top of page
Screenshot (1518).png

​

Enter the Lucrative Encrypted Phones Business  in just days!  

TRY FOR FREE NOW and Go Dark with Peer-to-Peer, Untraceable Communication. 

 

BUILD YOUR PRIVATE ULTRA ENCRYPTED PEER TO PEER COMMUNICATION NETWORK

AND START SELLING ENCRYPTED PHONES AND SUBSCRIPTIONS.

​

Unlock the Lucrative Business of Encrypted Phones 

 

Transform any Apple iPhone

or Android Phone

into a fully encrypted cellphone

in just a few minutes!

​

NOTHING TO DOWNLOAD!

 

GO DARK!

USE ANYWHERE!

​

No Data Stored Anytime .

No Digital Trace Online.

 

Anti Interception.

Anti Surveillance.

Anti Espionage.  

 

No Servers involvement.

100% Peer to Peer

Ultra Encrypted Communications. 
 

Anonymous, Unbreakable, Untraceable, Impenetrable, SuperEncrypted Video/Audio Calls, Instant Messaging, File Transfers. 

 

Working on all Android Phones, Windows PCs, ChromeBooks, iPhones, iPads, MacBooks, iMac PCs. No App to Download .

​

Untraceable Anonymous Encrypted

Voice and Video Calls

 

Undecipherable Text

Messaging Chat

​

Ultra Confidential Chat

 

100% Secure File Transfer

and Storage

​

​

Do NOT Trust Any

Encrypted Phones,

Use Your Own Devices!

​

​

TRY OUT THE AVVO ULTRA ENCRYPTED

COMMUNICATION NETWORK!

​

For Trials, contact us and we will open for you a username: 

​

CONTACT US AT

 

Agents@DigitalBankVault.com 

​

or 

​

By Whatsapp , Telegram or Signal :

​

+37257347873

​

​

If seriously Interested , we can built for you a similar system, under your full control and management , under your own domain name, and this tech will be owned by you forever.

​

Install it on an unlimited numer of devices.

Cash into the booming business of crypto phones.

​

​

 

HOW IT WORKS ?

​

All Details Here Below:

​

Read Carefully all the Info 

Learn How to Create your Own 

Top Secret Encrypted Phone 

​

STEP ONE: 

​

Go To 

https://avvo.club/

​

​

​

Click on the Menu and choose "Login"
The Anonymous username and password is needed for blocking unauthorized users from accessing the communication network, however this is a  100% Anonymous Platform,  without any third party servers involvement. 
 

This Peer to Peer Private Communication Network, can be accessed from any web browser, from any device  with internet connection ( smartphones and PCs). 

To give a general idea , is functioning like Zoom or Google Meet, but the difference is that it does not use servers, and all communications are between devices and encryption keys are generated by you, never stored anywhere, and never exchanged with third parties ! 

 

USE ANYWHERE

LEAVE NO TRACE

​

NO HISTORY.

NOTHING STORED.

NOTHING TO HACK.



 You access the Private Network by  
Just clicking on

 
https://avvo.club/


1. Insert your own "Secret Pass Phrase",  that is something you decide on the spot, and this secret phrase you invented, is creating the "One Time Pad" random encryption keys to the current communication session,  and connects your device to the other party device with whom you communicate and that is using the same exact secret passphrase. This "code name" creates on the spot your own personal, dedicated, closed super encrypted communication network. 

In the sample above, we entered as a pass phrase "Keep100" , of course you can write whatever you want, it's your own private keys to the call. 

Then click on the arrow ,
this will lead you to the communication platform .
 
IMG-3552.jpg
IMG-3554.PNG
You can then opt to mute the camera, in case you want only an audio call
and not a video call. 


Then you can click

Join

How to let your counterparts, you want to communicate with, to join ?

Either you send them a link ( explained below ) or you just pre-share with him, a time when he enters the webpage. Remember that they need to be also registered on the network , otherwise he will not be able to connect. 


https://avvo.club/

They need  connect with their username and password ,
then insert the pre fixed secret "pass phrase" you agreed upon, beforehand.  




All communications are Peer to Peer, between your two browsers ( therefore between two devices) , with no servers involvement.

It's SuperEncrypted, end to end, and encryption keys has been generated by you, on a one time basis, at the end of the session, everything is permanently erased, leaving no online trace or any kind of digital trail, anywhere.  No data exchanged is ever stored so that any type of digital forensic tool can ever extract any data from the device .


Security Tips:  do not use your regular smartphone or laptop, they may be infected by spyware already!

Use a new dedicated device that will be always kept offline, and get online only when you need to communicate.

