LAW FIRMS
The cryptophone communication devices guarantee a compartmentalized environment to allow you 100% safe and secure communications
PROTECTION OF INTERNAL COMMUNICATIONS AND THE CUSTOMER
Strong encryption that guarantees private communication must be the basis of environments in which the information exchanged is sensitive and can affect the outcome of a judgment. Eliminate any possibility of interception or theft, as well as give the possibility to delete information, stored data, and deny that certain conversations ever took place.
Our devices leave no room for intrusion, neither when they communicate with each other, nor if they fall into the wrong hands.
SECURE COMMUNICATIONS WITH MILITARY-END ENCRYPTING FOR CALLS, MESSAGES AND FILE SHARING
WITH CRYPTEDPHONE, LAW FIRMS CAN:
SECURE SHARING OF INFORMATION
E-mail and known communication tools are insecure, communications are vulnerable, between the sender’s and recipient’s devices, networks, and servers. For example, each email will go through dozens of servers, where the content is stored and forwarded to the recipient. If only one point is not sure, the entire sequence will be compromised.
your privacy above all
The phone is encrypted both as an operating system and as voice and chat applications, with military 256-bit encryption, end to end. This prevents, even the owners of the infrastructure, from decrypting calls and / or messages, since the encryption keys are generated by the end-points and are different for each message or call.
The phone is encrypted with the following: AES-256-GCM for data, AES-256-CBC for metadata
Applications are system apps, i.e. applications inserted directly into the secure ROM. This gives greater security in the event of complex attacks where servers and application update infrastructure are compromised, in which the attacker is able to recompile applications with malicious code. In these cases the update with the malicious code is not successful but is rejected, giving an error such as POP-UP.
Furthermore, these devices use the hardware Titan-M Chip mounted on the SoC to perform security checks when the phone is booted, and create a chain of digital certificate trust, starting from an AES-256 token installed on the TITAN-M chip (the generated token is saved on our off-line infrastructure, also encrypted with AES-256).
The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.
The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.