top of page
  • Writer's pictureThe DigitalBank Vault

Europol copied the data extracted from 120m EncroChat messages and tens of millions of calls


Europol copied the data extracted from 120m EncroChat messages and tens of millions of call recordings, pictures and notes, then parcelled it out to national police forces. The flood of evidence of drug trafficking and other offences drowned out qualms about the implications of the operation. The hacking operation that turned EncroChat phones into mobile spies acting against their users has important similarities with surveillance malware such as Pegasus.

Lawyers from Germany, France, Sweden, Ireland, the UK, Norway and the Netherlands, all representing clients caught up in the aftermath, met in Utrecht in November 2021. They found that cases were being built across Europe based on evidence of which authorities were unwilling to reveal the provenance. “Investigators and prosecutors were hiding or deforming the facts,” said the German attorney Christian Lödden. “We all agree that these are not the best people in the world, but what are we ready to sacrifice in order to convict one more person?”

EncroChat clientele included non-criminals, people such as lawyers, journalists and business people. The Dutch attorney Haroon Raza was one of them and said he bought an EncroChat handset at a phone shop in Rotterdam. He demanded that his data be erased. “As far as I could understand, a copy still lies in Europol’s databases where it could remain forever.”

French lawyer Robin Binsard is convinced that the whole operation amounts to mass surveillance. He said: “Dismantling a whole communication system is like the police searching all the apartments in a block to find the proof of a crime: it violates privacy and it’s simply illegal.”


Offline “ Air Gapped” Super Encryption Mobile Machines.

Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.

Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.

More Secure than a Face To Face Meeting.

More details?

Consult with our

Cyber Defense Experts at :


Offline “ Air Gapped” Super Encryption Mobile Machines.


Offline “ Air Gapped” Super Encryption Mobile Machines.

Full technical details:

ENCRYGMA Mobile Encryption Machine Specs
Download PDF • 1.76MB

Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: .

“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 


Rule number 1 ☝🏼:

EncroChat evidences has been collected from the storage on the devices seized . A real military grade encryption device can’t be ever accessed by any digital forensic tools such as Cellebrite.

Rule number 2 :

Never 👎 use encryption services that are server based . Servers can be hacked easily and all data passing through them can be intercept. Servers also store the messages so that also this cloud based storage can be accessed and used as evidence.

Rule number 3:

Never , ⛔️ ever trust their party encryption services. The moment you trust a third party for generating your encryption keys, manage and store them for you , it’s game over . It’s like giving the keys of your bank vault to a total stranger .

Rule number 4 :

Stop 🛑 trusting cheap online encrypted phone suppliers! ⚠️ The garbage online are fake encrypted phones based on a $ 50 USD cheap Android cellphone bought in China and installed with a very low level security end to end encrypted messaging app.

Work like a pro, like intelligence agencies do ! Stop being scammed by online marketers selling you security illusions .

Need absolute privacy? Consult with our cyber defense advisors at info@DigitalBank.Capital or visit

Cyber War Ultra Encrypted Communications.

This is an encrypted text message, that has been encrypted with an OTP cipher (quantum safe encryption- mathematically unbreakable) , on a DBV “ Air Gapped “ Offline SuperEncryption Machine. The Encrypted message is then exported from the offline device by visual means( no connections , not even physical) by scanning the QR code with an online device for then sending it safely online.

The QR code at is arrival, is scanned by the second DBV offline encryption machine , directly from the receiving online device. Afterwards , it’s deciphered safely offline. This form of super encrypted offline communications is safer than a face to face meeting .

More details? Consult with our cyber defense advisors at or visit

19 views0 comments


bottom of page