FAQ

What is Qubits blockchain technology?

Qubits uses decentralised nature of the blockchain to build a secure communication network that can be used by individuals as well as by companies. The network is fully encrypted and relies on an authentication model in which users identify themselves and confirm each other’s identity through a series of blockchain transactions.

Our platform is decentralised through blockchain technology. Attacks on your sensitive data are impossible because crucial encryption keys are distributed among set of nodes. There is no single server or central point of failure or hack.

Qubits cyber security experts spent two years to create a blockchain, a crypto-encryption system and a complex key mechanism for a secure messenger. Qubits network works on the basis of internet technology, advanced mathematics and cryptography.

Why is Qubits better than competitors?

Biggest issue with competitors is that they ultimately rely on upon central servers that could be compromised by hackers (whether criminal or government agencies) or via court orders.

Traditional centralised networks are vulnerable by their design and implementation of outdated cryptographic models, encryption algorithms and ciphers. If the administrator forgets to apply patches and updates, the system can be vulnerable to security exploits by hackers. Hacks have already affected many major companies, and data breaches are becoming more common as information has become a valuable asset.
To address this issue Qubits has developed the secure messaging platform that no government can block, stop or spy on because all verification is based on blockchain technology.

Where centralised systems are referred to as trusted systems, decentralised systems are known as trustless systems. This might sound like a bad thing — trust is good, right? — but in a security and privacy context, trust is dangerous! In a trusted (centralised) network, you have no choice but to trust the central server — and the central authority which controls it. A trustless (decentralised) network is set up in such a way that you never need to trust a central authority to make the right decisions.

A decentralised, end-to-end encrypted messaging app is trustless because you do not need to place your trust in anyone when using it. Decentralisation makes it impossible for third parties to compel the network’s creator to provide information about users conversations and sensitive data, because in a decentralised system, the entity which created the network does not have the capability to collect that information.

You can never trust centralised networks to be private, secure, or safe from censorship.Even if the company in charge doesn’t want to violate your privacy, the simple fact that it’s possible to do so creates more issues. Governments or other third parties could compel the central authority to log conversations and hand over metadata against their will.

Is my data locally protected on device?

All kind of data is stored on the user device in a standalone encrypted local storage, independent from the base OS such as Android or iOS. Access to the data on а Qubits user’s storage is protected by QubitsID. QubitsID is a unique symmetric encryption key, generated locally on the user side through using various sources of entropy, including cryptographic hashes of user’s finger-motions, account private key and passphrase.

QubitsID provides the highest degree of uniqueness and avoids mathematical collisions. Thereby, even in case of physical leakage of protected database or the loss of control over the device, all sensitive data will be kept safe and untouchable. in Qubits cryptographic and security models we have implemented disruptive and innovative encryption and authentication technologies to prevent and recognise all kinds of “Man in the Middle” (MiTM attacks), and provide professional data protection on all levels, including local, (on user devices).

This means that attempts by any malware including the “State Trojan”, to intercept users’ data before it is encrypted on their devices — in other words any “MiTM” attacks — will be immediately eliminated by Qubits using a decentralised model of encryption-key distribution through Blockchain DPKi and a new kind of client-server authorization powered by Qubits ID wich is automatically created when registering an account in the Qubits Network.

Working together the blockchain DPKI authentication model and QubitsID technology guarantee genuine encryption keys authentication and ensure that all malware attempts, including state trojans to attack users’ devices and “swap” encryption keys will be detected by “Intelligent Intrusion Detection” system and timely notified to the user.

What are benefits of decentralisation?

Where centralised systems are referred to as trusted systems, decentralised systems are known as trustless systems. This might sound like a bad thing — trust is good, right? — but in a security and privacy context, trust is dangerous! In a trusted (centralised) network, you have no choice but to trust the central server — and the central authority which controls it. A trustless (decentralised) network is set up in such a way that you never need to trust a central authority to make the right decisions.

A decentralised, end-to-end encrypted messaging app is trustless because you do not need to place your trust in anyone when using it. You know that your conversations are anonymous and secure — no trust necessary.
There is no central authority to collect, sell or give away your conversation metadata.

Decentralisation makes it impossible for third parties to compel the network’s creator to provide information about users, because in a fully decentralised system, the entity which created the network does not have the capability to collect that information.

How secure are Qubits calls?

Qubits calls are as secure as Qubits messages. Qubits calls are end-to-end encrypted and they are tap-proof.

Is my Vault gallery encrypted?

Yes every content of vault gallery is encrypted and protected with QubitsID and users password

What is Qubits DPKI key management?

Qubits implements a new fresh approach by introducing AE (“Automated Encryption”) on Blockchain. The security model is built on true use of asymmetric cryptography (“End-to-End Encryption”) with decentralised authentication and public-key distribution. Users hold private keys on local devices when public key management is implemented via decentralised network of Blockchain Nodes.

Public-keys management, system and access administration is handled by an immutable decentralised environment (“DPKI”) governed by the DLT (“Decentralised Ledger”) consensus, therefore the public-keys cannot be altered, manipulated, or swapped for anyone else’s via Man-in-the-Middle attacks.

Each connected end-point device holds a lightweight Blockchain Node that is always in sync with the Enterprise Network by implementing Merkel-Tree algorithms. The endpoints are assured that the remote parties are truly authenticated which does away with an eavesdropper in the middle

Does Qubits have central server?

There is no central server in which your communications travel, no single point of attack or data collection. 

Does Qubits network use DNS services like competitors?

No… Qubits network don’t use DNS service in order to prevent to be compromised by governments or criminal hackers.

