top of page

ENCRYPTED CALLS SERVER  FOR MOBILE PHONES

  NO EXTERNAL INTRUSION - NO OUTSIDE ACCESS - NO BACK DOORS - NO LOGS 

WE SUPPLY THE SERVERS,ROUTERS,CABLES,INTERNET LINK,THE TECHNOLOGY,THE SET UP,THE KNOW HOW AT YOUR LOCATION

NOW YOU HAVE NO MORE EXCUSE TO USE THE  MASS SURVEILLANCE FREE COMMUNICATION TECHNOLOGIES !

CRYPTOCOMM TECHNOLOGIES,SERVICES AND EQUIPMENTS ARE WORLD WIDE AVAILABLE WITH NO RESTRICTIONS

THE SAFETY OF OUR EVERYDAY MOBILE PHONE COMMUNICATIONS SHOULD BE A PRIORITY FOR ALL OF US,HOMO SPIRITUS !!!
WE PROVIDES A SECURE WAY OF COMMUNICATION OVER INSECURE EXISTING IP NETWORKS.CENTURION OFFERS TRUE PEER-TO-PEER KEY MANAGEMENT

FOR THE STRONGEST ALGORITHMS AND PROTOCOLS AVAILABLE TODAY,
IN AN EASY-TO-USE PACKAGE, THAT MAKES SECURE CALLING AS SIMPLE AS MAKING AN ORDINARY PHONE CALL.


THE COMPONENTS OF THE ENCRYPTION  SUITE FOR THE VOICE & VIDEO ENCRYPTED COMMUNICATIONS ARE:
■ SYMMETRIC ENCRYPTION: AES-256 – FIPS PUB 197
■ SECURE HASH ALGORITHM 2 (SHA-256) – MESSAGE DIGEST
■ KEY AGREEMENT: DIFFIE – HELLMAN – NIST SP 800-56A
■ DIFFIE – HELLMAN WITH VARIABLE LENGTH – KEY AGREEMENT
■ KEY AGREEMENT: ELLIPTIC CURVE DIFFIE-HELLMAN – NIST SP 800-56A
■ ATTACK DETECTION: SHORT AUTHENTICATION STRING – 80 BIT
ALTHOUGH IT USES A PUBLIC KEY ALGORITHM, IT DOES NOT RELY ON A PUBLIC KEY INFRASTRUCTURE (PKI). IN FACT, IT DOES NOT USE PERSISTENT PUBLIC KEYS AT ALL.
IT USES EPHEMERAL DIFFIE-HELLMAN(DH) WITH HASH COMMITMENT AND ALLOWS THE DETECTION OF MAN-IN-THE-MIDDLE (MITM) ATTACKS BY DISPLAYING A SHORT

AUTHENTICATION STRING (SAS) FOR THE USERS TO READ AND VERBALLY COMPARE OVER THE PHONE.

■ EUROPEAN GDPR LEGISLATION COMPLIANT [ IT IS A MANDATORY TECHNICAL DEPLOYMENT MEASURE IN ORDER TO CERTIFY DATA PRIVACY REGULATION]

Our Servuces

■ VPN SERVER SUPPLY AND SETUP

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID VPN PROTOCOL MODE

■ UP TO 6 LAYERS OF E2E  ENCRYPTION

■ CARRIER GRADE HIGH SPEED FLOW

■ PARANOID END TO END SECURITY

■ CISCO MIKROTIK IBM HUAWEI  HP ZTE

■ VPN ROUTER SUPPLY AND SETUP

■ IPV6 PIONEERING TECHNOLOGY

■ DYNAMIC DNS PROTECTION

■ NO GOOGLE FACEBOOK APPLE  ACCESS

■ LIECHTENSTEIN JURISDICTION GUARD 

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ NO LOGS NO ARCHIVES NO FILES COPY

■ "WORST SCENARIO" PROTOCOL MODE

PARANOID FIREWALL

■ FIREWALL  SERVER SUPPLY AND SETUP

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID FIREWALL PROTOCOL MODE

■ COMPLEX PROTECTION ALGORITHMS

■ CARRIER GRADE PROTECTION

■ PARANOID END TO END SECURITY

■ CISCO MIKROTIK IBM HUAWEI  HP DELL

■ FIREWALL  ROUTER SUPPLY AND SETUP

■ IPV6 PIONEERING TECHNOLOGY

■ DYNAMIC DNS PROTECTION

■ NO GOOGLE FACEBOOK APPLE  ACCESS

■ LIECHTENSTEIN JURISDICTION GUARD 

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ COMPLEX ACCESS RIGHTS LEVEL

