CRYPTEDBLACK™ • LITE
VAT included.
Description
The CRYPTED Black was created to put an end to modern smartphone surveillance once and for all.
After countless failed projects from the past, state-sponsored "honeypots" and dubious cryptophone manufacturers, we set ourselves the goal a few years ago of bringing the world's first surveillance-proof iPhone onto the market. - Thus the CRYPTED BLACK was born!
Unlike all previous "secure cell phones" on the global market, we are the world's first vendor to dare to build the iPhone from scratch to be restructured.
In any case, the first and fundamental step towards the fundamental security of our mobile phones is the physical removal of potentially dangerous components. This includes:
• GPS chip
• All microphones
• Inside camera
We rely on logic and facts.
This step guarantees absolute security even in the event of a spyware infection .
Our CRYPTED BLACK makes it for attackers:
- without microphonesimpossible eavesdropping on you.
- without indoor cameraimpossible to observe your face
- without GPS & location servicesimpossible to locate you.
In this way we create the foundation for a guaranteed secure mobile phone.
Yes this fundamental step does not make the CRYPTED BLACK surveillance-proof and certainly not the world's most secure iPhone.
If you compare all mobile operating systems, IOS is way ahead in terms of security. This is the main reason why we have specialized in iPhones. However, to really maximize the security of our customers, we have applied a very special concept to our phones.
DECENTRALIZATION.
Why have all other companies' projects failed in the past?
Through central access points. It was possible to access all devices via a server, which was then used to install malware and intercept messages.
To avoid exactly this fatal error, we use the CRYPTED BLACK complete decentralization.
Unlike conventional crypto mobile phones currently on the market, the CRYPTED BLACK is not connected to any system. Thus, only you know about the existence of your mobile phone and it is impossible to be identified & attacked from the outside as a CRYPTED user.
It is therefore impossible for companies like Encro & Co to have tragic scandals, since your phone is not registered in any system.
The last and final step are the so-called software modifications.
Combined with the physical removal of components and the decentralized application, the software modification gives the CRYPTED BLACK the finishing touches.
ATTENTION: With the LITE model, apart from the physical removal of components, no software modifications are carried out.