How No.1 BC: Bits chat works

Getting ready

Circle of trust

Communication within No.1 BC: Bits is possible only between people, who have active No.1 BC card and installed No.1 BC: Bits application.

Your contacts

Your contact list is your circle of trust. Only users with whom you personally exchanged contact details will be able to communicate with you. Only people who you allow to contact you will be able to reach you. There are no unknown number communications.

Your contacts

Select the Options icon

Select New Contact option

Enter all required details and Save it

Your contacts
Initiating a chat

Select the contact and then select Start Chat option. You will be requested to enter your PIN number to launch a chain of encryption processes. You need to enter PIN every time you start a chat, call or send a file via No.1 BC: Bits.

Why enter PIN

Every time for every communication session No.1 BC: Bits generates new keys. PIN number serves as an authenticator to verify if the user really is the card owner and really has an intention to encrypt some information.

Why enter PIN
Initiating a chat
Initiating a chat
Initiating a chat

System on-card-generated pair of asymmetric keys is used to encrypt and transmit one-time random encryption key.

Public key is sent to another user to encrypt data. Public key may be sent to as many users as you need. Private key (used only for decryption) always stays locked on-card and is never copied outside of the card. Each No.1 BC: Bits user has own unique pair of keys. Unique private key is always kept secret and protected with PIN.

Connecting
Connecting

This window hides all actions behind the scene.

Chat invite
Chat invite

To accept the chat invite, user needs to enter card PIN which unlocks card encryption functions.

Enter PIN

When PIN is confirmed the System generates one-time random key, which will encrypt only this particular conversation.

Enter PIN
Random one-time key

Each new chat conversation, voice call or file transfer session will have own one-time randomly generated symmetric key.

Random one-time key
Encrypting conversation key

User, who aceepted the chat invite uses chat initiator’s public key and encrypts the session key. Encrypted package is sent back to chat initiator.

Encrypting conversation key
Decrypting response

Chat initiator gets encrypted package as a response to start a chat. Using the private key locked on-card the System decrypts session key, which will be used only for this particular conversation.

Decrypting response
Decrypting response
Unlock
Decrypting response
Decrypting response Decrypting response

Encrypted channel

Established connection

Now for this conversation both users have encryption keys. They communicate securely knowing that all information is encrypted on one end and decrypted only on another end. The door is locked for outside world.

Established conection

Encrypted communication

If there was a way to show what happens behind the door, we, probably, would

…and yes

men-in-the-middle are not invited

Only people who have encryption keys and No.1 BC cards can open and lock the door

Security as a service

Men-in-the-middle, intelligence, survaillance, bad guys and other data hunters from whom you cannot hide, because they are everywhere, will not see a bit of your information. No.1 BC: Bits has got you covered in:

  • chats
  • calls
  • files

With No.1 BC: Bits military-grade encryption is in your hands and it does ensure high security level of your communications.

Real digital privacy

In cyber space information cannot be shredded like an old newspaper. The best way to protect communication known by now is to encrypt it. Encrypt your phone calls. Encrypt your chats. Encrypt your file transfer. Use No.1 BC: Bits.

strong encryption

strong encryption

affordable subscription

affordable subscription

No.1 BC communications

Talk to one of our sales partners. They will help to set everything up and will guide you through subscription process. They will also give you all instructions how to use it and when to renew subscription.