The Whitepaper on Stealth Phones for secure communication

Whitepaper

“Which mobile phone will help me protect myself from various attacks?” To answer this question, it is important to know who you need to protect yourself from. Are you looking for protection from prying eyes like a business partner, from hackers, or from professional institutions such as spy companies, unscrupulous corporations or abusive governments? 

Latest articles

XStealth Pro in progress image

New added special features

There’s a golden ticket for our users, and a backstage pass for our resellers that we’re sending to you so you can dive back into epic insights of the XStealth project.

COVID-bit

COVID-bit attack

This article takes us to the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev in Israel, which has found problems with so-called airgapped networks.

XCell Security

Google Smartphone

DeGoogled Android​

We know you all want to get rid of Google apps on your Android smartphone. But can you really get rid of them? And is it really good for your privacy and security? We don’t think so. Read more

blank

Cell phones that can’t be tracked?

The ability to hide your current location by showing your location elsewhere. Learn the difference between the real thing and unnecessary VPN apps. Find out more

XStealth Pro in progress image

New added special features

There’s a golden ticket for our users, and a backstage pass for our resellers that we’re sending to you so you can dive back into epic insights of the XStealth project.

A man using his cell phone and attacking an IMSI Catcher

X-ONE Stealth Phone

The first 4G stealth phone with an unprecedented feature: XTerminator which allow OTA attacks against IMSI Catchers. Read more