XStealth PRO
Crafted for experts and field operatives in covert actions. Tactical is the ultimate tool for security professionals. Designed to meet the needs of shadow warriors and security enthusiasts, the Dominator version also serves as a daily cell phone, offering the highest level of security and total privacy without relying on Google Services.
- Preinstalled Apps (+5 On Request)
- No Bluetooth & Camera, Controlled GPS
- Fully De-Googled
- No App Store, no app installations
- Quantum-Resistant Cryptography
- Proprietary Android 12
- Flexible Third-Party App Management
- Fully De-Googled
- GPS and Camera removal (On Request)
- FOSS App Store: FDroid, Aurora Store, or Aptoide
- Proprietary Android 12
- Quantum-Resistant Cryptography
Not sure if this is the best Stealth Phone for you?
Compare Stealth Phones
Not Just Another Encrypted Phone.
We Are Built Different
No other product can compare – not because we look different, but because we are built differently. Our advanced mobile security solutions provide the same high-tech support used by intelligence operatives on covert overseas missions. With XCell Stealth Phones, you get more than protection – you get real-time control and awareness. The same cutting-edge technology trusted by intelligence operatives is now available to you.
Discover the Details in Our User Interface Tour.
Experience the XStealth PRO’s user interface designed for seamless navigation and top-tier security.
Product Protection
Rest easy with our manufacturer warranty, ensuring that your product is protected against any manufacturing defects or issues.
Express Shipping
Time is of the essence. That's why you can trust our express delivery service to get your Stealth Phone to you quickly and safely.
Stop hiding
Concerned about being tracked or observed?
Imagine your phone is in your pocket, but shows anyone trying to track you that you are 1-10km away in another location. With location spoofing, your phone’s location is no longer tied to your physical presence. Move around with confidence, knowing that your true location remains protected and private. Experience the freedom and control location spoofing gives you.
Be invisible
Thanks to robust defensive security features, you benefit from unlimited user identities, ensuring you are no longer vulnerable to interception and can enjoy complete anonymity.
Start fighting back
Powerful offensive security features give you the ability to defend against abusive interception, meaning you can launch attacks to protect your goals and interests while maintaining secure communications.
Perform at best
Secure communications keep your secrets safe and increase your efficiency in fullfilling your responsibilities. This will ensure that you save valuable time, allowing you to focus more on your personal and professional success.
Personal Intelligence Agency
Our interception detection features give you access to your own personal intelligence agency. This means you will be notified of any threat, interception or tracking attempt, giving you the opportunity to make the right decision at the right time. Being alerted at the right time can make the difference between success and failure, growth and decline, and in extreme cases, even life and death.
Impenetrable Vault
In a world where your personal data and valuables are constantly at risk, you need a secure and reliable solution. Imagine a world where you never have to worry about your sensitive information falling into the wrong hands. Furthermore, imagine a worst-case scenario where you can rest assured that your most valuable data is locked away in the most secure vault available – your Stealth Phone.
What Our
Clients Are Saying
Your privacy and security are our top priority. Understanding the importance of confidentiality, we do not publish names or photos here. The feedback you see reflects the genuine satisfaction and confidence our customers have in our service. Real testimonials will be available as soon as a client agrees to share their experience. We never use fake testimonials.
Verified Government Client
Global Defense Contractor, U.S
As a Defense Contractor with offices Worldwide, during our travels from country to country we have had numerous incidents of communications and details of our projects leaked. Utilizing the XStealth PRO, not only is our communications secure, we have been notified by our phone of attempts on interception and been able to block them. Our top employees will all be using this phone for now on.
Verified User
Germany
I use my XStealth PRO for both private and business purposes. It gives me a good feeling to have control over my security. All the features are exactly what I was looking for: I am protected and can detect surveillance attempts. During a few self-inflicted difficulties, my contact person supported me and did everything to ensure I was satisfied. I was also assisted when setting up the device. I can clearly recommend this product to anyone who wants to be secure. I have rarely felt so safe using a smartphone.
Verified User
Germany & Spain & Portugal
I have been using the phone for about three months now, both in Germany and in other countries (Spain and Portugal). Initially, I found it difficult to use due to the technical differences compared to the iPhone I am accustomed to using. Nevertheless, the security and discretion that this phone offers are unparalleled by any other device I have used before. I would recommend this mobile phone to anyone who prioritises security and privacy.
