Description
Offensive Security:
• Dynamic IMEI Change
• Manual IMEI Change
• Phone Cloning
• Channel Lock
• Hunting Mode
Defensive Security:
• Anti Interception Mode
• Security Suite
• No Call Log (on demand)
• Sandbox
• Discrete Call Recording (on demand)
• Calibrate
Secure communication:
• Regular Call
Immune to Spy Call
Immune to Silent Call
• Call Encryption (on demand)
• Regular SMS
Immune to Silent SMS
• Secure SMS
• Encrypted SMS (on demand)
• Encrypted IM (on demand)
• XCrypt MLSPⓇ (on demand)
Monitoring:
• Real Time Interception Detection
• A5 Tracer
• UnPing
• TMSI Monitoring
• Continuous Network Scanning
• Instant Interception Check
• C1/ C2 Monitoring
• cryptoTRACERⓇ
Location Management:
• Location Tracking Monitoring
• Real Location Spoofing
Alerts:
• Call Interception Alert
• SMS Interception Alert
• SS7 Interception Alert
• Location Tracking Alert
• SS7 Location Tracking Alert
• Location Update Request (LUR) Alert
• LAC Change Alert
• Ki Extraction Alert
Software Security:
• Tamper Resistant OS
• Bluetooth Firewall
• No OTA Updates
• Virus Free
• De-Googled (on demand)
• Encrypted Bootloader
• Encrypted and Signed Firmware
• No False Positives
• Blocked App Install
Hardware Security:
• Microphone Lock
• Camera Lock
• No GPS (on demand)
• No Bluethooth (on demand)
• Self- Destruct Motherboard
• Forensic Proof
• Tamper Resistant Hardware
• Tamper Resistant Battery
Misc.:
• XPing Tool
• On Screen Functions
• Security Audit