RISK

Cryptophone devices are made with cutting-edge technologies to ensure maximum security and privacy

HOW SECURE ARE YOUR CALLS AND YOUR MOBILE MESSAGES?

In an age where data is becoming the most important commodity, the protection of communications is of vital importance to any business. Your private life, your job, your business are subjects of interest to criminals, competitors, and bad guys.
There are many vulnerabilities in communication via cell phones and mobile networks, which jeopardize the privacy and confidentiality of companies, individuals, and organizations.

DATA LEAKAGE

In an age where data is becoming the most important commodity, the protection of communications is of vital importance to any business. Your private life, your job, your business are subjects of interest to criminals, competitors, and bad guys.
There are many vulnerabilities in communication via cell phones and mobile networks, which jeopardize the privacy and confidentiality of companies, individuals, and organizations.

PHISHING ATTACKS

Compared to attacks aimed at computers, those that target smartphones are more insidious. This type of pitfall exploits the plurality of vectors such as SMS, messages on platforms and social media, multimedia content that can deceive potential victims, and break down the device’s defenses.

VIOLATED ENCRYPTION

If a developer uses weak encryption algorithms or strong encryption but without proper implementation, there are various openings for a cyber attack. In application development, developers can use known and vulnerable algorithms to speed up production. In many other cases, real flaws in the codes to allow access to hackers even if they do not have passwords and accesses.
Understanding and preventing these risks is essential to protect our employees, contractors and customers. Our products are designed and developed to protect you from these threats, finding an effective solution that can be used in many fields.

THREATS ARE NOT LIMITED TO THE WORK OF PROFESSIONALS

With nothing more than a browser, an internet connection, and perhaps a prepaid debit card, anyone can forge SMS and caller ID messages. The fact that you see a name or profile picture when the call comes in is enough for most people to trust the authenticity of the message or call.
The interlocutors could thus provide critical and personal information to criminals.
More worrying still is the case where a number of organizations use SMS as an emergency alert, to evacuate buildings or request the location of an employee.

RISKS FOR ORGANIZATIONS AND THEIR EMPLOYEES

ECONOMIC ESPIONAGE

When employees use their phones for confidential business discussions, particularly when traveling on business, the risk of such text, pictures, or calls being intercepted is real. If such confidential information is collected from interested third parties the damage can be far-reaching.

CRIME AND IT FRAUD

Global crime is increasingly focusing on targeting personal cell phones, with scams growing in complexity and scope. In early 2016, millions of customers of Australia’s largest banks were targeted by a sophisticated attack that bypassed banking security systems using fake login screens.

PERSONNEL SAFETY

For companies with employees working abroad, the risk of interception may be greater, as competitors, terrorists and kidnappers target these figures.
Smartphone communications increase this risk by allowing crucial information such as location, travel and contacts to be discovered.

get your crYptophone now

Fill out the form and a member of our cybersecurity team will contact you to help you get your cryptophone quickly and securely.

your privacy above all

The phone is encrypted both as an operating system and as voice and chat applications, with military 256-bit encryption, end to end. This prevents, even the owners of the infrastructure, from decrypting calls and / or messages, since the encryption keys are generated by the end-points and are different for each message or call.

The phone is encrypted with the following: AES-256-GCM for data, AES-256-CBC for metadata
Applications are system apps, i.e. applications inserted directly into the secure ROM. This gives greater security in the event of complex attacks where servers and application update infrastructure are compromised, in which the attacker is able to recompile applications with malicious code. In these cases the update with the malicious code is not successful but is rejected, giving an error such as POP-UP.
Furthermore, these devices use the hardware Titan-M Chip mounted on the SoC to perform security checks when the phone is booted, and create a chain of digital certificate trust, starting from an AES-256 token installed on the TITAN-M chip (the generated token is saved on our off-line infrastructure, also encrypted with AES-256).

The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.

The phone cannot be positioned, and no one is able to associate it with a natural person using the SIM provided. Furthermore, even in the event of loss, seizure or theft, it is impossible to access the phone.

Scroll to Top