Bitcoin 284.53
$8,223.27 3.46%
Ethereum 3.58
$174.83 2.05%
Zcash 0.71
$36.56 1.93%
Monero 1.94
$56.07 3.46%
Tether 0.00
$1.00 -0.22%
Stellar 0.00
$0.06 0.64%
Mining and Safe Storage of Cryptocurrencies in a Single Device

CRPT Rating: 2.1

  • Team & Advisory Board
  • Product & Research
  • Idea
  • Marketing
  • Investors Security
View Detailed Rating Website

Mphone XR uses the AES encryption algorithm with a key of 256-bit and TwoFish. This is done to guarantee the reliability of the cipher. The encryption algorithm AES-256 is used in the state structures of the USA for encryption of information classified as SECRET and TOP SECRET. So, the use of a single encryption algorithm AES-256 already makes the information transmitted by MPHONE XR secure, and an additional overlay algorithm Twofish, give perfect 100% protection. Voice call security is ensured by a combination of multiple technologies and protocols. For signaling (for example, about the beginning of a call), the SIP TLS Protocol is used. The audio channel is protected using symmetric cipher AES/Twofish 256 bits, which is using ZRTP. The ICE Protocol decides which method to use for communication of subscribers: if the connection through STUN has passed, then P2P with ZRTP is used, if the proxy connection does not pass directly, then TURN with ZRTP is used.


Token Sale: 20 June — 20 January
Ticker
Token type
Whitelist
Min/Max Personal Cap
Accepts
Softcap
Hardcap

CRPT Rating (?) : 2.1


  • Team & Advisory Board
    • TEAM (1.9)
      • Leading Technological Experts (1)
      • Project Leader (2)
      • Development Team lead (1)
      • Marketing Lead (3)
      • Specification of experts work (1)
      • Experts Experience of in their spheres (2)
      • Presence of all necessary experts (3)
    • Advisory Board (2.5)
      • Popularity of advisors (3)
      • Expertise of advisors to the project profile (2)
  • Product Description & Marketing Research
    • Product Description (2.2)
      • Roadmap (3)
      • Detalization of product description (2)
      • Regularity of github commits (3)
      • Presence of product beta version (3)
      • Token description and role (1)
      • Discounts on goods and services (2)
      • Possibility of the project management via dao (3)
      • Devidents reception from tokens (1)
      • Buyout of tokens from investors (1)
      • Commision for tokens usage (2)
      • Profit calculation is present and adequate (2)
      • Financial plan detalization (1)
      • Tokens spending ratio (2)
    • Marketing Research (2.6)
      • Lack of competitors (3)
      • Lack of ready made products (3)
      • Presence of technological advantages (1)
      • The amount of financing attracted by competitors (1)
      • Dynamics of competitors growth (3)
      • Jurisdiction research (3)
      • Legal disclaimer for duties and obligations (3)
  • Idea (2.4)
    • Adequacy of the idea (3)
    • Originality of the idea (2)
    • Value of the idea for the community (2)
  • Marketing (1.8)
    • Website (2)
    • Social networks (3)
    • Marketing plan (2)
    • Marketing team (1)
    • Public presence of the team (1)
  • Investors Security (1.0)
    • Daico (1)
    • Decentralized escrow (1)



Short review
Number of team Members
Prototype
Team From

Add a Comment

Member of The Internet Defense League