Skip to the content

NEW TO SCRAMBLE ??

If you just discovered SCRAMBLE or perhaps you received an email with a SCRAMBLED message attached and now need to download SCRAMBLE, you are just a few easy steps away from reading and replying to your message or creating SCRAMBLED messages of your own.

 

With SCRAMBLE your messages and content remain protected and with you.  CYPHYX never sees them and merely handles the authorization that a sender defines for how the receiver of the message can access it.  With SCRAMBLE your security and your privacy are protected.

 

Below you will find links to download SCRAMBLE.  What you are downloading is a stand-alone program that runs on its own and that you do not need to install.  Information that you provide to SCRAMBLE remains locally on your device and is protected to ensure full security.  Once you download SCRAMBLE and run it you will be provided a 4-step process to create a SCRAMBLE Pack, which is what we call the connect that SCRAMBLE will make to your email account.  SCRAMBLE uses your email account as merely a message conduit to send and receive your SCRAMBLED messages.  SCRAMBLE does NOT access, alter, or delete any messages in your email account except for SCRAMBLED messages, which are also stored outside of your normal inbox to ensure we do not clutter up your email account.

 

SCRAMBLE is secure, safe, and reliable.  At anytime, if you need help there is a Yellow Circle with a Question Mark that will take you to the online help resources.

 

Welcome to SCRAMBLE

 

 

 

 

 

 

Requirements

SCRAMBLE App is a stand-alone program that runs on your local device and provides access to your SCRAMBLED messages that are stored in your existing email account and not with CYPHYX

 

Currently the SCRAMBLE app runs on Microsoft Windows 7 and higher only with versions for Android, IPhone, Apple OS, and Linux in the works.

Downloads

Click to Download


 

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"

CYPHYX

12870 Trade Way Four
Suite 107  #665
Bonita Springs, Fl. 34135

Email. info@cyphyx.com