top of page
  • Writer's pictureThe DigitalBank Vault

Jared Kushner and Ivanka Trump Ultra Encrypted iPhones for Top Secret Ultra Encrypted communications

Updated: Mar 18, 2023

Ivanka Trump and Jared Kushner, two prominent members of the Trump administration, have reportedly been using modified iPhone models to communicate privately and securely. According to reports, the devices are equipped with an integrated hardware encryption engine and unique encryption algorithms, creating a closed and private communication system that cannot be deciphered by any government, intelligence agency, or state-sponsored hackers.

This level of encryption is unprecedented and represents a significant challenge to those seeking to monitor or intercept communications between the two individuals. The technology used in these devices is said to be immune to digital forensic extraction tools and impervious to online and offline hacking attempts, making it an almost impenetrable barrier for those attempting to access the information exchanged between Trump and Kushner.

The use of such devices raises serious questions about the privacy and security implications of high-level government officials using untraceable and unmonitored communication methods. While the use of encryption technology is not new, the degree of encryption used in these devices is of a level that has not been seen before.

The devices are said to be modified versions of existing iPhone models, and it is unclear who carried out the modifications. The use of such technology by government officials also raises concerns about the potential for abuse or misuse of such secure communication systems.

There are also concerns that the use of such devices may violate federal record-keeping laws. The Presidential Records Act requires all official communications to be preserved for historical purposes, but if communications are carried out through encrypted channels, there may be no record of them.

In conclusion, while the use of high-level encryption technology may provide a level of security and privacy for government officials, it raises important questions about transparency, accountability, and the potential for abuse. As technology continues to advance, it is essential that policymakers consider the implications of such advancements and strike a balance between privacy and security, while also ensuring that the principles of transparency and accountability are upheld.

DigitalBank Vault ® SuperEncrypted

Mobile Cipher Machines

Data Cyber Defense Technologies

Desktop and Mobile

Encryption Machines

Anti Interception

Anti Espionage

Anti Hacking

Anti Spyware

Anti Location Tracking

Anti Forensic Data Extraction

Anti Tapping

Anti Remote Digital Surveillance

“ Air Gapped” iPhones.

Mobile Encryption Machines :

The Highest Level of Cyber Defense for Secret Critical Data.

Mathematically Unbreakable Quantum Safe Encryption


Ultra Encrypted Communications


Used by Billionaires, CEOs, VIPs, Celebs, Royals, WallStreet Sharks, Bitcoin Whales

If you need to communicate top classified information, transfer secret data or store sensitive files , you need an Anti Espionage and Anti Interception ENCRYGMA.COM Cipher Phone .

The ENCRYGMA.COM Mobile Cipher Machine is an above “Government Level”, Quantum Safe Encryption, mathematically uncrackable, no matter how much computational power is applied.

The Above Video has been posted by hackers that tried to extract information from our iPhones, in a "physical" way, by taking apart the device and trying to retrieve the data , directly from the chip that integrates the DBV Hardware Encryption Engine.

Consult with our

Cyber Defense Experts at :

Visit us today at :


Offline “ Air Gapped” Super Encryption Mobile Machines.


Offline “ Air Gapped” Super Encryption Mobile Machines.

How it works ? Watch the video below 👇

Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: .

“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 

Penetration testings:

“Untraceable, Near to UnHackable, ‘Perfect Secrecy’ Communications, more secure than a face to face meeting “ : Modus Operandi of Top secret ultra encrypted data transfer between two remote Offline Cipher Machines.

Imagine this “covert communications” scenario : Bob wants to send Alice an extremely confidential text message.

He is encrypting the message on his Air Gapped ( Offline) Mobile Encryption Machine . The encrypted message is transformed into a QR Code, then with an online connected device , Bob scan the QR code generated from his offline encryption machine .

This QR code containing the encrypted message is then posted by Bob’s online connected device, on an anonymous Instagram account that is then visited by Alice, who owns the same Offline Cipher Machine .

Alice then scan the QR code from the Instagram post and decipher it , totally offline, on her own encryption system that is powered by the same set of encryption algorithms of Bob’s system.

What just happened here is called “ Perfect Secrecy “.

✅ An OTP Ciphered information ( mathematically uncrackable encryption)  has been delivered to a remote receiver without  ever sending the receiver , directly, anything.

✅ Leaving no direct digital trace online of any type of communications between the two parties .

✅ All the encryption and decryption process happens on disconnected devices , therefore any online cyber attacks are near to impossible.

✅ Encryption Keys 🔐 used, are freshly created for each individual communication session , generated by the user, never stored on the device or ever exchanged with the receiving party.

✅ All data is permanently erased from the offline cipher machines.

Cyber Defense Advisors ✅

WhatsApp/Telegram/Signal/Viber +372 5734 7873

More details about our Military Encrypted iPhones , please visit :

Cyber War Ultra Encrypted Communications.

More details? Consult with our cyber defense advisors


or visit

Visit us today at :

90 views0 comments


bottom of page