Secure Phone

Encrypted communications solution
for your every privacy and security concern.

Book Demo

Want to Learn More about Secure Phone?

Learn More

Key Features

Built for Privacy

Secure Phone is designed as a complete solution for securing users’ personal and professional communications. It protects messages, calls, and data at rest against the diverse mobile threat landscape.

End-to-End Encryption

Powered by the PGP, OTR, OMEMO, and ZRTP protocols, the apps on Secure Phone provide unbreakable encryption for all user communications.

No Eavesdropping

The device features built-in protection against spyware and is designed to alert users about nearby surveillance devices such as Stingrays.

No Location Tracking

Secure Phone counters known techniques for determining a handset’s whereabouts such as silent SMS and geo-location tracking malware.

Data at Rest Security

Secure Phone features several layers of protection for data at rest: full disk encryption, encrypted app databases, and an encrypted file container.

Hack-Proof Device

With customizations going as deep as the OS kernel and a locked bootloader, Secure Phone is designed to resist hacking attacks.

Independent Service

The Secure Phone service involves no third-party providers. Server infrastructure, data plan, software technology – everything is 100% us.

Complete Security on Every Level

Secure SIM

The device comes with a special multi-IMSI SIM card providing an unlimited data plan with global coverage.

READ MORE

Reliable Hardware

Secure Phone’s bootloader has been locked after installing the custom OS to prevent malicious modifications.

READ MORE

Secure OS

The device runs on a custom OS that has been modified as deep as the kernel level to fix vulnerabilities and close off potential attack vectors.

READ MORE

Secure Apps

Our suite of in-house developed apps secures users’ communications and data at rest with the help of best-of-breed encryption protocols.

READ MORE

Mobile Device Management

Every functionality, app or app feature on Secure Phone can be enabled or disabled remotely via the Secure Administration System (SAS) platform.

READ MORE

Secure SIM

The device comes with a special multi-IMSI SIM card providing an unlimited data plan with global coverage.

READ MORE

Reliable Hardware

Secure Phone’s bootloader has been locked after installing the custom OS to prevent malicious modifications.

READ MORE

Secure OS

The device runs on a custom OS that has been modified as deep as the kernel level to fix vulnerabilities and close off potential attack vectors.

READ MORE

Secure Apps

Our suite of in-house developed apps secures users’ communications and data at rest with the help of best-of-breed encryption protocols.

READ MORE

Mobile Device Management

Every functionality, app or app feature on Secure Phone can be enabled or disabled remotely via the Secure Administration System (SAS) platform.

READ MORE

Our Applications, Your Peace of Mind

Secure Chat:
Encrypted chats and calls

Secure Email:
PGP-powered email

Policy Manager:
Information center

Secure Vault:
Encrypted file container

Secure Wipe:
Erase everything

IMSI-Catcher Detector:
Avoid fake cell towers

A Core Hardened by Secure OS 2.0

What sets Secure Phone apart from regular smartphones is its OS. Based on Android 6, Secure OS 2.0 has Google Services rooted out and is modified to prevent malware infections and data mining.

Custom App Framework

We modified the phone’s original application framework to allow greater control via SAS and to prevent data leaks.

Custom Libraries

In Secure Phone, we removed most default Android libraries and installed better, securer ones.

Secure Recovery

Secure Phone features an upgraded recovery because we needed to enhance the functionality of the one regular Androids come with.

Locked Bootloader

We opened the bootloader, pushed our Secure OS and turned the key so that the next person who tries to open it wipes the device.

Partition Validation

Secure Phone’s custom partition validation scans each of the phone’s partitions and ensures they are not infected with malware.

Sealed Content Provider

The custom content provider makes sure that no third-party apps silently collect data from other apps on Secure Phone.

Secure Sim

Unlimited Data, Anywhere!

Secure Phone users don’t have to bother with mobile operators and submit personal information to subscribe to their services. Instead, we offer the device with a plan of our own and ready for use out of the box. Secure SIM, the multi-IMSI card the device comes with, provides unlimited data coverage across the globe without roaming fees.

Features

  • Multi-IMSI for the best connectivity
  • Unlimited data anywhere you go
  • No roaming or other fees

Offered in Standard, Micro and Nano sizes

Reliable Hardware

Secure Phone’s hardware has been cleaned from bloatware and thoroughly tested to make sure there could be no data leaks from the device. The device’s bootloader has been locked after the installation of Secure OS. Any subsequent tinkering with it is set to wipe the phone.

Specs

5.2inch

LCD Touch Screen

16/32GB

2GB RAM

418Adreno GPU

Hexa-core CPU

Dimensions

147.0 x 72.6 x 7.9 mm, 136 grams

Battery

2700 mAh battery, USB-C for fast charging

Camera

12.3 megapixels, front-facing 5 megapixels

Operating System

Secure OS 2.1.0

Ports

Single USB-C, 3.5mm audio jack, single Nano SIM slot

Remote Control

Manage Your Phone
with the Secure Administration System

There can be no unauthorized modifications to Secure Phone. Every feature, setting, and app installed on the device is subject to a policy which can be set only through the Secure Administration System (SAS) platform.

Features

  • Mobile Secure Phone regulation
  • Manage device hardware, OS, apps, and accounts
  • Remotely wipe Secure Phone in case of danger
  • Control more than one device
Book Demo

Learn More About Secure Phone

Download White Paper

See Secure Phone in Action

Book Demo