Qwantum Private Messaging is organized as a club, so that it can grow and flourish by attracting likeminded professionals that see value in privacy, do not intend to use the service for unscrupulous activities, have business needs to establish the authenticity and integrity of the documents and objects we rely on, and desire to trust with confidence those with whom we share sensitive or confidential information.

Our mission is to build a network of trust based on these timeless principles:

Privacy. Integrity. Authenticity.

Your Privacy Is Our Priority

Qwantum Private Messaging is a globally accessible app that delivers "Privacy as a Service" to its Club Members. Unlike other apps that offer encrypted messages, Qwantum Private Messages are secured with AES-256 bit symmetric encryption keys. The encryption keys are constructed on the principles of Qwantum Authentication, a process that first establishes ownership and possession of a Qwantum Card which generates unpredictable, one-time authentication values.

Qwantum Cards are immune to counterfeiting and spoofing. The one-time authentication values are used to facilitate key generation. The keys are unique per message, generated on demand, and seamlessly shared with authorized parties, yet unknown to anyone, even the Club Member, and they are never stored in our database. Qwantum Private Messages are immune from threat actors because the keys used to encrypt the data remain inside a host security module (HSM), are never shared or exposed in any way and theoretical attacks using Quantum computing are easily defeated since the encryption keys are not susceptible to factoring attacks.

Qwantum Private Messaging is not bio intrusive. It does not need your face, fingerprints, voice, DNA, or any personal data, to operate.

Why Should I Use Qwantum Private Messaging?

Club Members can use the application to encrypt almost any kind of data. The encrypted data can be saved to a file and stored locally, in the cloud, or in the Apple Wallet, wherever you choose. You can also redact, encrypt and replace sensitive data within a form or document. The Qwantum Private Messaging service can also send the encrypted data directly to your designated recipients by email. This powerfully secure service gives you the privacy and peace of mind you deserve with the convenience you need.

Qwantum Private Messaging can be used everywhere you have access to the Internet. It can be used with any operating system and any browser. It can be used on your mobile phone, tablet, or computer. If you value privacy, integrity, and authenticity, become a Qwantum Club Member, and protect your data now.

Benefits of Qwantum Private Messaging

Data privacy is under attack from multiple fronts. Data at rest and data in transit are vulnerable, particularly when the encryption algorithm and keys used to protect the data are now, or will be in the future, defeated by the power of Quantum computing. Threat actors are already stealing or exfiltrating data with the plan to decrypt later when the computing power becomes available. "Store now, decrypt later" becomes "Steal now, decrypt later". Qwantum Private Messaging provides a cost-effective strategy to mitigate risk and prevent data theft.

Qwantum Private Messaging works on mobile, tablet and PC/Mac

Go Mobile

Take Qwantum Private Messaging with you wherever you go. It's easy, secure and convenient. Keep your Qwantum Card in your wallet or purse and bring your small footprint Qwantum Reader with you. It can plug into any computing device with a USB port and if you leave it at home or the office, just use a Qwantum Member Token instead. A Qwantum Member Token is a virtualized instance of a Qwantum Card that each Member creates when needed. They work just like the Qwantum Card but have a limited life, provide mobility, flexibility and are easy to use.


Apple Wallet Integration

Member Tokens and Guest Tokens can be stored in the Apple Wallet giving the Member a convenient way to authenticate access while on the go, in the office, or at home. This allows the Member to easily organize and access a variety of tokens, which can be easily shared or used. All you need is an internet connection, and you are ready to encrypt or decrypt your messages and files from your iPhone.

For added convenience and speed, a hyperlink can be pressed to auto-launch Qwantum Private Messaging on your phone. An optional QR Code can be scanned to simplify use and eliminate the need to copy and paste from your phone to other mobile or desktop devices.

Private Message Tokens can also be stored. These are ideal for referencing short amounts of text such as URLs, usernames and passwords, credit card data, bank account numbers and other sensitive text.

Save Money

Qwantum Private Messages are sent over the public Internet and delivered directly to intended recipients. Only authorized parties can decrypt the data inside a Qwantum Private Message, and the sender of the message gets to control access and also receives audit reports of all decryption activity. This is much like a tamper evident, sealed envelope that is hand delivered by courier to an authenticated recipient. Delivery time is almost immediate, unaffected by weather or other disruptions that hinder overnight delivery services and eliminates expensive delivery charges associated with delivering physical documents.

Furthermore, Qwantum Private Messages are tamper resistant and tamper responsive since the encrypted data cannot be manipulated. The Qwantum Service automatically generates a secure file hash of the encrypted data and delivers the hash to the sender as part of their message created audit report. The Qwantum Service then automatically generates a secure file hash of the decrypted data and again delivers the hash to the sender as part of their message decrypted audit report.

