The CipherTalk secure smartphone provides military-grade full-circle protection for all aspects of mobile phone talk and text communications, including an innovative ability to ensure user anonymity. The entire voice and text messaging connection procedure is hidden, and no user data or call logs are generated, collected or stored. Whom and when a user is calling, and where they are calling from, is only known by the user.
To ensure full anonymity of communications the secure CipherTalk infrastructure includes three information gaps. The first gap is between the CipherTalk phones, where the CipherONE® Secure Connect Network isolates the CipherTalk phone initiating the call from the answering CipherTalk phone terminating the call. The CipherONE Secure Connect Network securely authenticates and IP connects the CipherTalk phones, and maintains the CipherTalk IP connections worldwide. The CipherTalk phones communicate only with the CipherONE Secure Connect Network. The CipherONE Network securely relays the encrypted talk or text between the CipherTalk phones, providing anonymity of who is calling whom and their locations. This relay process does not affect the encrypted talk or text communications, which are encrypted and decrypted by the CipherTalk phones only.
The second information gap to ensure anonymity is between the CipherTalk phones and the end-users. The end-user does not have to provide any personal or subscriber information to make a secure call even when using GSM data services. This allows an organization to hide the end-users of the CipherTalk phones, separating the users of the phones from the procurement of the phones, which provides invisibility and anonymity of the end-user.
The third information gap is that TCC’s technology hides the encrypted communications. As the encrypted communications are undetectable, they cannot be seen and therefore intercepted or blocked by the outside world. See Figure 1
Learn more about the military-grade CipherTalksecure smartphone or contact us at www.tccsecure.com/sales.
Number of views (775) Comments (0)
Our solutions meet TCC's CipherONE Optimized Network Encryption best-in-class criteria for maximum cryptographic strength, and are optimized for performance and ease of use for our customers.