Do not use that dedicated device for anything else and do not download to it any apps. 

Remember that you can always opt to use each time a new device, you
borrow from someone, because there is nothing to download and everything is erased anyway. 


 
IMG-3556.PNG
You can make video calls, audio calls and also send text messages and files , by using the left chat bottom.

You can
send an invitation link by clicking the + button ,

you can mute the audio, or the video,

and by clicking the red bottom on
you can end the session. 


 
IMG-3557.PNG
IMG-3070.jpg
Screenshot (1514).png
Advantages: 

1. You use your own devices so that you do not have to trust any thrid party "encrypted Phones" 

2. Peer To Peer Ultra Encrypted Communications, no server involvement, 100% anonymous, leaving no digital trace online or on the device used. 

3. Nothing to be ever installed, it runs on any web browser, it  is "cross platform", it can be used on any device Android, Apple, Windows , covering all PC, laptops, tablets and smartphones. 

4. Encryption keys generated by the user , on the spot, never stored anywhere and never exchanged with the communicating party. The Passphrase that is creating instantly the Encryption Keys, can be changed as much as you want, the best is never use the same passphrase so that you create an OTP Cipher ( One Time Pad Cipher) that is mathematically uncrackable. 

 
Screenshot (1516).png
What is The Passphrase? Your Pre Shared Secret  

The Passphrase used on the Avvo SuperEncryption system, is not a password, and it does not grant ‘entrance’ to a platform. This is a secret phrase invented by you, that is creating on the spot, with the combination of our algorithm, the encryption keys, used for encrypting and decrypting the communications.

You can change the passphrase as much as you want, each time the passphrase changes, it will create new encryption keys.

So ‘ how does the communicating party get the right passphrases to use for decrypting/encrypting the files exchanged ?

’ This is called in the intelligence community “ Pre Shared Secret”. You need to pre-fix beforehand , a list of passphrases to be used between you.

It can be changed daily, hourly or on every encrypted file exchanged.

How do you fix this pre-shared secret in a ‘secret’ way, without
taking the risk of being exposed?

You can to find ways to convey it to the communicating parties?

There are hundreds of creative ways to exchange passphrases and fix random pre-shared secrets. For security reasons we will not disclose them here, this is classified information we release to the buyers of the Avvo systems.


 

CONTACT US

Thanks for submitting!

STEP BY STEP Guide to securing your top secret communications 

1. Buy a new dedicated device that you will use only and exclusively for the Avvo Network.

2. Never use that device for any other purposes, never download any app, do not use it for any cellular calls with sim cards, just for communicating on Avvo.  Download only a VPN you trust and a web browser you prefer, always use in in "incognito" mode. 

3. Under Settings Block all location settings , block nearby devices connections, bluetooth.

4. For internet connection, create a "personal hotspot' from your online device. Or buy a data SIM ( internet only cellular sim card) , you can buy those prepaid with the needs to leave any personal information , they are sold everywhere.

5. . Devices should be locked with strong passwords composed by
letters, numbers, symbols, etc... or by a long passcode( at least a
six digits pin number, preferably 8 to 10 digits )

6. Devices should be always completely shutted down (not on
standby) and turned on only and exclusively when needed for top
secret communications. Reboot few times a day if used continuously.

7. Do not use the devices in proximity to regular unsecured
phones, in case those ones are infected by a spyware, they can
register the voices in the room and even take videos, so that if
you speak on the secured phone and an unsecured phone is
present in the room, all your classfied conversations can be
recordered from the microphones of this infected phone.

Today, almost all the smart devices that surround us have a microphone:
watches, telephones, computers, wireless headphones, etc.
without neglecting the clandestine listening devices embedded in
various objects such as pens, cufflinks, or eyeglasses!

8. Check on a weekly basis for your device updates ( security updates,
operating system updates) and immediately install them.
Settings > General > Software Update


9. DO NOT browse the internet at all, use that browser just for AVVO. 

10. Only use trusted chargers, better not to charge through
cables, only wireless chargers and the ones you bougth from a
relaible source. Never use Charging Stations, not private and of
course not public. Do not borrow chargers from anyone, never. 

11. Don’t ever click on links received in messages, the person you are talking with may send
you a spyware that will infect your device.
Be Extra Careful with shared files. 

12.  IMPORTANT : better to erase your device completely once a week by going to
Settings > General > Reset , then tap Erase All Content and Settings.

Often reset your device, anyway Avvo is not an app you need to re-install, it is just a weblink.

We have more security tips to share, according to the device you will want to use, contact our cyber defense advisors for more details. 



 
IMG_8436.PNG
bottom of page