What about Qubits Advanced Cryptography

Qubits Secure Messenger implements the latest approach to cryptology, Elliptic-Curve cryptography, symmetric stream cipher (Salsa20/20), SHA3-512 Hash algorithm, and honours the professional approach to cryptographic protocols, for instance the usage of independent external key entropy sources. The implementation of post-quantum cryptology protects your data as never before

Which Qubits Blockchain Nodes are ?

The core of the QEP Blockchain Framework consists of the types of nodes described below:

1. Qubits Master Nodes
Master node is a block producer node for the Qubits Blockchain Framework. The main purpose of the QEP Master node is to collect transactions, bundle them into a block, sign the block, verify and broadcast it to the network. They are essentially the block producers for the underlying consensus mechanism.

2. Qubits Relay Nodes
Media Nodes will be responsible to support decentralised transport level for messaging, data exchange and real-time media streaming.

3. Qubits Registration Nodes
Is a public node which will be used to register new accounts and provide access to the QEP.

4. Qubits Repository Nodes
Network nodes where all data is stored in a decentralised and encrypted mode.

How does Blockchain work?

Blocks
A block contains data. The data could be financial transactions, medical records, data files, contracts, personal records, anything and everything which can be stored in a computer can be stored in a Blockchain. It eliminates the need for an intermediary.

Chronology and Hashes
Each block has a Hash (digital fingerprint) of its own, as well as the hash of the previous block a series of blocks one after the other, hence the name Blockchain. Each block in the chain verifies the hash of the previous block making it impossible to change the contents of the block.

Decentralized
A blockchain is decentralized and is running on a P2P network. Every node on the network verifies that each and every block is authentic, which makes replacing or altering the data within the blocks on a chain next to impossible

How was my blockchain private key created?

Your blockchain private key is locally generated during registration on the Qubits Network and encrypted with your Qubits account password and unique QubitsID. Your private key never leaves your device and is hold at secure Qubits user storage independent from base OS.

What is purpose of QubitsID?

Access to the data on а Qubits user’s storage is protected by QubitsID. QubitsID is a unique symmetric encryption key, generated locally on the user side through using various sources of entropy, including cryptographic hashes of user’s finger- motions, account private key and passphrase. QubitsID provides the highest degree of uniqueness and avoids mathematical collisions. Thereby, even in case of physical leakage of protected database or the loss of control over the device, all sensitive data will be kept safe and untouchable

Does Qubits use forward secrecy ?

Qubits uses true forward secrecy what means that every conversation generates unique session key which terminated after delivery for deeper protection of your chats.

Does Qubits have built in malware detection?

Qubits platform employs an intelligent intrusion detection system that detects and prevents the most dangerous interception attempts. Qubits uses smart intrusion detection system to detect suspicious activity on I/O ports and MiTM attacks that are only used by Qubits app.

Does Qubits use a standard system camera?

No we don’t use standard system camera because of lack of security.. Qubits uses a self-designed security camera that cannot be compromised by hackers or third party applications.

Are Qubits profile pictures encrypted?

Yes we also provide encryption for your profile picture and thumbnails.

What do the symbols next to a message mean?

Grey envelope - Message sent
The message was successfully delivered to the transport node. As soon the recipient is online message will be delivered and deleted from transport node. This status is also shown when the p2p connection between receiver device and sender device is broken.

Green envelope - Message delivered
The message was successfully delivered to the recipient's device; it has not yet been opened by the recipient, but a push notification was displayed. If the recipient has disabled read receipts, this status is permanent and persists even if the message was read.

Eye - Message read
The message has been read by the recipient. If the recipient has disabled read receipts, this status will not be returned.

Red envelope - Sending failed
The message could not be sent. This can happen, for example, when the network connection is interrupted during a file transfer. We also advice to check connection or restart application.

Timer icon - Message sending
The message is being sent to reciepnt. If this status lasts for more than a few seconds, there might be a connection problem. In this case, the message will stay in queue and will be sent as soon as the connection is up again . We also advice to check connection or restart application.

What is difference between Message Burn on main menu and inside conversation?

In the main menu setting for message burn is standard set to 14 days, that means that all messages will be permanently deleted after 14 days, including on the recipient side.

You also have the option to disable this feature or select a different time period. Within conversation menu settings it is possible to have messages deleted within seconds, minutes or hours.

Is it necessary to restart Qubits app after restarting my phone?

Yes, it is advisable to start Qubits app immediately after restarting your device to ensure that you will receive push notification of new messages.

Can I send encrypted picture and video with Qubits app?

Yes you can take and send encrypted pictures and videos within Qubits app by using our secure camera inside conversations. We do remind you that recording of videos consumes a lot of data and for that reason a limit is set for the duration of recording.

Whats is purpose of Qubits cryptocurrency (QBT)?

Qubits is blockchain based, transactions are required in order to interact with the platform to authorise and identify users access to public encryption keys. To facilitate these transactions, Qubits has developed its own crypto token called Qubits token (QBT).

QBT is a unique crypto-token designed for the new generation of encrypted instant communication networks . Every activation or renewal of Qubits account require charging account with QBT token. QBT tokens are charged by your sales agent.

How can I renew my subscription?

In the settings of main menu you have option Subscription Time. Here you can see the duration of your subscription and the balance of the QBT token. To extend your subscription, the balance must be topped up with the required amount of QBT token. Ask your sales agent to top up your balance and click the renew button.

What’s special about Qubits privacy protection?

Qubits was founded on the premise of bulletproof data protection. It is our primary goal to store only the absolute minimum of information for the shortest possible time («Privacy by Design»). In addition to using state-of-the-art encryption methods, we take all necessary technical and organisational measures to prevent unauthorised data access and misuse.

We only store data that’s absolutely necessary for the operation of the service, and we store it for the shortest amount of time possible.

We do not collect information from you

It’s not required to provide any personal information in order to use Qubits.