Hardware – Reliable Mobile Devices
Encrypted mobile devices designed, assembled and tested to ensure their integrity. Optimum operation with the operating system, rigorous manufacturing procedures, security, reinforced tests and quality assurance.
Secure operating system
Operating system with unbreakable cybersecurity technology, security patches, updated against emerging threats and intuitive user interface. Full disk encryption.
Multiple layers of security for military-grade protection
We continually develop additional layers of security, making information theft virtually impossible. This guarantees our users a private communication and beyond the reach of any espionage attempt.
Chat
Top-grade encryption: The latest generation OTR encryption protocols with 16,000 bits of encryption, OMEMO and ZRTP, protect your chat messages and VoIP calls to guarantee absolutely private communication.
Chat
Chat
Chat
Chat
Chat
Share any of the most used file extensions, without routing them through servers, thus guaranteeing absolutely private P2P communication.
Blockchain Applications
Ensures that our users' communication is private and out of reach.
Work mode
Switch to desktop with BlockChain Applications or Work Encrypted Applications by activating work mode.
Encrypted work applications
To ensure that our users' communication is private and out of reach.
Email Military grade encryption: We use PGP protocol, with 4096-bit keys and AES-256 encryption. So no one can decrypt your emails.
PGP encrypted key control:
Keys are generated and stored only on the device. This way, only you will be able to access the copies of them.
Encrypted application database:
All your emails, contact names, registrations and the encryption keys you use for your messages are stored in the application, inside an encrypted database.
Open communication network: The service does not include blacklisted or whitelisted domains. We have an open network that allows you to communicate with everyone.
Send unencrypted emails:
Secure email communication is not restricted to just PGP clients. You can also send regular unencrypted emails to anyone.
Encrypted Drafts:
Sometimes you don't want to send a message right away. If you save it to secure email, the draft will be encrypted.
Remote wipe option by email: Are you worried that someone will take your phone and extract data from it? You can use secure email to erase everything on the phone.
Multiple accounts:
Like any contemporary email client, the application can support multiple accounts. Switching from one to another is easy, you can do it from the application.
High compatibility:
compatible with competing products that use the same version of the PGP protocol.
Security Lock Inbox rules:
If you receive a lot of emails, sorting them could be a problem. Secure Email allows you to create folders and rules (filters) to easily organize your inbox.
Export backups:
You can create a backup of your settings and encryption keys, to export them for use on another device.
Remote wipe
Even if you lose your phone, the information you have stored is absolutely safe, because you can remotely delete any data by sending a pre-determined combination of characters as a message to your secure chat.
Panic button
To ensure that our users' communication is private and out of reach of any eavesdropping attempts, we continuously develop system updates.
Incognito mode
Normal Android/iOS operating system with commonly used applications, activating incognito mode.
Vault
Allows you to store any message or file you want in the encrypted file container in the cloud.
Supported attachments.
Vault
Emergency center
OS Emergency Center with quick access to features you may need in urgent situations.
Quick Clean: Erase all data on the device with a single swipe.
Incognito mode: Transform the operating system into a normal Android and hide all your encrypted communication.
Encrypted cell phone 5 reasons to have one
Encrypted
SIM Card
Protect yourself from cybercriminals and
keep safe your personal information!
E-SIM
Encrypted
Plans
Data or minutes
Encrypted
SIM Card
E-SIM
Encrypted
-
Plans
Data or minutes
Protect yourself from cybercriminals and
keep safe your personal information!
Frequent questions
By encrypting the cell phone, the original operating system is replaced by a military-grade encrypted one, with special features such as encrypted chats, secure calls, remote destruction, among others that you can learn about at encriptados.quebec
In addition to the security and privacy offered by an encrypted cell phone, there will be features such as encrypted chats, remote deletion, encrypted mail, timed messages, cloud storage and multiple encrypted applications.
In case of losing the phone or being a victim of theft, a predetermined combination of characters can be sent to the chat itself to eliminate all the information on the cell phone. In other cases, it can be done by contacting the license provider.