The IntactPhone is a monolithic contained device, protecting the user from known and unknown cyber-attacks. Unlike other high-security devices that quest to compromise between privacy and security, the game-changing IntactPhone is designed as a unified container to safeguard the entire mobile device regardless of the attack vector.
The IntactPhone is designed to provide unmatched protection against mobile cyber-crime. The API level integration across its components –narrows the attack surface for cybercriminals and delivers a one-of-a-kind, highly robust defense.
The IntactPhone delivers encrypted voice over IP utilizing ZRTP. ZRTP uses ephemeral Diffie-Hellman with hash commitment. The secure messaging is delivered via end-to-end encryption, including AES256 message encryption, and RSA 2048.
The IntactPhone device ensures that device owners have complete privacy: proprietary push notification mechanism assures that no communications data can be stored by a third party. The disk encryption key is known only to the device owner who actually sets it up, and it is not kept by any other party. The voice encryption keys are destroyed at the end of the call, which precludes retroactively compromising the call by future disclosures of key material.
IntactPhone secure build provides a trusted environment by a secure boot process, integrity validation and detection, obfuscation layer across device resources, and the generation of security keys and device passwords.
The IntactPhone can be delivered as a hosted-solution to reduce operating costs or as an on premise deployment to provide complete control by the customer.