
New added special features
There’s a golden ticket for our users, and a backstage pass for our resellers that we’re sending to you so you can dive back into epic insights of the XStealth project.
Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special Stealth Phone has became reality since 2016, when our XStealth Military Version and later XCell Battle Station was rolled out as custom made products.
Finally your waiting has reach an end. Now, this revolutionary and unique special function is available for anyone that value privacy and security. X-ONE Stealth Phone is now released.
XTerminator, the special function that allow OTA attacks against IMSI Catchers will come preinstalled by default.
X-ONE has been developed as primary telecommunication device for field operatives during abroad covert operations. Corporate and personal use is also predictable, since nowadays hackers and other entities are having more and more access to interception systems, not to mention illegal (warantless) call interception made by various state actors and abusive govt.
Beside usual alerts as Call Interception Alert, SMS Interception Alert and Location Tracking Alert, X-ONE allow user to launch targeted attacks over the air (OTA) against IMSI Catchers / GSM Interceptors, the phone remaining in the same time out of IMSI Catchers reach. Highly sophisticated yet easy to use, effective and deadly, our newest release is a weaponized cell phone that can be successfully used against active and semi active mobile interception systems.

There’s a golden ticket for our users, and a backstage pass for our resellers that we’re sending to you so you can dive back into epic insights of the XStealth project.

This case, discovered by Indian cybersecurity researcher Anand Prakash, was just a bug of bad programming, and is euphemistically called IDOR, short for Insecure Direct Object Reference.

We have always rejected user requests for caller ID spoofing solutions. Once the phone is out in the wild, it exposes the user to many security threats. Read the full article for an overview.