Verified User
France
I have known xcell for several years. They are highly developed and well thought out products. I feel safer using the XStealth PRO. I think it's essential to protect our data these days.
Verified User
Norway & Lithuania
Great service. After a few weeks of use, no issues at all. The battery performs well, and the quality is impressive from the start. I made sure the ZERO IMEI function works, and it does. I have successfully tested it with a network operator. I recommend it, and when the time is right, we'll order more phones.
Special Functions
Defensive & Offensive Security
Get ahead of threats with powerful defensive and offensive security features
IMEI Change
Change your phone. With the IMEI Change feature, you can alter your phone's identity, making it difficult for GSM Interceptors to track or intercept your communications. Combining IMEI and IMSI changes ensures your calls, SMS and location remain completely secure and untraceable, giving you a new phone and SIM simultaneously.
IMSI Change
Change Your SIM. The IMSI Change feature generates new, valid IMSI numbers on the fly, effectively providing a new SIM card with each change. This ensures your communications remain untraceable. Seamlessly clone any SIM card and use a virtual SIM instead. Stay protected without relying on the Internet, special SIMs or additional costs.
Mode
Adapts to your needs. Mode allows you to easily switch between Hunting Mode, which detects and alerts intercepted calls and SMS, and Anti-Interception Mode, which blocks all communications during active monitoring. This flexibility gives you complete control over your communications security, ensuring you are protected in every situation.
Channel Lock
Lock in your security. The Channel Lock feature locks the uplink and downlink radio channels used for communication between your phone and the cell tower. This prevents forced handovers and stops your phone from connecting to fake towers used by GSM Interceptors. Avoid Interception by staying on real towers.
XTerminator
Neutralizes threats. XTerminator launches a potent OTA attack against IMSI catchers and GSM Interceptors. It floods uplink channels with fast connection requests via RACCH, similar to a DoS attack. This stealthy approach is undetectable to interceptors, ensuring maximum disruption.
Sentinel
Keeps your phone anchored. Sentinel's anti-standby mode simulates an ongoing call, preventing your phone from connecting to other cell towers. It locks onto the current tower by continuously sending immediate assignment requests. The result is a stable connection and protection against IMSI Catcher interference.
Secure Comms & Location Management
Your words and movements protected and empowered
Secure Call
Protected when it counts. Encrypt your calls with MLSP® technology, using quantum-resistant cryptography that connects directly over the cellular network between PRO and ULTRA devices - no servers, no internet, no subscriptions. Bulletproof encryption when you need it, seamless calls when you don't, to call any phone.
XCrypt MLSP
Privacy in every message. XCrypt MLSP® is a groundbreaking encryption solution that secures your SMS communications like never before. Using patented quantum-resistant cryptography, your messages are encrypted directly via cellular network between PRO and ULTRA devices - no third-party servers, no data connection, no Internet required.
Sat Comm
Connect globally. Communicate with phones anywhere using satellite connections, even when cellular networks are jammed or blocked. SatCom serves as a critical fallback for connectivity in challenging situations. Requires additional hardware and a monthly subscription. Interception alerts keep your SatCom secure.
Cross-Platform Encrypted Messaging
Third party E2E apps. Communicate securely with any phone using encrypted third-party apps to ensure your messages, pictures, and videos remain private. While Threema is available for installation, additional encrypted apps can be added upon request to keep your communications safe from prying eyes.
Location Spoofing
Control your location. Use cell tower selection to keep your true location concealed by connecting to the most distant cell tower. Your phone will appear to be 1-10km away from where you actually are, ensuring that tracking systems and the network operator cannot pinpoint your real position. Enjoy the freedom of secure and private movement.
Monitoring & Alerts
Make better decisions with real-time monitoring and instant threat alerts
Spyware Detection
Advanced spyware defense. Safeguard your phone from abusive and sophisticated government-grade spyware like Pegasus and FinSpy, as well as any malicious code. The phone blocks forced and remote code execution, ensuring your device is protected against any spyware installation.
A5 Tracer
Identify the threat. A5 Tracer alerts you to any voice or data interception. Although calls and messages are encrypted by default, GSM Interceptors can force your phone into unencrypted mode (A5/0). This feature allows you to react quickly and take action to protect your privacy.
