T2 Communicator Celulares Encriptados

T2 communicator The authentic secure cell phone with blockchain encryption

Using blockchain technology we make your crypto transactions safer and more reliable from anywhere

T2 Communicator Celulares Encriptados
estrellas calificacion

T2 Communicator
Encrypted Cellular X2
+ Shipping

400$

USD

2t communicator licencia 6meses ingles
estrellas calificacion

T2 Communicator
License 6 months
Activation/Renewal

750$

USD

2t communicator licencia 3meses ingles
estrellas calificacion

T2 Communicator
License 3 months
Activation/Renewal

400$

USD

Encriptados icono hardware

Hardware – Reliable Mobile Devices

Encrypted mobile devices designed, assembled and tested to ensure their integrity. Optimum operation with the operating system, rigorous manufacturing procedures, security, reinforced tests and quality assurance.

Encriptados icono sistema

Secure operating system

Operating system with unbreakable cybersecurity technology, security patches, updated against emerging threats and intuitive user interface. Full disk encryption.

Encriptados icono capa seguridad

Multiple layers of security for military-grade protection

We continually develop additional layers of security, making information theft virtually impossible. This guarantees our users a private communication and beyond the reach of any espionage attempt.

Chat

Chat with individuals and entire groups securely. Messages and files are not stored on the server and can self-destruct to ensure your privacy.
Top-grade encryption: The latest generation OTR encryption protocols with 16,000 bits of encryption, OMEMO and ZRTP, protect your chat messages and VoIP calls to guarantee absolutely private communication.

Chat

Remote wipe: In case you lose your phone, you can remotely wipe all the data on your cell phone by sending a predetermined combination of characters as a message to your Chat.

Chat

Timed Messages: In “For Your Eyes Only” mode when sending messages, you can set them to self-destruct when the other contact sees them, or when the preset time to live expires.

Chat

Hide Conversation: For an extra layer of security, you can hide any conversation, making it accessible via PIN authentication.

Chat

Encrypted calls: Make VoIP calls Peer to Peer (P2P) avoiding that the information passes through any server; In this way, man-in-the-middle attacks and unauthorized eavesdropping will be impossible.

Chat

Secure file transfer: Share what you need!
Share any of the most used file extensions, without routing them through servers, thus guaranteeing absolutely private P2P communication.
Encriptados icono aplicaciones

Blockchain Applications

Ensures that our users' communication is private and out of reach.

Encriptados icono modotrabajo

Work mode

Switch to desktop with BlockChain Applications or Work Encrypted Applications by activating work mode.

Encriptados icono aplicaciones encriptadas

Encrypted work applications

To ensure that our users' communication is private and out of reach.

Mail

Email Military grade encryption: We use PGP protocol, with 4096-bit keys and AES-256 encryption. So no one can decrypt your emails.

PGP encrypted key control:

Keys are generated and stored only on the device. This way, only you will be able to access the copies of them.

Encrypted application database:

All your emails, contact names, registrations and the encryption keys you use for your messages are stored in the application, inside an encrypted database.

Mail

Open communication network: The service does not include blacklisted or whitelisted domains. We have an open network that allows you to communicate with everyone.

Send unencrypted emails:

Secure email communication is not restricted to just PGP clients. You can also send regular unencrypted emails to anyone.

Encrypted Drafts:

Sometimes you don't want to send a message right away. If you save it to secure email, the draft will be encrypted.

Mail

Remote wipe option by email: Are you worried that someone will take your phone and extract data from it? You can use secure email to erase everything on the phone.

Multiple accounts:

Like any contemporary email client, the application can support multiple accounts. Switching from one to another is easy, you can do it from the application.

High compatibility:

compatible with competing products that use the same version of the PGP protocol.

Mail

Security Lock Inbox rules:

If you receive a lot of emails, sorting them could be a problem. Secure Email allows you to create folders and rules (filters) to easily organize your inbox.

Export backups:

You can create a backup of your settings and encryption keys, to export them for use on another device.

Encriptados icono borrado remoto

Remote wipe

Even if you lose your phone, the information you have stored is absolutely safe, because you can remotely delete any data by sending a pre-determined combination of characters as a message to your secure chat.

Encriptados icono boton panico

Panic button

To ensure that our users' communication is private and out of reach of any eavesdropping attempts, we continuously develop system updates.

Encriptados icono modo incognito

Incognito mode

Normal Android/iOS operating system with commonly used applications, activating incognito mode.

Vault

Backup – secure vault

Allows you to store any message or file you want in the encrypted file container in the cloud.

Supported attachments.

Vault

Emergency center

OS Emergency Center with quick access to features you may need in urgent situations.

Quick Clean: Erase all data on the device with a single swipe.

Incognito mode: Transform the operating system into a normal Android and hide all your encrypted communication.

Frequent questions

By encrypting the cell phone, the original operating system is replaced by a military-grade encrypted one, with special features such as encrypted chats, secure calls, remote destruction, among others that you can learn about at encrypted.io

In addition to the security and privacy offered by an encrypted cell phone, there will be features such as encrypted chats, remote deletion, encrypted mail, timed messages, cloud storage and multiple encrypted applications.

In case of losing the phone or being a victim of theft, a predetermined combination of characters can be sent to the chat itself to eliminate all the information on the cell phone. In other cases, it can be done by contacting the license provider.