Certified Offshore large scale infrastructure. (Servers are in Iceland and Switzerland)
 Servers are not in located in United states, Canada, or the Netherlands for maximum privacy & security
-Free unlimited support 24/7 -365 days per year which is included:
 Free secure wipe if phone is lost or stolen just by emailing or calling us.
-          Generate your own Key Passwords, store photos and take pictures that are also locked and encrypted with PGP /MIME technology allowing any attachment to be attached and secured with a PGP/MIME which is much stronger than S/MIME alone.  S/MIME should always be encoded with PGP ECC or PGP AES

Our Infrastructure - (Blackberry Enterprise Server 12.4)
My BlackBerry® devices are all connected to dedicated BES servers. This implies that the protocols set on the BlackBerry® devices are designed for full protection. It is by no means possible to intercept or decrypt any data coming from our handsets
Uncompromised Security
Client Anonymity
Military-Grade Encryption
Private Closed-Loop Network
& also open loop network.
Unlimited Roaming
Secure Offshore Servers
24-Hour Technical Support
Wipe Your Device Remotely
Automatic 3G/4G Network Connection


Phatberrys Blackberry devices are known for there high data security that they provide. This is achieved through encryption and decryption of data, such that even when intercepted, it will be of no use to the interceptor because it will be unreadable and meaningless. To have a better understanding of how it works, a more detailed and technical explanation is given below.

How PGP works

Pretty Good Privacy (PGP) is mainly for encrypting messages. PGP encrypted BlackBerry uses an AES-256 bit and 4096 bit PGP public and session keys on your Blackberry devices to do the encryption. The procedure used in making the encryption process a success is described below.

1. Compression

The plain text message that you compose is first compressed. The importance of compressing is to save transmission time as well as to strengthen the encryption security. It does so by reducing the patterns found in a plain text, which cryptanalysis would otherwise take advantage of to try to decrypt.


A random but unique one-time 4096-bit key is then created by PGP, which is used to encrypt the email message via AES – 256 algorithm, creating a ciphertext. The encrypted text will appear as random letters, numbers, and symbols.


After encryption of the data, the session key is also encrypted with the public key of the recipient. The encrypted keys and text are combined into one message before sending the message so that they are both sent as an encrypted package. PGP will encrypt the session key with the public key of the intended recipient. A unique phantom email address is used to store this public key.


you click on send, your Blackberry will make a secure connection that is AES-256 encrypted, to the Phaberrys Secure offshore network. Your encrypted message will then be sent to an offshore network while it traveling it is still Encrypted Throughout the transmission, your message will remain encrypted until it reaches the desired recipient then the msg can be opened and
The same channel will be used to deliver the message to the recipient, from the Phantom offshore network. The network does not save information passed through it. It also monitors any suspicious activities from any outsider decryption we have computer engineering experts that monitor for such things as fake cell tower redirection sting rays and all other technical and mathematical interception technology we are very aware of what government organizations technology and methods used that's why at Phatberry’s we Stay encrypted and make sure our clients security come first at all cost

  1. Decryption

    The PGP of the recipient will then use the pass-phrase and private key of the recipient to decrypt the temporary session key, which is in turn used to decrypt the encrypted text. A pass phrase is essentially a longer version of a password. Sending a message is possible only from a Public Key of an email to the private key that corresponds to it.