WE ARE CRYPTEDPHONE

Thanks to the experience gained from the many sectors in which we operate, our team has developed an unassailable and irreplaceable tool to protect itself from attacks and intrusions from external sources.

WHAT is an encrypted phone

Encrypted phones provide military-grade protection for the most sensitive data, from passwords to the operating system, allowing secure communication between two associated encrypted phones. Cryptophone guarantees anonymity and privacy through hardware with a zero attack surface.

A SHIELD FOR YOUR COMMUNICATIONS in total safety

OUR MISSION

Cryptedphone believes in the fundamental right to privacy, which is increasingly ephemeral and exposed to constant attacks by cybercrime and mass surveillance. We do not store any data on our servers, not even for maintenance purposes. In fact, we give total control over all the functions of the applications and the device. The enterprise-grade offers allow companies and groups to use their own servers, independently, in order to give them a maximum level of privacy.

get your crYptophone now

Fill out the form and a member of our cybersecurity team will contact you to help you get your cryptophone quickly and securely.

your privacy above all

The phone is encrypted both as an operating system and as voice and chat applications, with military 256-bit encryption, end to end. This prevents, even the owners of the infrastructure, from decrypting calls and / or messages, since the encryption keys are generated by the end-points and are different for each message or call.

The phone is encrypted with the following: AES-256-GCM for data, AES-256-CBC for metadata
Applications are system apps, i.e. applications inserted directly into the secure ROM. This gives greater security in the event of complex attacks where servers and application update infrastructure are compromised, in which the attacker is able to recompile applications with malicious code. In these cases the update with the malicious code is not successful but is rejected, giving an error such as POP-UP.
Furthermore, these devices use the hardware Titan-M Chip mounted on the SoC to perform security checks when the phone is booted, and create a chain of digital certificate trust, starting from an AES-256 token installed on the TITAN-M chip (the generated token is saved on our off-line infrastructure, also encrypted with AES-256).

The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.

The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.

Scroll to Top