Mining and Safe Storage of Cryptocurrencies in a Single Device

CRPT Rating: 0.0

  • Team & Advisory Board
  • Product & Research
  • Idea
  • Marketing
  • Investors Security
View Detailed Rating
No Image

Mphone XR uses the AES encryption algorithm with a key of 256-bit and TwoFish. This is done to guarantee the reliability of the cipher. The encryption algorithm AES-256 is used in the state structures of the USA for encryption of information classified as SECRET and TOP SECRET. So, the use of a single encryption algorithm AES-256 already makes the information transmitted by MPHONE XR secure, and an additional overlay algorithm Twofish, give perfect 100% protection. Voice call security is ensured by a combination of multiple technologies and protocols. For signaling (for example, about the beginning of a call), the SIP TLS Protocol is used. The audio channel is protected using symmetric cipher AES/Twofish 256 bits, which is using ZRTP. The ICE Protocol decides which method to use for communication of subscribers: if the connection through STUN has passed, then P2P with ZRTP is used, if the proxy connection does not pass directly, then TURN with ZRTP is used.


Token Sale

CRPT Rating (?) : 0.0


  • Team & Advisory Board
    • TEAM (0.0)
      • Leading Technological Experts (0)
      • Project Leader (0)
      • Development Team lead (0)
      • Marketing Lead (0)
      • Specification of experts work (0)
      • Experts Experience of in their spheres (0)
      • Presence of all necessary experts (0)
    • Advisory Board (0.0)
      • Popularity of advisors (0)
      • Expertise of advisors to the project profile (0)
  • Product Description & Marketing Research
    • Product Description (0.0)
      • Roadmap (0)
      • Detalization of product description (0)
      • Regularity of github commits (0)
      • Presence of product beta version (0)
      • Token description and role (0)
      • Discounts on goods and services (0)
      • Possibility of the project management via dao (0)
      • Devidents reception from tokens (0)
      • Buyout of tokens from investors (0)
      • Commision for tokens usage (0)
      • Profit calculation is present and adequate (0)
      • Financial plan detalization (0)
      • Tokens spending ratio (0)
    • Marketing Research (0.0)
      • Lack of competitors (0)
      • Lack of ready made products (0)
      • Presence of technological advantages (0)
      • The amount of financing attracted by competitors (0)
      • Dynamics of competitors growth (0)
      • Jurisdiction research (0)
      • Legal disclaimer for duties and obligations (0)
  • Idea (0.0)
    • Adequacy of the idea (0)
    • Originality of the idea (0)
    • Value of the idea for the community (0)
  • Marketing (0.0)
    • Website (0)
    • Social networks (0)
    • Marketing plan (0)
    • Marketing team (0)
    • Public presence of the team (0)
  • Investors Security (0.0)
    • Daico (0)
    • Decentralized escrow (0)



Add a Comment

Member of The Internet Defense League