Copy

Your Telephone Number Is More Vulnerable Than Your Social Security Number....switch to EFANI!

Efani works like any other carrier. We provide you with a SIM Card that you can put in your phone. We’ll replace your existing monthly plan with ours on America’s #1 Carrier that covers 99% of Americans on the fastest 4G Network.

Our core competency is providing military grade protection against any kind of SIM hack. Efani’s protections can be thought of a series of firewalls that exist to protect your SIM card.

We’ve insured our system with a $5 Million USD worth of loss coverage to provide every user with peace of mind. If you’re an enterprise, we perform complementary on-site security audits.

Our claim is that we have the best level of sim security to protect our customer data as well as any sim port-out hack attempt. Our entire company is built around this promise. But hey all’s well till it’s not. While technically it’s impossible to build a system that’s un-hackable, but we’ve built a standard operating process to make it practically unhackable. We’ll briefly share a few of the steps we’ve taken to ensure protection that we promise 

#1 – We store our data in silos across multiple servers on multiple locations which are only accessible by multi-factor authentication of multiple users. This means we’ve spread our risk with no single point of failure

#2 – Our data storage centers are all ISO 270001:2005 SSAE 16 certified 

#3 – Data is E2E encrypted with zero-level authentication implemented 

#4 – We’re always using a private VPN using state-of-the-art cryptography, like the Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24, HKDF, and secure trusted constructions 

#5 – We keep our keys locked in cold storage & use multi-signature keys for any change 

#6 – Every employee goes through a rigorous background check with no criminal history. It’s equivalent to top-level security clearance 

#7 – Data access is limited to single IP which can’t be accessed outside USA

 #8 – For any major change which include allowing a number to be port-out have to be approved by multiple parties and through a manual process 

#9 – We go through a minimum of 7 layers of authentications for a user to port-out. In majority of the case up-to customer discretion, he can chose up-to 11 layer of authentications. These authentications are random to protect any malicious attempt 

#10 – Minimum of 7 days cool off period before a port out is initiated

#11 – We also use PGP encryption if the customer requests it 

We’re happy to go through an audit of customer choice on customer request & open to any kind of security challenge test. 

Reply or check us out to learn more about the options for securing your phone, digital wallet, and or work from home device.

Thank you,
Brian Asingia
Principal DreamGalaxy Advisory

Copyright © 2020 Brian Asingia, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp
Facebook
Twitter
Website
Email
Instagram
LinkedIn