C2 Monitoring
Detect rogue networks. This feature monitors network parameters to identify when GSM Interceptors force your phone to connect to fake base stations using BCCH manipulation and other techniques. It alerts you to anomalies by comparing signal strengths and neighboring cell towers.
cryptoTRACER
Detect Lawful Interception. This feature identifies if your calls or SMS are being monitored by operator assistance, abusive state actors, or other agencies. It uses advanced technology to scan for interception attempts and alerts you immediately if any SS7 interception is detected.
Network Scan
Live detection and analysis. This feature offers real-time monitoring of your network to detect IMSI Catchers, GSM Interceptors, and SS7 interceptions. It utilizes intelligent scanning to provide accurate alerts with no false positives. Rest assured, no threat goes undetected.
LAC Change detector
Stationary threat detection. This feature detects abnormal Location Area Code (LAC) changes that should only occur when you are moving. If LAC changes are detected when you're stationary, it signals GSM Interceptor activity, alerting you to interference. Peace of mind in the environment you trust.
Location Tracking Alert
They Track, We Detect. This feature alerts you when your phone receives location tracking pings or when there’s an attempt to extract the encryption key (Ki) from your SIM card. Stay protected and aware of any unauthorized tracking or key extraction activities.
No Signal Alert
Detect signal disruptions. No Signal Alert continuously monitors your SIM card and network for signs of GSM Interceptors trying to force your phone to connect to fake base stations. It provides instant alerts to keep you aware of any network tampering.
Forensic Security
Last Resort: When Control Is Lost, Protection Must Take Over
Self-Destruct
Caught? The Phone Won’t Talk. Self-Destruct secure wipes your phone when you don’t have time to react. No unlock for X hours? Wiped. Even sealed inside a Faraday bag, the countdown keeps ticking. Someone tries USB data access while your phone is locked? Wiped. You hit the hidden Panic Button? Wiped. And after the wipe? ZERO IMEIs vanish. What’s left is a clean, fresh device with new unused IMEIs. Trying to collect evidence? You’re holding a stranger.
Secure Wipe
Too Many Wrong Attempts? It’s Over. Secure Wipe protects your device from brute-force attacks. You define the limit. They guess the password too many times? Wiped. They plug in password cracking tools? Wiped. They thought they could break in. They didn’t know the phone would break itself. All data is overwritten, erased, then overwritten again using the Zero Fill method, certified as unrecoverable to anyone else. What’s left behind? Just a stranger’s phone.
XDuress
Forced to Unlock? You Still Have a Choice. XDuress gives you one final layer of protection. Someone demands your password? You enter your Duress PIN instead. The screen unlocks... but behind the scenes? Wiped. ZERO IMEIs vanish. No data. No secrets left. They think they got in. All they got was a blank phone and nothing useful. Because when you're under pressure, your phone still answers to you, not to them.
Tech Specs
Basic info
Model
XStealth Pro
Operating System
Android 12 (Proprietary Fork)
Dimension
150*74*13.4 mm
Colours
Black+Silver
Language
Multi-language
Hardware
Display
5.71-inch HD+ Water drop screen, 1520x720px
Processor
MT6761 Cortex-A53 quad-core, up to 2.0GHz
RAM
3 GB DDR3
ROM
32 GB eMMc, support TF card up to 128 GB maximally
Camera
Rear camera 13.0MP + 0.3MP; Front camera 5.0MP
Battery
Built-in 3.7V/4000mAh Li-Polymer battery
Sensors
G-sensor, light sensor, proximity sensor, magnetic field sensor,
gyro sensor
gyro sensor
Speaker
1318 BOX speaker
Mic
Silicon Mic
Bands 2G
GSM 850/900/1800/1900MHz
Bands 3G
WCDMA 850/900/1700/1900/2100MHz
Bands 4G FDD
B1/B2/B3/B4/B5/B7/B8/B12/B13/B17/B19/B20/B28a/B28b/B18/B25/
B26/B66
B26/B66
Bands 4G TDD
B38/B40/B41
Wi-Fi
IEEE 802.11 a/b/g/n/ac, support 2.4GHz/5GHz dual-band Wi-Fi
Bluetooth
Removed
NFC
Support
GNSS
Support GPS/BDS/Glonass/Galileo
I/O Interface
Nano SIM card slot
2 or (1*Nano SIM card + 1*TF card)
TF card slot
*1
USB Type-C
*1