GECODEERDE GESPREK SERVER VOOR MOBIELE
GEEN EXTERNE INTRUSIE - GEEN BUITEN TOEGANG - GEEN RUGDEUREN
WIJ LEVEREN DE SERVERS, ROUTERS, KABELS, INTERNETLINK, DE TECHNOLOGIE, DE INSTALLATIE, DE KNOW HOE OP UW LOCATIE
NU HEB JE GEEN EXCUTIE OM DE MASSABEWAKING GRATIS COMMUNICATIETECHNOLOGIEEN TE GEBRUIKEN!
CRYPTOCOMM TECHNOLOGIEËN, DIENSTEN EN APPARATUUR ZIJN WERELDWIJD BESCHIKBAAR ZONDER BEPERKINGEN
ALLE DIENSTEN EN TECHNOLOGIEËN ZIJN ALLEEN BESTEMD VOOR BEDRIJFS- EN DIPLOMATISCH INTERNE GEBRUIK,
NIET VOOR WEDERVERKOOP OF ALGEMEEN PUBLIEK GEBRUIK
THE SAFETY OF OUR EVERYDAY MOBILE PHONE COMMUNICATIONS SHOULD BE A PRIORITY FOR ALL OF US,
WE PROVIDES A SECURE WAY OF COMMUNICATION OVER INSECURE EXISTING IP NETWORKS.CENTURION OFFERS TRUE PEER-TO-PEER KEY MANAGEMENT
FOR THE STRONGEST ALGORITHMS AND PROTOCOLS AVAILABLE TODAY,
IN AN EASY-TO-USE PACKAGE, THAT MAKES SECURE CALLING AS SIMPLE AS MAKING AN ORDINARY PHONE CALL.
THE COMPONENTS OF THE ENCRYPTION SUITE FOR THE VOICE & VIDEO ENCRYPTED COMMUNICATIONS ARE:
■ SYMMETRIC ENCRYPTION: AES-256 – FIPS PUB 197
■ SECURE HASH ALGORITHM 2 (SHA-256) – MESSAGE DIGEST
■ KEY AGREEMENT: DIFFIE – HELLMAN – NIST SP 800-56A
■ DIFFIE – HELLMAN WITH VARIABLE LENGTH – KEY AGREEMENT
■ KEY AGREEMENT: ELLIPTIC CURVE DIFFIE-HELLMAN – NIST SP 800-56A
■ ATTACK DETECTION: SHORT AUTHENTICATION STRING – 80 BIT
ALTHOUGH IT USES A PUBLIC KEY ALGORITHM, IT DOES NOT RELY ON A PUBLIC KEY INFRASTRUCTURE (PKI). IN FACT, IT DOES NOT USE PERSISTENT PUBLIC KEYS AT ALL.
IT USES EPHEMERAL DIFFIE-HELLMAN(DH) WITH HASH COMMITMENT AND ALLOWS THE DETECTION OF MAN-IN-THE-MIDDLE (MITM) ATTACKS BY DISPLAYING A SHORT
AUTHENTICATION STRING (SAS) FOR THE USERS TO READ AND VERBALLY COMPARE OVER THE PHONE.
■ EUROPEAN GDPR LEGISLATION COMPLIANT [ IT IS A MANDATORY TECHNICAL DEPLOYMENT MEASURE IN ORDER TO CERTIFY DATA PRIVACY REGULATION]
PARANOID VPN SERVER
■ VPN SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID VPN PROTOCOL MODE
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP ZTE
■ VPN ROUTER SUPPLY AND SETUP
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" PROTOCOL MODE
PARANOID FIREWALL
■ FIREWALL SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID FIREWALL PROTOCOL MODE
■ COMPLEX PROTECTION ALGORITHMS
■ CARRIER GRADE PROTECTION
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ FIREWALL ROUTER SUPPLY AND SETUP
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ COMPLEX ACCESS RIGHTS LEVEL
■ "WORST SCENARIO" ARCHITECTURE
PARANOID EMAIL SERVER
■ EMAIL SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID EMAIL ENCRYPTION MODE
■ COMPLEX PROTECTION ALGORITHMS
■ INTERNAL ACCESS MODE ONLY
■ PARANOID END TO END SECURITY
■ COMPLEX CERTIFICATION ALGORITHMS
■ LINUX NOTEBOOKS DESKTOPS
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ COMPLEX ACCESS RIGHTS LEVEL
■ "WORST SCENARIO" PROTOCOL MODE
■ SMS SERVER SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID SMS PROTOCOL MODE
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ SECURE GROUP SMS + FILE SHARE
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ MOBILE TABLET LAPTOP COMPATIBLE
■ IPV6 PIONEERING TECHNOLOGY
■ GPS AND TRACKING DATA IMPOSSIBLE
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ LIECHTENSTEIN JURISDICTION GUARD
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
PARANOID SMS SERVER
BUNKER DATA HOSTING
■ 24/7/365 ARMED PROTECTION
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID STEEL PROTECTION ROOM
■ 300 M DEEP IN THE MOUNTAINS LOCK
■ CARRIER GRADE HIGH SPEED FLOW
■ CRYPTO CURRENCY PROJECTS IDEAL
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ CRYPTOEXCHANGE PROJECT HOSTING
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ ISP PEERING USA ASIA EU LATAM USSR
■ SWISS CONFEDERATION PROTECTION
■ 24/7/365 99,55% 10 GB TX/RX FIBRE LINK
