ENCRYPTED CALLS SERVER FOR MOBILE PHONES
NO EXTERNAL INTRUSION - NO OUTSIDE ACCESS - NO BACK DOORS - NO LOGS
WE SUPPLY THE SERVERS,ROUTERS,CABLES,INTERNET LINK,THE TECHNOLOGY,THE SET UP,THE KNOW HOW AT YOUR LOCATION
NOW YOU HAVE NO MORE EXCUSE TO USE THE MASS SURVEILLANCE FREE COMMUNICATION TECHNOLOGIES !
CRYPTOCOMM TECHNOLOGIES,SERVICES AND EQUIPMENTS ARE WORLD WIDE AVAILABLE WITH NO RESTRICTIONS
THE SAFETY OF OUR EVERYDAY MOBILE PHONE COMMUNICATIONS SHOULD BE A PRIORITY FOR ALL OF US,HOMO SPIRITUS !!!
WE PROVIDES A SECURE WAY OF COMMUNICATION OVER INSECURE EXISTING IP NETWORKS.CENTURION OFFERS TRUE PEER-TO-PEER KEY MANAGEMENT
FOR THE STRONGEST ALGORITHMS AND PROTOCOLS AVAILABLE TODAY,
IN AN EASY-TO-USE PACKAGE, THAT MAKES SECURE CALLING AS SIMPLE AS MAKING AN ORDINARY PHONE CALL.
THE COMPONENTS OF THE ENCRYPTION SUITE FOR THE VOICE & VIDEO ENCRYPTED COMMUNICATIONS ARE:
■ SYMMETRIC ENCRYPTION: AES-256 – FIPS PUB 197
■ SECURE HASH ALGORITHM 2 (SHA-256) – MESSAGE DIGEST
■ KEY AGREEMENT: DIFFIE – HELLMAN – NIST SP 800-56A
■ DIFFIE – HELLMAN WITH VARIABLE LENGTH – KEY AGREEMENT
■ KEY AGREEMENT: ELLIPTIC CURVE DIFFIE-HELLMAN – NIST SP 800-56A
■ ATTACK DETECTION: SHORT AUTHENTICATION STRING – 80 BIT
ALTHOUGH IT USES A PUBLIC KEY ALGORITHM, IT DOES NOT RELY ON A PUBLIC KEY INFRASTRUCTURE (PKI). IN FACT, IT DOES NOT USE PERSISTENT PUBLIC KEYS AT ALL.
IT USES EPHEMERAL DIFFIE-HELLMAN(DH) WITH HASH COMMITMENT AND ALLOWS THE DETECTION OF MAN-IN-THE-MIDDLE (MITM) ATTACKS BY DISPLAYING A SHORT
AUTHENTICATION STRING (SAS) FOR THE USERS TO READ AND VERBALLY COMPARE OVER THE PHONE.
■ EUROPEAN GDPR LEGISLATION COMPLIANT [ IT IS A MANDATORY TECHNICAL DEPLOYMENT MEASURE IN ORDER TO CERTIFY DATA PRIVACY REGULATION]
■ VPN SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID VPN PROTOCOL MODE
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP ZTE
■ VPN ROUTER SUPPLY AND SETUP
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" PROTOCOL MODE
PARANOID FIREWALL
■ FIREWALL SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID FIREWALL PROTOCOL MODE
■ COMPLEX PROTECTION ALGORITHMS
■ CARRIER GRADE PROTECTION
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ FIREWALL ROUTER SUPPLY AND SETUP
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ COMPLEX ACCESS RIGHTS LEVEL
■ "WORST SCENARIO" ARCHITECTURE
PARANOID EMAIL SERVER
■ EMAIL SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID EMAIL ENCRYPTION MODE
■ COMPLEX PROTECTION ALGORITHMS
■ INTERNAL ACCESS MODE ONLY
■ PARANOID END TO END SECURITY
■ COMPLEX CERTIFICATION ALGORITHMS
■ LINUX NOTEBOOKS DESKTOPS
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ COMPLEX ACCESS RIGHTS LEVEL
■ "WORST SCENARIO" PROTOCOL MODE
■ SMS SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID SMS PROTOCOL MODE
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ SECURE GROUP SMS + FILE SHARE
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ MOBILE TABLET LAPTOP COMPATIBLE
■ IPV6 PIONEERING TECHNOLOGY
■ GPS AND TRACKING DATA IMPOSSIBLE
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
PARANOID SMS SERVER
BUNKER DATA HOSTING
■ 24/7/365 ARMED PROTECTION
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID STEEL PROTECTION ROOM
■ 300 M DEEP IN THE MOUNTAINS LOCK
■ CARRIER GRADE HIGH SPEED FLOW
■ CRYPTO CURRENCY PROJECTS IDEAL
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ CRYPTOEXCHANGE PROJECT HOSTING
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ ISP PEERING USA ASIA EU LATAM USSR
■ SWISS CONFEDERATION PROTECTION
■ 24/7/365 99,55% 10 GB TX/RX FIBRE LINK
