
Cyph
Security through encryption.
Date | Investors | Amount | Round |
---|---|---|---|
investor | €0.0 | round | |
N/A | $520k | Debt | |
Total Funding | 000k |
USD | 2020 | 2021 | 2023 |
---|---|---|---|
Revenues | 0000 | 0000 | 0000 |
EBITDA | 0000 | 0000 | 0000 |
Profit | 0000 | 0000 | 0000 |
EV | 0000 | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x | 00.0x |
R&D budget | 0000 | 0000 | 0000 |
Source: Dealroom estimates
Related Content
Cyph is a secure communications company founded in 2014 by former SpaceX engineers and long-time friends, Ryan Lester (CEO) and Josh Boehm (COO). Their shared background in handling sensitive data at SpaceX and a mutual interest in cypherpunk principles fueled their mission to create accessible, powerful encryption for everyone. The company was notably inspired by the Edward Snowden revelations, which highlighted the need for user-friendly privacy tools. Cyph participated in the Mach37 Cyber Accelerator in 2014, securing an initial $50,000, and has since received backing from investors including the Goel Fund and the Center for Innovative Technology.
The company offers a suite of communication and collaboration tools, including chat, voice/video calling, file sharing, and encrypted cloud storage, available to both individual and enterprise clients. Its business model appears to be tiered, offering free access for basic use, alongside paid plans for individuals, businesses, and specialized sectors like telehealth, which includes options for co-branding and HIPAA compliance agreements. The platform operates on a centralized architecture, which allows for seamless, real-time synchronization of encrypted data across a user's devices.
Cyph's core product is distinguished by its patented technology designed to be exceptionally secure yet simple to use, even for non-technical users. A key feature is "WebSign," a proprietary technology that allows Cyph to be used securely within a web browser, a significant departure from other secure messengers that often require native applications to ensure cryptographic integrity. The platform employs end-to-end encryption for all private data and uniquely incorporates quantum-resistant algorithms to safeguard information against future threats from quantum computing. This technology has been audited by third-party security firms like Cure53 and presented at major cybersecurity conferences such as Black Hat and DEF CON.
Keywords: secure communication, end-to-end encryption, quantum-resistant cryptography, cybersecurity, private messaging, video calling, file sharing, cloud storage, telehealth communication, data privacy, WebSign, Mach37, Ryan Lester, Josh Boehm, encryption software, enterprise security, HIPAA compliant communication, secure collaboration, information security, data protection