top of page
  • Writer's pictureThe DigitalBank Vault

The information recovery from the EncroChat phones was achieved with a storage warrant

Updated: Jul 6, 2021

Adam Adler ( Miami, Florida) : The information recovery from the EncroChat phones was achieved with a storage warrant and not a transmission warrant.

Encrochat alternative ?

The "Encrygma"

€ 18,000

SuperEncrypted Phone

The Most Advanced Quantum Encrypted Communication System in the World.

Disruptive Offline Communication Tech

(No Internet or Cellular Connection)

Without any Servers involvement

Based on the Secret Tech "White Fog"

No data ever registered on the device or elsewhere.

Immune to:


Cyber Espionage

Remote Hacking

Spyware Infection

Malware Infection

Forensic Data Extraction

Ransomware attacks

Electronic Surveillance

You have two options , either you can buy the “Encrygma “ SuperEncrypted Phone , full details :, at € 18,000 Euros per device or create your own encryption device by installing our SuperEncryption systems on regular Android and Windows devices at € 5000 Euros per license.

DigitalBank Vault advantages Vs. SKY ECC, BlackBerry, Phantom Secure, Encrochat

and other 'secure communication devices'

1. One-lifetime fee of € 5000 Euro.

No annual subscription fees.

2. Encryption Keys generated by the user only.

Encryption Keys never stored in the device used or anywhere else.

Encryption Keys never exchanged with the communicating parties.

3. No SIM Card needed.

4. Unlimited text messaging, audio and video messaging,

audio calls, file transfers, file storage.

5. "Air-Gapped" Offline Encryption System not connected to the Internet.

6. No Servers involved at any given time, completely autonomous system.

No third parties involved.

7. No registration of any kind - 100% anonymous without username/password.

No online Platform or Interfaces.

8. Unique, Personal, Dedicated Set of

Encryption Algorithms for each individual client.

Totally Private Encryption System.

9. Air Gap Defense Technology:

The Only Offline Communication System in the World.

10. Working cross-platform on Android Smartphones ( No SIM Cards Needed)

and Windows PC ( for office work)

Contact us

for additional information at

Telegram: @timothyweiss WhatsApp: +37257347873 You can buy any Android device and Windows laptops and transform them into a powerful encryption device by installing our set of software. The process is simple , you buy your own phones and laptops devices , choose your most trusted company ( we always advise Samsung phones and Asus laptops , then you buy from us the DigitalBank Vault SuperEncryption System and install it on the devices you bought. If you need the encryption system just for storing and transferring classified files and data, you may need just one license ( it will work for four on both Windows and Androids). If you need to communicate between two people, you will of course need to buy two licenses. If your network of people you need to communicate with is larger , you will have to buy more licenses of course. Each client is receiving a dedicated set of encrypted algorithms that means that each company (client) has a different encryption system, therefore creating a closed private internal network. Each license costs € 5000 Euros. No recurring payments are required. It’s a one-time fee. No monthly payments. Remember that our mission is to help companies achieve total, absolute secrecy over their sensitive data storage, critical file transfers and securing their confidential communications. Feel free to contact us. For more in depth information we can have a voice call or video meeting. Our SuperEncryption systems are needed in case you really need the highest level of secrecy. Our technology is above Governments level , it’s the highest level of anti interception/ anti espionage tech available to the private sector. We sell only and exclusively to reputable companies and individuals that pass our due diligence and KYC procedures. Try for 30 days ( free of charge) the DigitalBank Vault SuperEncryption System. Transform any Android device or Windows Laptop into an Unbreakable Encryption Machine

More information? Visit our website at or email us at We will be happy to assist you in achieving total secrecy over your communications.

How to buy a DigitalBank Vault SuperEncryption system?

More details?

Why the DBV SuperEncryption system is safer than any other solution available in the market?

How does the DigitalBank Vault SuperEncryption technology work?

Defense counsel made the case that the warrants were inappropriate as the recovered data was being transmitted, as it had been copied from the phones’ DRAM and not their storage or ‘Realm’ as it was called.

This argument relied upon the transmission process including the preparation of the data being included in a message. Thus that data would be fetched from storage and copied into DRAM. There it would be used to construct a message and be formatted before being sent to the phone’s transmission hardware: radio chip and antenna. The justices ruled that “what was intercepted, was not the same as what had been transmitted because what had been transmitted was encrypted. It cannot therefore have been ‘being transmitted’ when it was intercepted: it can only have been ‘being stored’.” The ruling likened the extracted data to a “draft”.

No ‘technical terms’ in the 2016 Act

The Appeal Court justices disagreed with “expert witnesses” who explained that making a copy was part and parcel of the act of transmission, stating that while this might be true from an expert’s point of view, it was not the intent of the government when drafting the relevant Act of Parliament.

The judgment stated: “The experts have an important role in explaining how a system works, but no role whatever in construing an Act of Parliament. They appear to have assumed that because a communication appears in the RAM as an essential part of the process which results in the transmission it did so whilebeing transmitted’.

“That is an obvious error of language and analysis. It can be illustrated by considering the posting of a letter. The process involves the letter being written, put in an envelope, a stamp being attached, and then the letter being placed in the post box. Only the last act involves the letter being transmitted by a system, but all the acts are essential to that transmission.”

As the relevant Act defined only two states for data: being stored or being transmitted, then, if it was not being transmitted it was being stored.

The reasoning was as follows: Data in RAM is not being transmitted. It is necessary for it to be in DRAM for a message to be prepared for transmission, but the act of preparation is not the transmission. Therefore the data must be in a stored state and the warrant used to recover it was valid.

In other words, the common parlance meaning of storage takes precedence over the technical definition, despite the very technical issues at play.

4 views0 comments


bottom of page