This powerful system provides proof of delivery and includes date, time, location (if required by the sender), along with other transaction information necessary for audit and compliance matters.

Supported Operating Systems

  • Windows
  • iOS
  • Mac
  • Android
  • Linux

Native Apps and Browsers

  • Qwantum Private Messaging for  iOS
  • Qwantum Private Messaging for  Windows
  • MagneFlex by MagTek
  • Chrome
  • DuckDuckGo
  • Safari
  • Firefox
  • Edge
  • Internet Explorer
  • Opera
  • and more

Take Qwantum Private Messaging with you wherever you go. It's easy, secure and convenient. Keep your Qwantum Card in your wallet or purse and bring your small footprint Qwantum Reader with you. It can plug into any computing device with a USB port and if you leave it at home, just use Qwantum Member or Guest Tokens instead. They provide major security balanced with enormous convenience.

How Does Qwantum Private Messaging Work?

Qwantum Private Messages and the files shared belong to the maker of the message and their designated recipients. They are not stored by MagTek Inc., and cannot be accessed by MagTek, Inc., its subsidiaries, affiliates, employees, or other third parties because the message maker retains the hardware, the key ingredients, and the privatized data. Additionally, Qwantum Private Messages never rely on Usernames and Passwords! They are not safe enough for Qwantum users.

Qwantum Private Messages are very much like NFTs or non-fungible tokens. These are digital files that are one of a kind and cannot be exchanged for any other digital file having the same provenance. They are constructed like individual hardened bank vaults that contain highly secretive information. The maker of the message places sensitive information inside the vault. With the glide of a Qwantum Card, the vault door is locked using a key combination generated by means of Qwantum Authentication. Once locked inside, the sensitive data becomes private and unchangeable. To open the vault, the intended recipient must glide their Qwantum Card or use a Member or Guest Token generated by the private message maker. This enables the Qwantum Authentication process to reverse itself and reveal the clear-text sensitive data. To maintain and prove provenance, the complete, unaltered Private Message and glide of a Qwantum Card or Member or Guest Token are required. Without both, the private message will never decrypt. Having both, gives the possessing party means to prove digital authenticity.

Create a Private Message

There is no need to login to Qwantum Private Messaging and that is one of the reasons it is so secure. Every function in Qwantum Private Messaging requires physical authentication of your Qwantum Card. Counterfeit or altered cards will fail this authentication process and prevent unauthorized access to Qwantum Private Messaging. No other secure messenger offers this hardened level of protection!


To create a Private Message, simply glide your card through your reader or use a Member or Guest Token. Once authenticated, you can create your message, choose to add an optional attachment, designate your recipient(s), set an expiration date, and choose the level of audit detail you desire, then press email or download. The Private Message is created, encrypted, and delivered. While enroute, the message cannot be viewed or compromised by any unauthorized party. Once delivered, only the specified recipients can authenticate themselves, and view the message.

Private Messages can be emailed to others or even downloaded for safekeeping so you can paste the private data into unprotected documents without fear of exposure. Members can choose to secure plain text, formatted text, pictures, and attachments. PrivateMessage options also include building custom forms using key/value pairs and custom tables allowing youto easily encrypt and decrypt data and download the data as comma-separated values.

Nothing to Steal!

Qwantum Private Messaging does NOT store anything about your Private Messages. There are no usernames and passwords. The encryption keys are unique to each message, never in the clear and never leave the host security module (HSM). The Private Messages are not stored in our databases. We developed Qwantum Private Messaging with your privacy in mind. Distributing the data and deliberately not storing it in a central repository makes it very unattractive for threat actors to commit data theft.



Qwantum Cards are tamper-responsive and cannot be cloned. If a cloned or counterfeit copy is made onto standard card stock, or even other Qwantum Cardstock, the card will emit a signal that identifies the fraudulent card as a counterfeit copy in real-time. The transaction will be stopped, and malicious card use will be prevented. As a read-only technology, if the data on the Qwantum stripe is altered or substituted, the card will automatically disable itself and will fail validation. This tamper-responsive feature is unique to Qwantum Cards.

Qwantum Cards emit a dynamic Qwantum Token that automatically changes on each use. This value is random and un-predictable yet can be validated by a host authentication system in real-time. This dynamic value prevents the use of "replay attacks", in which attackers attempt to reuse data captured from previous transactions. Safer and more durable than chip cards, dynamic - unlike 2D barcodes, Qwantum Cards are easy to use. Everyone knows how to glide a Qwantum Card.

Qwantum Cards and tokens cannot be cloned or altered, do not contain account numbers or other sensitive data, and provide Qwantum Authentication Tokens that can be used to initiate the construction of hardened encryption keys while simultaneously being used to authenticate a user's digital identity and access to protected electronic data.

