TCC’s CipherTalk® secure smartphone protects against all of these threats. It doesn’t use the SS7 global phone network protocol, provides end-to-end military-grade encryption, encrypts stored data like contacts, and makes communications anonymous, while functioning just like a typical easy-to-use smartphone.

View the video of the investigation report to understand firsthand the vulnerabilities of mobile phone communications. Politicians, business executives, military/paramilitary organizations, law firms, financial, industrial utility, and pharmaceutical operations are just some high-risk areas. 

Next, contact TCC to secure your mobile phone — and all your phone communications: landline, VoIP and smartphone, as they all use the SS7 network and are all at risk. 

'Hacking Your Phone' Video Report by 60 Minutes

 60 Minutes Investigation Shows All Phones at Risk of Being Hacked. View Video Here.


Friday, March 25, 2016

TCC’s CipherTalk® Makes Mobile Voice and Text Communications Anonymous

The CipherTalk secure smartphone provides military-grade full-circle protection for all aspects of mobile phone talk and text communications, including an innovative ability to ensure user anonymity. The entire voice and text messaging connection procedure is hidden, and no user data or call logs are generated, collected or stored. Whom and when a user is calling, and where they are calling from, is only known by the user.

To ensure full anonymity of communications the secure CipherTalk infrastructure includes three information gaps. The first gap is between the CipherTalk phones, where the CipherONE® Secure Connect Network isolates the CipherTalk phone initiating the call from the answering CipherTalk phone terminating the call. The CipherONE Secure Connect Network securely authenticates and IP connects the CipherTalk phones, and maintains the CipherTalk IP connections worldwide. The CipherTalk phones communicate only with the CipherONE Secure Connect Network. The CipherONE Network securely relays the encrypted talk or text between the CipherTalk phones, providing anonymity of who is calling whom and their locations. This relay process does not affect the encrypted talk or text communications, which are encrypted and decrypted by the CipherTalk phones only.

The second information gap to ensure anonymity is between the CipherTalk phones and the end-users. The end-user does not have to provide any personal or subscriber information to make a secure call even when using GSM data services. This allows an organization to hide the end-users of the CipherTalk phones, separating the users of the phones from the procurement of the phones, which provides invisibility and anonymity of the end-user.

The third information gap is that TCC’s technology hides the encrypted communications. As the encrypted communications are undetectable, they cannot be seen and therefore intercepted or blocked by the outside world. See Figure 1

Figure 1: Three information-gap infrastructure for anonymous secure CipherTalk call/text communications.  Click image to enlarge

Learn more about the military-grade CipherTalksecure smartphone or contact us at


Wednesday, November 4, 2015

Universal, End-to-End Encryption for TCP Performance-Optimized Satellite Networks with the Cipher X® 7211 IP Encryption System

Satellite performance, particularly for Transmission Control Protocol (TCP), is adversely affected by the long round trip delay (over half a second) associated with geostationary high earth satellites. Many satellite equipment vendors have developed techniques to minimize this impact on users; one common technique is the use of a TCP proxy for TCP Acceleration. Application(s) requiring strong end-to-end protection using an installed satellite system with TCP Acceleration, however, have a problem. Use of a Layer 3 or 4 IP encryption system to implement end-to-end security is incompatible with TCP Acceleration techniques utilized by satellite gear unless the encryption system is specifically designed to handle this situation. TCC has developed the Cipher X 7211 IP encryption system with innovative TCP Stream Encryption operating to properly handle these optimizations seamlessly.

Our white paper, which is available for download, provides an overview of satellite communication performance limitations and how a TCP proxy operates to counter the limitations. It then describes TCP proxy incompatibility issues with Layer 3 or 4 end-to-end encryption systems, and how TCC’s Cipher X 7211 IP encryption system with TCP Stream Encryption enables end-to-end security for TCP performance-optimized satellite networks.

TCC’s Cipher X 7211 IP encryption system with innovative TCP Stream Encryption supports TCP Acceleration performed by satellite networking gear. As a result, users of TCP performance-optimized satellite networks no longer have to sacrifice performance to implement end-to-end security. The Cipher X 7211 encryption system operating at Layer 4 includes features to work with and take full advantage of the special capabilities often incorporated into satellite gear for network performance optimization. Further, the Cipher X 7211 encrypts satellite and other transport media, including hybrid networks, and operates independently of the network provider and equipment.

Download the white paper to learn more.

End-to-end transport-agnostic WAN security with TCP performance-enhanced satellite networks


Thursday, August 6, 2015

On-Demand Webinar: 360 Degrees of Data Security Know-How Made Easy

VPN, secure email, access control, edge encryption ... the list goes on. What are the differences among data security capabilities and what should you implement in your organization to protect your information onsite, across locations, with remote employees and with customers, suppliers and partners?

This complimentary, 1.5 hour non-technical webinar taught by a cryptography expert will:

  • Provide a high-level technical understanding of data encryption and security
  • Walk through a company scenario with diverse applications and activities while describing security threats, options & best practices
  • Arm you with the knowledge to identify security needs, understand available security solutions, and be confident that the right security issues are being addressed for your business

Curriculum Detail

Encryption technical foundation. Overview of the basic concepts of encryption, keys and passwords, integrity & hashing, authentication & signatures, and public key infrastructure.

Data security solutions and their applications. Covered areas include access control, secure email, file encryption, voice security, firewalls, virus/malware, intrusion detection system, edge encryption, virtual private network and e-commerce.

Securing activities inside the LAN. Learn about access and logging in, and securely sending/receiving email files. Also, understand risks and protection for wireless LANs, as well as security for databases, shared folders and Internet browsing.

Protecting the LAN perimeter. Outlines threats and security measures to protect the boundary between the trusted LAN inside and outside such as firewalls and intrusion detection systems.

Encrypting the wide area network. Bulk and protocol sensitive encryption devices are explored and compared to secure multi-site communications.

Communicating securely outside the core network. Discusses the differences of securing remote employees with uncontrolled remote access and securing partners, contractors and customers. An overview of VPN and application security options are provided.