Circle of trust
Communication within No.1 BC: Bits is possible only between people, who have active No.1 BC card and installed No.1 BC: Bits application.
Your contact list is your circle of trust. Only users with whom you personally exchanged contact details will be able to communicate with you. Only people who you allow to contact you will be able to reach you. There are no unknown number communications.
Select the Options icon
Select New Contact option
Enter all required details and Save it
Initiating a chat
Select the contact and then select Start Chat option. You will be requested to enter your PIN number to launch a chain of encryption processes. You need to enter PIN every time you start a chat, call or send a file via No.1 BC: Bits.
Why enter PIN
Every time for every communication session No.1 BC: Bits generates new keys. PIN number serves as an authenticator to verify if the user really is the card owner and really has an intention to encrypt some information.
Initiating a chat
System on-card-generated pair of asymmetric keys is used to encrypt and transmit one-time random encryption key.
Public key is sent to another user to encrypt data. Public key may be sent to as many users as you need. Private key (used only for decryption) always stays locked on-card and is never copied outside of the card. Each No.1 BC: Bits user has own unique pair of keys. Unique private key is always kept secret and protected with PIN.
This window hides all actions behind the scene.
To accept the chat invite, user needs to enter card PIN which unlocks card encryption functions.
When PIN is confirmed the System generates one-time random key, which will encrypt only this particular conversation.
Random one-time key
Each new chat conversation, voice call or file transfer session will have own one-time randomly generated symmetric key.
Encrypting conversation key
User, who aceepted the chat invite uses chat initiator’s public key and encrypts the session key. Encrypted package is sent back to chat initiator.
Chat initiator gets encrypted package as a response to start a chat. Using the private key locked on-card the System decrypts session key, which will be used only for this particular conversation.
Now for this conversation both users have encryption keys. They communicate securely knowing that all information is encrypted on one end and decrypted only on another end. The door is locked for outside world.
If there was a way to show what happens behind the door, we, probably, would
men-in-the-middle are not invited
Only people who have encryption keys and No.1 BC cards can open and lock the door
Real digital privacy
In cyber space information cannot be shredded like an old newspaper. The best way to protect communication known by now is to encrypt it. Encrypt your phone calls. Encrypt your chats. Encrypt your file transfer. Use No.1 BC: Bits.