The Whitepaper on Stealth Phones for secure communication

Whitepaper

“Which mobile phone will help me protect myself from various attacks?” To answer this question, it is important to know who you need to protect yourself from. Are you looking for protection from prying eyes like a business partner, from hackers, or from professional institutions such as spy companies, unscrupulous corporations or abusive governments? 

Latest articles

COVID-bit

COVID-bit attack

This article takes us to the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev in Israel, which has found problems with so-called airgapped networks.

Pay with cryptocurrencys

Prefer to pay in cryptocurrency? We’ve got good news for you. You can easily pay by crypto and we will ship your Stealth Phone to you.

XCell Security

Google Smartphone

DeGoogled Android​

We know you all want to get rid of Google apps on your Android smartphone. But can you really get rid of them? And is it really good for your privacy and security? We don’t think so. Read more

Cell phones that can’t be tracked?

The ability to hide your current location by showing your location elsewhere. Learn the difference between the real thing and unnecessary VPN apps. Find out more

A man using his cell phone and attacking an IMSI Catcher

X-ONE Stealth Phone

The first 4G stealth phone with an unprecedented feature: XTerminator which allow OTA attacks against IMSI Catchers. Read more