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
ENCRYPTED WIFI NETWORK
■ WIFI EQUIPMENTS SUPPLY AND SETUP
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID ENCRYPTION PROTOCOL
■ UP TO 6 LAYERS OF E2E ENCRYPTION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ CISCO MIKROTIK IBM HUAWEI HP DELL
■ DATA ENCRYPTION DIPLOMATIC LEVEL
■ IPV6 PIONEERING TECHNOLOGY
■ DYNAMIC DNS PROTECTION
■ NO GOOGLE FACEBOOK APPLE ACCESS
■ PUBLIC OR PRIVATE SENSIBLE AREAS
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" ARCHITECTURE
■ INMARSAT ISATPHONE 2 SATELLITE
■ IRIDIUM EXTREME 9575 SATELLITE CELL
■ IRIDIUM 9555 SATELLITE AVIATION
■ INMARSAT SATELLITE MARINE
■ THURAYA SATSLEEVE HOTSPOT
■ GLOBALSTAR GSP-1700 SATELLITE
■ ASE MC08 COMCENTER IRIDIUM FUXED
■ HUGHES 9250 MOBILE INMARSAT BGAN
■ INTELLIAN FB500 BROADBANDMARITIME
■ IRIDIUM SBD LIMITLESS 9523 & GPS
■ MCMURDO SMARTFIND TRANSPONDER
■ COBHAM EXPLORER 710 BGAN
■ HUGHES 9211-HDR PORTABLE TERMINAL
■ THRANE EXPLORER 7 INMARSAT BGAN
■ THRANE EXPLORER 727 MOBILE BGAN
■ IRIDIUM 9501 SATELLITE PAGER
■ REINFORCED STEEL NOTEBOOK SUPPLY
■ ULTRA-SECURE LINUX DISTRIBUTION
■ PARANOID VPN SERVICE ACTIVE
■ PARANOID SMS SERVICE ACTIVE
■ PARANOID EMAIL SERVICE ACTIVE
■ PARANOID VOICE SERVICE ACTIVE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION ACTIVE
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED ARMY CASE BAG
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ ON DEMAND 24H REPLACEMENT
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
ULTRA-SECURE LINUX NOTEBOOK
ENCRYPTED SATELLITE MOBILE PHONE
SECURE BUNKER DATA CENTRE CONSTRUCTION
■ SMALL AND MEDIUM SCALE PROJECTS
■ GDPR COMPLIANT AND CERTIFICATION
■ PARANOID STRUCTURAL APPROACH
■ SPECIAL MAGNETIC FLUID ISOLATION
■ CARRIER GRADE HIGH SPEED FLOW
■ PARANOID END TO END SECURITY
■ HIGH END EQUIPMENTS & TOOLS
■ OUT OF THE BOX ACCESS PROTOCOLS
■ IPV6 PIONEERING TECHNOLOGY
■ IDEAL FOR CRYPTOCURRENCY PROJECT
■ COPPER AND MAGNESIUM WALLS
■ SPECIAL PERSONNEL TRAINING
■ 24/7/365 GUARD ACTIVE PROTECTION
■ RANDOM PORT ROUTING MODE ACTIVE
■ NO LOGS NO ARCHIVES NO FILES COPY
■ "WORST SCENARIO" SECURITY MODE
YACHT ENCRYPTED COMMUNICATIONS RACK
■ REINFORCED MAGNESIUM RACK SUPPLY
■ ULTRA-SECURE LIGHT EQUIPMENTS
■ PARANOID VPN SERVER SERVICE
■ PARANOID SMS SERVER SERVICE
■ PARANOID EMAIL SERVER SERVICE
■ PARANOID VOICE SERVER SERVICE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION SERVER
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED MOBILE EQUIP.
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY & MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ SELF MANAGEMENT WITH NO EXTERNAL
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
PRIVATE JET ENCRYPTED COMMUNICATIONS RACK
■ REINFORCED MAGNESIUM RACK SUPPLY
■ ULTRA-SECURE LIGHT EQUIPMENTS
■ PARANOID VPN SERVER SERVICE
■ PARANOID SMS SERVER SERVICE
■ PARANOID EMAIL SERVER SERVICE
■ PARANOID VOICE SERVER SERVICE
■ PARANOID VIDEO CONFERENCE SERVER
■ PARANOID WIFI PROTECTION SERVER
■ SATELLITE DATAUPLINK BGAN ATTACHED
■ BUSINESS OR RUGGED MOBILE EQUIP.
■ CONCIERGE DELIVERY AND SUPPORT
■ ULTRA SECURITY & MANAGEABILITY
■ ROCK‐SOLID SECURE SSD STORAGE
■ SELF MANAGEMENT WITH NO EXTERNAL
■ BUNKER DATA BACKUP RESTORE
■ IDEAL FOR TRADING AND BANKING
VIRTUAL GSM COMMUNICATIONS LINE
■ UP TO 120 GSM SIM CARDS /LOCATION
■ CALLS ARE NOT ENCRYPTED
■ USERS CANT BE TRACED BY LOCATION
■ USER MOVEMENTS ARE 100% PRIVATE
■ ALL VOICE AND SMS ARE FORWARDED
■ THE SECURE VOICE ENABLE PRIVACY
■ ALL CALLS ARE TROUGH SECURE LINES
■ FOREIGN COUNTRIES DO NOT ACCESS
■ SMS ARE FORWARDED ENCRYPTED
■ THE SIM CARDS ARE FIXED LOCATION
■ NO BLACK BOX MONITORING ACCESS
■ NO GPS TRACKING OF THE USER
■ REMOTELY CONTROLLED AND MANAGED
■ LOCATION MANAGEMENT CONTROL
■ USER VOICES ARE IDENTIFIABLE
■ CALLING ROUTES CONTROL