Skip to main content

How It Works

Salt & Phrase Authentication: Your unique Salt & Phrase combination is your key to access. Memorized by you, stored nowhere else.
Stateless Operation: Since the device stores no data, there’s no need for passwords. Authentication is secure and immediate.
Alias System: Register a unique alias on a decentralized blockchain. No phone numbers—just secure, untraceable identities.
Private Key Verification: Only devices with embedded private keys can connect to the Bitfi network, ensuring all participants are authenticated.
Independent Encryption Initialization: Both caller and recipient devices independently randomize encryption keys for each call, which are never reused.
KDF-1, KDF-2, KDF-3: Advanced key derivation functions ensure robust, unique keys for every session.
MEDIA.async360 & APP.async360: Proprietary applications handle voice and text with top-tier encryption methods.
Bitmap Text Rendering: Text messages are converted into bitmap images in real-time, leaving no text data in memory.
Instant Data Purge: Ending a session triggers an immediate wipe and overwrite of all data.
Device Reversion: Post-session, the device is indistinguishable from a brand-new unit—no residual data, no traces, nothing to exploit.

Salt & Phrase Authentication Workflow

Flow diagram of the Salt & Phrase Authentication Workflow. Steps: 1) User enters Salt & Phrase. 2) Device uses 'KDF-1 (scrypt + BIP32)' to derive a unique private key without storing data. 3) Session is initiated with temporary keys, displaying 'Access Granted.'

Unrivaled Physical Security

Tamper-Proof Construction: The resin-filled casing prevents any physical access to internal components. Attempting to open the device results in irreversible damage.

No External Interfaces: Absence of data ports and wireless interfaces like Bluetooth eliminates common intrusion points.

Locked Firmware: The firmware is permanently fixed, preventing any updates that could introduce vulnerabilities or alter device behavior.

Operational Simplicity with Maximum Security

Two Functions Only: Designed exclusively for calling and texting, reducing complexity and potential security holes.

User-Friendly Interface: Despite its advanced security features, the device is intuitive and straightforward to use in high-pressure situations.

No Learning Curve: Personnel can operate the device effectively without extensive training.

Invisible Communication

No Metadata Leakage: Proprietary UDP packet handling ensures that no metadata—such as IP addresses, locations, or timestamps—is exposed.

Phantom Protocols: Network traffic is obfuscated, appearing as random noise to any observer, thwarting analysis or interception attempts.