"Qwantum Safe" versus "Quantum Safe"

Using the dynamic and random generated data from each glide of the Qwantum Card, a unique AES-256 key is automatically created for each Qwantum Private Message. AES-256 encryption is a NIST (National Institute of Standards and Technology) recognized symmetric-key algorithm for providing the highest-level encryption available to the civilian sector. It is approved for use with “top secret” documents within the Federal Government.

AES-256 uses long symmetric keys comprised of 256 bits. This number of bits creates a range of numbers so large that no existing computer systems have the computational power to attempt a brute force attack. Unlike asymmetric keys used in Public-Private Key Infrastructure (aka PKI), large symmetric keys will remain resistant to future attacks from next generation "Quantum" capable computers. (AES-256 is resistant to potential Quantum Computer attacks based on Shor’s or Grover’s brute-force algorithms.)

This means that AES-256 encryption provides optimum data protection today and into the future. It means that Qwantum Private Messages and Documents are secure and remain "Qwantum Safe" and "Quantum Safe" no matter where they are stored or transmitted. "Steal now, decrypt later" does not apply to Qwantum Private Messaging.

The Competition

Messages and files protected with standard encryption offered by other apps can potentially be compromised or read by threat actors, unauthorized recipients, IT professionals, third-party providers, organizations that make the apps, and other organizations that collect private information on ordinary citizens.

Other app providers do not employ the same level of sophisticated encryption or authentication used by Qwantum Private Messaging, so their messages and files are not as secure. Those providers rely on encrypted messages, files and even the encryption keys themselves to be stored in a database, and all of them require traditional username and password, or PIN authentication and most of them rely on Public-Private Key Infrastructure (aka PKI). Experts agree that stolen data encrypted by Public-Private Key Infrastructure (aka PKI) will be capable of being decrypted in the near future. It is not a matter of "if", but "when".

Private messaging apps have become essential in today's technologically connected world. Now, more than ever, electronic data needs protection from threat actors, competitors, and unwanted prying eyes. Your Privacy is Our Priority!

Use Cases

Qwantum Private Message User

The Qwantum Private Messaging service allows its Members to protect sensitive information and store and exchange the protected information with designated parties, authorized by the Member.

Examples of users include:

Cyber Incident Response. Board members and C-suite executives need to be able to communicate securely, especially in the aftermath of a cyber incident. Qwantum Private Messaging ensures swift, secure communication over any email system, leveraging instant, targeted delivery, AES 256 encryption, and secure identity authentication. This powerful solution operates seamlessly over public Internet Service Providers (ISPs), facilitating secure communications for parties globally provided they have an Internet connection.

Cryptocurrency Wallet Passwords. To protect extremely long and complex passwords for online or offline storage. Don’t be the person to lose millions of dollars because you forgot your password, or you don’t want to save it anywhere in-the-clear!

Cloud Document Storage. Think twice and protect yourself before you drop that document on Dropbox, Adobe, Google, Apple, Azure, or other online storage facility.

Secure Distribution of Subscription-based e-Newsletters and Periodicals. Ensure that the subscription information can only be viewed by intended parties.

Human Resources. To protect Personally Identifiable Data (PII), HIPAA information, personnel files, etc. IT professionals cannot access private information. It is for HR’s eyes only!

Legal Documents. To protect contracts, last will and testaments, digital passports, birth certificates, intellectual property, formulae, negotiation terms and conditions, legal briefs, mergers, and acquisition plans. Negotiations can remain secret.

Medical Information. To protect lab results or other personal medical information. Medical professionals can now share private info over public communications channels.

Financial Information. To protect corporate earnings, business proposals, initial public offerings of stocks and equities, projections, and forecasts. Share information without fear of it being accidentally breached.

Banking Information. Wire transfer information, Digital Card Data. Financial institutions can now share private or sensitive data with their consumers and utilize File Signatures to verify and validate the integrity of the communication!

Celebrities and other high net worth clients. Private chat, social media invitations, communications, passwords, and other sensitive data. Imagine a celebrity inviting Club Members to a private event, but using social media to get the word out, privately but publicly.

Secure Communications with Family and Friends. You have a right to privacy. Defend it. Protect it.

Join The Club!

To become a Qwantum Club Member, you can sign up here. You will receive a Qwantum Card, a Qwantum Reader, and a 3-month Membership to the Qwantum Club. This will give you complete access to all Qwantum Private Messaging functions and services. If you want to share Qwantum Private Messages with Non-Club Members, just create Qwantum Guest Tokens and share them with your trusted parties. It is like sharing a house key or door code without fear that anyone can duplicate the key or change the code without your permission. Qwantum Guest Tokens are safe to use and you can revoke them at any time, so you never have to worry about unwanted or unauthorized access.

Join The Club!