cellulare sicuro criptato smartphone teelfono non intercettabile

Encrypted Cell Phone

Encrypted cell phone with secure operating system, secure applications, dedicated VPN, dedicated server, Intrusion Detection System with Machine Learning and secure SIM. Delivery to Customer site upon request.

Price: € 1,590.00 (SIM card cost is not included)

Code: PSECSMA002

Description

The encrypted cell phone communicates securely with other encrypted cell phones of the same type, safe from eavesdropping. It enables the execution of calls (VoIP), video calls and encrypted chats, secure exchange of files of all types (audio, photos, video, text) and encrypted emails, in a non-intercept mode.

Security is managed by adopting numerous countermeasures that touch many parts of the communication system, with emphasis on the operating system, defense against remote zero-day attacks, and physical attacks (with access to the device).

For security reasons, common voice calls, which are easily intercepted (calls to and from everyone), are inhibited and can be unblocked upon request.

The system is customizable to improve security against attacks other than content attacks (voice and text dialogues, files, etc.) such as geographic location attacks carried over the telephone network, making it more difficult to trace.

Limited to the secure operating system and core security functions-voice calls, chat, file exchange, and email-no licenses are provided for use. The right to use is perpetual once the purchase is made.

Secure Calls and Video Calls
Making encrypted point-to-point calls and video calls, including conference calls and video calls. Future Security(Forward Security)-encryption keys are destroyed as soon as the call ends to prevent eavesdropping by key theft. Use of the most up-to-date and secure encryption protocols.

Secure Chats
Sending point-to-point encrypted text messages, including group chats. Security based on the same robust encryption algorithms used for voice encryption.

Sending Files
File sharing with point-to-point encryption: text, images, video, voice messages.

Hardened Operating System
The operating system has undergone security enhancements as part of a project that has been ongoing for about ten years. Only a few of the countless security features are described below.

Secure Android operating system built from the AOSP (Android Open Source Project) source code. Reducing the attack surface for remote and physical access attacks by removing code that is not strictly necessary, making some functions optional and disabling others (NFC, Bluetooth, UWB), when the screen is locked (USB, camera use) and optionally after a certain amount of time (Bluetooth, Wi-Fi). Disabling debugging for attack surface reduction for attacks with physical access.


Development and use of secure memory and library languages, tools for static and dynamic analysis, and many other types of mitigation interventions.

Camera and pdf file viewing applications developed for security management.

Configurable Operating System Security Profiles
Access to network, data, and sensors (camera, microphone, accelerometer, gyroscope, compass, barometer, etc.) managed via Toggle allowing control of individual security policies.

VPN
VPN with dedicated private server. Data exchanged are thus subject to double encryption, including calls and chats.

Intrusion Detection System
A system residing on the phone prevents, detects and supports the User in actions to defend against Malware and Trojan attacks, even when not connected to the network. It can also detect attacks carried through zero-day flaws (unknown vulnerabilities) in the operating system and network connections. Constantly observes the operating system, connections and Apps for anomalous events, using various techniques, including behavioral analysis and Machine Learning.

The AI engine has been developed over a decade and has been trained to automatically recognize abnormal behavior through the submission of billions of data. By analyzing slight deviations in operating system statistics, memory, CPU, and other system parameters, the Intrusion Detection System is able to accurately identify not only the specific type of attack, but also the associated forensic data.

Safe SIM
SIM with inherent security features, such as identity and metadata protection.

Option for secure SIM with additional defense against attacks brought to phones through mobile network protocols such as SS7 localization, Silent SMS, etc.

  • Hardware- Google Tensor CPU, Titan M2TM security coprocessor.
  • Memory-6 GB RAM, 128 GB for storage.
  • Radio – GSM/EDGE quad-band (850, 900, 1800, 1900 MHz), UMTS/HSPA+/HSDPA bands 1,2,4,5,6,8,19, LTE bands B1/2/3/4/5/7/8/12/13/14/17/18/19/20 and bands 25/26/28/29/30/32/38/39/40/41/42/48/66/71, 5G sub-6 bands n1/2/3/5/7/8/12/20/25/28/30/40/48/66/71/77/78, eSIM.
  • Connectivity – Wi-Fi 6 (802.11ax) and 6E (6 GHz) with 2.4 GHz, 5 GHz, 6 GHz, HE160, 2×2 MIMO. Bluetooth® 5.2 with dual antennas. NFC. USB Type-C 3.1.
  • Localization-GPS, GLONASS, Galileo, QZSS, BeiDou.
  • Display – OLED 6.134″, 20:9, FHD (1080*2400).
  • Camera – rear wide-angle 12.2 MP, rear ultrawide 12 MP. Front 8 MP. Both cameras can be disabled.
  • Sensors-proximity, ambient light, accelerometer, gyrometer, magnetometer, barometer.
  • Audio – stereo loudspeakers, 2 microphones.
  • Battery – 4300 [mAh], fast charging.
  • Mechanical – dimensions 152.2 x 71.8 x 8.9 [mm]. Weight 178 [g].

The cell phone is exempt from restrictions on sale in the territory of the European Union. Due to the sensitivity of some possible usage scenarios, Extra Large Srl reserves the right to refuse orders.