■ "WORST SCENARIO" ARCHITECTURE

PARANOID EMAIL SERVER

■ EMAIL  SERVER SUPPLY AND SETUP

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID EMAIL ENCRYPTION  MODE

■ COMPLEX PROTECTION ALGORITHMS

■ INTERNAL ACCESS MODE ONLY

■ PARANOID END TO END SECURITY

■ COMPLEX CERTIFICATION ALGORITHMS

■ LINUX NOTEBOOKS DESKTOPS

■ IPV6 PIONEERING TECHNOLOGY

■ DYNAMIC DNS PROTECTION

■ NO GOOGLE FACEBOOK APPLE  ACCESS

■ LIECHTENSTEIN JURISDICTION GUARD 

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ COMPLEX ACCESS RIGHTS LEVEL

■ "WORST SCENARIO" PROTOCOL MODE

■ SMS SERVER SUPPLY AND SETUP

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID SMS PROTOCOL MODE

■ UP TO 6 LAYERS OF E2E  ENCRYPTION

■ SECURE GROUP SMS + FILE SHARE

■ PARANOID END TO END SECURITY

■ CISCO MIKROTIK IBM HUAWEI  HP DELL

■ MOBILE TABLET LAPTOP COMPATIBLE

■ IPV6 PIONEERING TECHNOLOGY

■ GPS AND TRACKING DATA IMPOSSIBLE

■ NO GOOGLE FACEBOOK APPLE  ACCESS

■ LIECHTENSTEIN JURISDICTION GUARD 

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ NO LOGS NO ARCHIVES NO FILES COPY

■ "WORST SCENARIO" ARCHITECTURE

PARANOID SMS SERVER 
BUNKER DATA HOSTING

■ 24/7/365 ARMED PROTECTION

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID STEEL PROTECTION ROOM

■ 300 M DEEP IN THE MOUNTAINS LOCK

■ CARRIER GRADE HIGH SPEED FLOW

■ CRYPTO CURRENCY PROJECTS IDEAL

■ CISCO MIKROTIK IBM HUAWEI  HP DELL

■ CRYPTOEXCHANGE PROJECT HOSTING

■ IPV6 PIONEERING TECHNOLOGY

■ DYNAMIC DNS PROTECTION

■ ISP PEERING USA ASIA EU LATAM USSR

■ SWISS CONFEDERATION PROTECTION 

24/7/365 99,55% 10 GB TX/RX FIBRE LINK

■ RANDOM PORT ROUTING MODE ACTIVE

■ NO LOGS NO ARCHIVES NO FILES COPY

■ "WORST SCENARIO" ARCHITECTURE

ENCRYPTED WIFI NETWORK

■ WIFI EQUIPMENTS  SUPPLY AND SETUP

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID ENCRYPTION PROTOCOL

■ UP TO 6 LAYERS OF E2E  ENCRYPTION

■ CARRIER GRADE HIGH SPEED FLOW

■ PARANOID END TO END SECURITY

■ CISCO MIKROTIK IBM HUAWEI  HP DELL

■ DATA ENCRYPTION DIPLOMATIC LEVEL

■ IPV6 PIONEERING TECHNOLOGY

■ DYNAMIC DNS PROTECTION

■ NO GOOGLE FACEBOOK APPLE  ACCESS

■ PUBLIC OR PRIVATE SENSIBLE AREAS

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ NO LOGS NO ARCHIVES NO FILES COPY

