Mobile with military encryption level – in active use by intelligence units and business companies around the world.
The only device of its kind in the world that successfully passed an NSO attack! Blue and white Israeli development.
Encrypted Mobile Phone:
- The device comes with built-in security that works based on safe boot and valid devices.
- A powerful operating system with powerful security and privacy extensions.
- Encrypted voice calls and messages, voice announcements and encrypted attachments, does not allow listening and recording of the conversation by a third party.
- The device comes with a powerful security system including threat detection, malware neutralization and safe network monitoring.
- Encrypted phone data, blocks and neutralizes malicious app activity.
- Operation without Google services to achieve optimal privacy.
- Multidimensional threat monitoring at the device, network and application level.
- Protection against listening SS7, A5.2, A5.1, listening C2 and more.
- Protection against a “Man in the Middle” attack – or MITM or MiM in short.
- “Automatic device destruction” – when the device connects to a computer or external programs, the device will destroy itself so that it will not be possible to restore and extract the information in any way. (Protection against the various cellebrite systems and eavesdropping from sophisticated systems of recognized companies including Ability).
- The system also prevents the retrieval of information by the various enforcement units, including all police units and security bodies in Israel and around the world. It destroys itself in such an attempt.
- Suitable for business people, confidants, executives, any need for encrypted communication and user privacy protection.
- Self-destruction can be carried out both remotely and when tapping the unlock code of a device that is preset as a destructor. (*After destruction, the device cannot be returned to operation, not even by the manufacturer).
- The device comes with applications according to the customer’s choice – from a list.
- The device includes the apps: Telegram, Telegram X, Signal, Waze, Whatsapp and more. Includes automatic update from a closed circuit system.
- It is important to know – the system is encrypted at a level that even the manufacturer cannot obtain details about the user and/or the device data – all information is encrypted! 256 bits.
- There are 2 models to choose from: the “Bond” model and the “Intact” model – the difference is only in the technical specifications of the device and not in encryption capabilities.
|Technical Specifications / Model||Bond Model||Intact Model|
|Operating System||IntactOS based on Android 9||IntactOS based on Android 9|
|Processor||Quad Core 1.3Ghz||Octa Core|
|Battery||2500mAh – Removable||2950mAh|
|Camera||5MP rear, 2MP front||16MP rear, 8MP front|
|Encryption level||Full – maximum||Full – maximum|
* Price when purchasing a single device
| 6,600 ILS
* Price when purchasing a single device
|Annual cost||First year for no extra charge
|First year for no extra charge
|Monthly cost||No additional monthly cost||No additional monthly cost|
- SIM GHOST – allows hiding the device’s IEMI and blocks the possibility of locating the device’s location – works for international use (for a full list of countries please contact, works in Israel). – At an annual cost.
- Midway Service – Standard Call Encryption Service – When a normal call is made from the device (to an encrypted device) – the call will be encrypted on the side of the encrypted device so that in the case of listening to a listening site, only one party can be heard talking (the side that is not encrypted).
- Independent server system – you can purchase an independent server for independent storage of the server at the client and share permissions for the various devices owned by it. (Contact customer service for more details).
*The picture is for illustration purposes only