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
ENCRYPTED WIFI NETWORK
■ WIFI EQUIPMENTS SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID ENCRYPTION PROTOCOL
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ DATA ENCRYPTION DIPLOMATIC LEVEL
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ PUBLIC OR PRIVATE SENSIBLE AREAS
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
■ INMARSAT ISATPHONE 2 SATELLITE
■ IRIDIUM EXTREME 9575 SATELLITE CELL
■ IRIDIUM 9555 SATELLITE AVIATION
■ INMARSAT SATELLITE MARINE
■ THURAYA SATSLEEVE HOTSPOT
■ GLOBALSTAR GSP-1700 SATELLITE
■ ASE MC08 COMCENTER IRIDIUM FUXED
■ HUGHES 9250 MOBILE INMARSAT BGAN
■ INTELLIAN FB500 BROADBANDMARITIME
■ IRIDIUM SBD LIMITLESS 9523 & GPS
■ MCMURDO SMARTFIND TRANSPONDER
■ COBHAM EXPLORER 710 BGAN
■ HUGHES 9211-HDR PORTABLE TERMINAL
■ THRANE EXPLORER 7 INMARSAT BGAN
■ THRANE EXPLORER 727 MOBILE BGAN
■ IRIDIUM 9501 SATELLITE PAGER
■ REINFORCED STEEL NOTEBOOK SUPPLY
■ ULTRA-SECURE LINUX DISTRIBUTION
■ PARANOID VPN SERVICE ACTIVE
■ PARANOID SMS SERVICE ACTIVE
■ PARANOID EMAIL SERVICE ACTIVE
■ PARANOID VOICE SERVICE ACTIVE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION ACTIVE
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED ARMY CASE BAG
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ ON DEMAND 24H REPLACEMENT
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
ULTRA-SECURE LINUX NOTEBOOK
ENCRYPTED SATELLITE MOBILE PHONE
SECURE BUNKER DATA CENTRE CONSTRUCTION
■ SMALL AND MEDIUM SCALE PROJECTS
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID STRUCTURAL APPROACH
■ SPECIAL MAGNETIC FLUID ISOLATION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ HIGH END EQUIPMENTS & TOOLS
■ OUT OF THE BOX ACCESS PROTOCOLS
■ IPV6 PIONEERING TECHNOLOGY
■ IDEAL FOR CRYPTOCURRENCY PROJECT
■ COPPER AND MAGNESIUM WALLS
■ SPECIAL PERSONNEL TRAINING
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" SECURITY MODE
YACHT ENCRYPTED COMMUNICATIONS RACK
■ REINFORCED MAGNESIUM RACK SUPPLY
■ ULTRA-SECURE LIGHT EQUIPMENTS
■ PARANOID VPN SERVER SERVICE
■ PARANOID SMS SERVER SERVICE
■ PARANOID EMAIL SERVER SERVICE
■ PARANOID VOICE SERVER SERVICE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION SERVER
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED MOBILE EQUIP.
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY & MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ SELF MANAGEMENT WITH NO EXTERNAL
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
PRIVATE JET ENCRYPTED COMMUNICATIONS RACK
■ REINFORCED MAGNESIUM RACK SUPPLY
■ ULTRA-SECURE LIGHT EQUIPMENTS
■ PARANOID VPN SERVER SERVICE
■ PARANOID SMS SERVER SERVICE
■ PARANOID EMAIL SERVER SERVICE
■ PARANOID VOICE SERVER SERVICE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION SERVER
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED MOBILE EQUIP.
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY & MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ SELF MANAGEMENT WITH NO EXTERNAL
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
VIRTUAL GSM COMMUNICATIONS LINE
■ UP TO 120 GSM SIM CARDS /LOCATION
■ CALLS ARE NOT ENCRYPTED
■ USERS CANT BE TRACED BY LOCATION
■ USER MOVEMENTS ARE 100% PRIVATE
■ ALL VOICE AND SMS ARE FORWARDED
■ THE SECURE VOICE ENABLE PRIVACY
■ ALL CALLS ARE TROUGH SECURE LINES
■ FOREIGN COUNTRIES DO NOT ACCESS
■ SMS ARE FORWARDED ENCRYPTED
■ THE SIM CARDS ARE FIXED LOCATION
■ NO BLACK BOX MONITORING ACCESS
■ NO GPS TRACKING OF THE USER
■ REMOTELY CONTROLLED AND MANAGED
■ LOCATION MANAGEMENT CONTROL
■ USER VOICES ARE IDENTIFIABLE
■ CALLING ROUTES CONTROL