■ "WORST SCENARIO" ARCHITECTURE

■ INMARSAT ISATPHONE 2 SATELLITE

■ IRIDIUM EXTREME 9575 SATELLITE CELL

■ IRIDIUM 9555 SATELLITE AVIATION

■ INMARSAT SATELLITE MARINE

■ THURAYA SATSLEEVE HOTSPOT

■ GLOBALSTAR GSP-1700 SATELLITE

■ ASE MC08 COMCENTER IRIDIUM FUXED

■ HUGHES 9250 MOBILE INMARSAT BGAN

■ INTELLIAN FB500 BROADBANDMARITIME

■ IRIDIUM SBD LIMITLESS 9523 & GPS

■ MCMURDO SMARTFIND TRANSPONDER

■ COBHAM EXPLORER 710 BGAN 

■ HUGHES 9211-HDR PORTABLE TERMINAL

■ THRANE EXPLORER 7 INMARSAT BGAN

■ THRANE EXPLORER 727 MOBILE  BGAN

■ IRIDIUM 9501 SATELLITE PAGER

■ REINFORCED STEEL NOTEBOOK SUPPLY

■ ULTRA-SECURE LINUX DISTRIBUTION

■ PARANOID VPN SERVICE  ACTIVE

■ PARANOID SMS SERVICE ACTIVE

■ PARANOID EMAIL SERVICE  ACTIVE

■ PARANOID VOICE SERVICE ACTIVE

■ PARANOID VIDEO CONFERENCE SERVER

■ PARANOID WIFI PROTECTION ACTIVE

■ SATELLITE DATAUPLINK BGAN ATTACHED

■ BUSINESS OR RUGGED ARMY CASE BAG

■ CONCIERGE DELIVERY AND SUPPORT

■ ULTRA SECURITY MANAGEABILITY

■ ROCK‐SOLID SECURE SSD STORAGE 

■ ON DEMAND 24H REPLACEMENT 

■ BUNKER DATA BACKUP RESTORE

■ IDEAL FOR TRADING AND BANKING

ULTRA-SECURE LINUX NOTEBOOK
ENCRYPTED SATELLITE  MOBILE PHONE
SECURE BUNKER DATA CENTRE CONSTRUCTION

■ SMALL AND MEDIUM SCALE PROJECTS

GDPR COMPLIANT AND CERTIFICATION

■ PARANOID STRUCTURAL APPROACH

■ SPECIAL MAGNETIC FLUID ISOLATION

■ CARRIER GRADE HIGH SPEED FLOW

■ PARANOID END TO END SECURITY

■ HIGH END EQUIPMENTS & TOOLS

■ OUT OF THE BOX ACCESS PROTOCOLS

■ IPV6 PIONEERING TECHNOLOGY

■ IDEAL FOR CRYPTOCURRENCY PROJECT

■ COPPER AND MAGNESIUM WALLS

■ SPECIAL PERSONNEL TRAINING 

■ 24/7/365 GUARD ACTIVE PROTECTION

■ RANDOM PORT ROUTING MODE ACTIVE

■ NO LOGS NO ARCHIVES NO FILES COPY

■ "WORST SCENARIO" SECURITY  MODE

YACHT  ENCRYPTED  COMMUNICATIONS  RACK

■ REINFORCED MAGNESIUM RACK SUPPLY

■ ULTRA-SECURE LIGHT EQUIPMENTS

■ PARANOID VPN SERVER SERVICE 

■ PARANOID SMS SERVER SERVICE 

■ PARANOID EMAIL SERVER SERVICE  

■ PARANOID VOICE SERVER SERVICE  

■ PARANOID VIDEO CONFERENCE SERVER

■ PARANOID WIFI PROTECTION SERVER

■ SATELLITE DATAUPLINK BGAN ATTACHED

■ BUSINESS OR RUGGED MOBILE EQUIP.

■ CONCIERGE DELIVERY AND SUPPORT

■ ULTRA SECURITY & MANAGEABILITY

■ ROCK‐SOLID SECURE SSD STORAGE 

■ SELF MANAGEMENT WITH NO EXTERNAL

■ BUNKER DATA BACKUP RESTORE

■ IDEAL FOR TRADING AND BANKING

PRIVATE JET ENCRYPTED COMMUNICATIONS RACK

■ REINFORCED MAGNESIUM RACK SUPPLY

■ ULTRA-SECURE LIGHT EQUIPMENTS

■ PARANOID VPN SERVER SERVICE 

■ PARANOID SMS SERVER SERVICE 

■ PARANOID EMAIL SERVER SERVICE  

■ PARANOID VOICE SERVER SERVICE  

■ PARANOID VIDEO CONFERENCE SERVER

■ PARANOID WIFI PROTECTION SERVER

■ SATELLITE DATAUPLINK BGAN ATTACHED

■ BUSINESS OR RUGGED MOBILE EQUIP.

■ CONCIERGE DELIVERY AND SUPPORT

■ ULTRA SECURITY & MANAGEABILITY

■ ROCK‐SOLID SECURE SSD STORAGE 

■ SELF MANAGEMENT WITH NO EXTERNAL

■ BUNKER DATA BACKUP RESTORE

■ IDEAL FOR TRADING AND BANKING

VIRTUAL GSM COMMUNICATIONS LINE

■ UP TO 120 GSM SIM CARDS /LOCATION

■ CALLS ARE NOT ENCRYPTED

■ USERS CANT BE TRACED BY LOCATION

■ USER MOVEMENTS ARE 100% PRIVATE

■ ALL VOICE AND SMS ARE FORWARDED

■ THE SECURE VOICE ENABLE PRIVACY

■ ALL CALLS ARE TROUGH SECURE LINES

■ FOREIGN COUNTRIES DO NOT ACCESS

■ SMS ARE FORWARDED ENCRYPTED

■ THE SIM CARDS ARE FIXED LOCATION

■ NO BLACK BOX MONITORING ACCESS

■ NO GPS TRACKING OF THE USER

■ REMOTELY CONTROLLED AND MANAGED

■ LOCATION MANAGEMENT CONTROL

■ USER VOICES ARE IDENTIFIABLE

■ CALLING ROUTES  CONTROL

Contact
bottom of page