Endoacustica offers, Exclusive Customer Service and free Training
Endoacustica offers, Exclusive Customer Service and free Training
CLOSE
prod cod: CRYPTO-STEALTH
Free customer service:
📞 Pre-Sale assistance
🧑💼 Dedicated consultation service
🛠️ After-Sales 🎓 Training and Support
🆘 Technical and operational support
The secure CRYPTO STEALTH smartphone is the best mobile phone in the world in terms of privacy and communication safety, as it makes use of active and passive defense systems and a modified hardware with total security even in case of attempts to tamper with the mobile phone. The device comes with its own data plan, works with a custom operating system, has multiple layers of security and uses end-to-end encryption for all inbound and outbound communications such as chats, calls, and emails. CRYPTO STEALTH is designed to prevent and avoid eavesdropping, block malware and spyware, hinder location detection and keep information safe.
In addition to software security, the encrypted mobile phone also has hardware security offering different levels of protection even against techniques such as chip-off. It must be said that everything on the phone is stored in an encrypted way, with an additional password able to protect the system. Attempts to identify passwords activate an automatic device data wipe mechanism.
The system includes a SIM card connecting all the world telephone providers, (WWS - World Wide Sim) ensuring a protected data connection. The anonymous SIM card allows you to call any telephone user, use PGP Mail messaging, call and send messages, with anyone owning the same system.
The CRYPTO STEALTH is based on a totally customized Android, the system bootloader is locked: if someone tries to tamper with it, the device will delete all stored data. Furthermore, all Google services have been completely removed from the phone. Normal Android allows apps to share data with the content provider managing the process.
The CRYPTO STEALTH operating system changes the content provider, therefore, each app can only access its own application, thus blocking all data mining spyware from the apps. With a modified kernel (part of the operating system that contains the drivers for the phone's hardware), our mobile allows device management (MDM) and the disabling of features such as USB, Wi-Fi and Bluetooth at the hardware level. It adds yet another validation of the operating system that scans different partitions of the device's memory at each reboot to verify that the phone is not infected with malware.
This encrypted smartphone is equipped with a dual-boot, that is a second Android operating system. This second OS allows, when needed, to use a standard SIM CARD (in second SIM slot) for "unimportant" calls, or in case you want to use the encrypted spartphone as a normal mobile phone.
The CRYPTO STEALTH operating system modifies the content provider (i.e. the android components that allow apps to communicate securely with each other), therefore, each app can only access its own features. This blocks all apps data mining spyware.
With a modified kernel (part of the operating system that contains the drivers for the phone's hardware), our mobile allows device management (MDM) and the disabling of features such as USB, Wi-Fi and Bluetooth at the hardware level.
It adds yet another validation of the operating system that scans different partitions of the device's memory at each reboot, to verify that the phone is not infected with malware.
The encrypted CRYPTO STEALTH smartphone guarantees a total security and anonymity. The SIM card is not in the user's name, works all over the world and includes, in addition to unlimited data traffic, a basic credit for calls to other "normal" non-encrypted phones. Sometimes there may be some circumstances that require you to hide to anyone you are using a "secure cell phone" or to authenticate that there is nothing suspicious on the phone. In such situations, the CRYPTO STEALTH can disguise itself as a normal smartphone, with the classic Android screen and features, with commonly used apps such as Instagram or Facebook, to protect itself during inspections.
The mobile comes with an encrypted instant messaging app. The chat and call app is used to establish a secure, military-grade communication channel between two CRYPTO STEALTH devices, using end-to-end encryption to secure all chat conversations and voice calls. Each communication is encrypted, and travels in an indecipherable form to then be decrypted by the other interlocutor. Furthermore, you can decide to delete messages after sending them by setting a self-destruct time and blocking the possibility of forwarding. When the time runs out, the content is deleted on both devices.
The device also has a full feature PGP encrypted email client. It uses a PGP cryptographic protocol implementation file and 4096-bit keys, unbreakable even by modern supercomputers.
Size: 161.8 x 76.9 x 8.9mm
CPU: : MT6771 Octa Cores
CPU: Arm Cortex A73 2.1GHz +Arm Cortex A53 2.0GHz
GPU:Arm Mail-G72 900MHz
Battery capacity: 4500 mAh
Operating system: Android custom
Display: 6.53”
Resolution: 1920 x 1080 pixel
Processor: 1.5 GHz quad-core (ARM Cortex-A53)
RAM: 4 GB
Internal memory: 128 GB
Rear camera: 48MP + 8MP + 5MP
Front camera: 25 Mpx
Connectivity: Wi-Fi 802.11 a / b / g / n / ac & Bluetooth 4.2
Audio output: 3.5 mm headphones
SIM type: nano GSM / CDMA GSM 3G / 4G / LTE
For personal data protection and secure communications, for example, in case of information exchanged between company managers and important people
For defending from hackers or criminals as well as against any data and information theft
For total anonymity and active security against wiretapping using IMSI-CATCHER systems