X-ONE XTerminator

XCell News

X-ONE Stealth Phone

Blog icon written by XCell Technologies
Calendar icon

Published on November 05, 2021

The first 4G Stealth Phone

Attacking and disabling a GSM Interceptor / IMSI Catcher over the air by using a special Stealth Phone has became reality since 2016, when our XStealth Military Version and later XCell Battle Station was rolled out as custom made products.

Finally your waiting has reach an end. Now, this revolutionary and unique special function is available for anyone that value privacy and security. X-ONE Stealth Phone is now released.

XTerminator, the special function that allow OTA attacks against IMSI Catchers will come preinstalled by default.

IMSI Catcher attack XTerminator

X-ONE has been developed as primary telecommunication device for field operatives during abroad covert operations. Corporate and personal use is also predictable, since nowadays hackers and other entities are having more and more access to interception systems, not to mention illegal (warantless) call interception made by various state actors and abusive govt.

Beside usual alerts as Call Interception Alert, SMS Interception Alert and Location Tracking Alert, X-ONE allow user to launch targeted attacks over the air (OTA) against IMSI Catchers / GSM Interceptors, the phone remaining in the same time out of IMSI Catchers reach. Highly sophisticated yet easy to use, effective and deadly, our newest release is a weaponized cell phone that can be successfully used against active and semi active mobile interception systems.

XTerminator targets IMSI Catcher

Let’s keep in touch!

We’d love to keep you updated with our latest news and offers

Further articles

A smartphone using Protonmail

Attention Proton-Mail users!

We have to remind you of our approach when it comes to encryption: it is for average people to use and will only defend you against (some) hackers. It will not protect you at all against law enforcement, as you will read in this article.

ABC Limited exposed

Secure WIFI router scam

There will always be fraudsters who take advantage of the desire for security by overpricing normal products and claiming that these have “security features”. As in this case… Read more

REVOLTE ATTACK

Revolte attack

This attack allows an attacker to break the encryption of VoLTE voice calls and spy on the calls being targeted. Read the full article