Login
Hello, if you already have an account, log in.
Attention! We have switched to a new store engine!
Our online store switched to a new IT infrastucture on February 23, 2023. Old accounts created before 23.02.2023 still work and you can easily log in using your old access data. However, your purchase history from before 23.02.2023 is no longer visible in your accounts. If, as an old customer, you need your data for previous orders (placed before 23.02.2023), please contact us by email.
You are a new user?
Create an accountCart: (0)
You do not know where to start?
See recommended productsEncryption device Hekate X-1 for encrypting secret messages
- Encryption via external devices
- Encryption via QR code possible
- Reading via Hekate scanner
- 100% effective
- Intuitive and easy operation

Encryption device Hekate X-1 for encrypting secret messages

DHL/UPS STANDARD: 11,00 £
UPS courier. Delivery time: 3-4 working days. Online payment or wire transfer.

UPS EXPRESS: 3,50 £
UPS-EXPRESS courier. Delivery time: 4 working day. Online payment or wire transfer.
If you are still not sure if this is the product for you, please write to us. We will try to answer as soon as possible.
If you are still not sure if this is the product for you, please write to us. We will try to answer as soon as possible.
Description
Hekate X-1 encryption device
Encrypt your most important messages without worrying about their contents falling into unwanted hands! X-1 Hekate will ensure that no outsider is able to read the message. This top-quality encryption device is an enigma of the 21st century!
Key features of the Hekate X-1
-
NEW TECHNOLOGY
CHIPY-RISC
-
MATRIX
7" IPS
-
PROCESSOR
1Ghz
-
TRUE-RNG FUNCTION
YES
Highest level of message encryption
Hekate's X-1 encryption machine is the ultimate in encrypting important messages. The machine operates offline and uses entropy-based symmetric encryption. The message leaves the machine in encrypted form before it is transmitted further via external channels, such as a smartphone with an instant messaging device or radio.
Used for special tasks
Thanks to a random number generator, a unique security key is created for each message exchange between X-1 Hekate devices, with which texts can be encrypted or decrypted. This is the perfect tool for those who value fast and secure text messaging.
The device is also used in any area that requires the highest level of secrecy in all communications. It is used, for example, by the military or escorts of a high-profile politician.
Encrypt with QR codes!
One of the advantages of the X1-Hekate is its ability to convert messages into encrypted 2D matrix codes (QR codes). Content of up to 640 characters is sent via an external mobile device and then read by a compatible Hekate reader.
However, it is important to note that both devices must be equipped with cards with identical keys. All this to ensure 100% encryption effectiveness.
Encrypt even when the communication system fails
The model offers the possibility to connect to a radio device. In this way, you will build your own infrastructure for the wireless exchange of encrypted messages between two X-1 Hekate. Even if the wireless data transmission between the two devices fails due to a failure, it is still possible to create a text encryption using the X-1.
We then write down the encrypted message on a piece of paper and send it as a letter by post to the recipient, who, equipped with his X-1 device with the appropriate security key and switched to text encryption mode, can decrypt the message.
Hackers don't stand a chance!
The device is very simple to use, but this does not affect the encryption power. The manufacturer has even dispensed with a physical keypad to prevent the sensitive microphone from reading the message.
The X-1 Hekate is based on secure RISC chips with open source architecture and known technical specifications for electronic components, which do not include controllers or other wireless modules. In addition, many measures were taken during the design of X-1 Hekate to significantly minimise the possibility of side-channel attacks (alternative means of accessing content other than text decoding).
Specification
X-1 Hekate specifications | |
---|---|
Editor | 1GHZ RISC processor |
Memory | 1 GB |
Matrix | IPS 7" |
Input |
|
Output |
|
Font size | limited to memory |
Matrix code size | 640 characters per QR code |
Audio throughput | maximum 300 characters per second |
Digital interface | no |
Maximum key size | 16 MB |
Maximum number of keys | 400 |
Required voltage | 5V |
Electricity required | 3A maximum |
Power consumption | approx. 6 W |
Dimensions | 18 cm x 20 cm x 24 cm |
Weight | 500 g |
In box
- Cipher X-1 Hekate
- Connection cable for connection to mobile phone
- Connection cable for connection to radio device
- Splitter cable
Reviews
Professional Hidden Camera Detector Raksa-120
Availability: On order
756,70 $ (brutto)
- Professional hidden Camera Detector Raksa-120
- Analog and digital frequencies
- Working on 40 – 3800 MHz band
- Vibration and sound alarm
- OLED 128 x 64 display
Phone Safe Ultra jamming box - ultrasonic protection against recording
Availability: Nonavailable
648,60 $ (brutto)
- jamming by means of unfilterable ultrasonics
- automatic start of the device
- high quality finish
- effective protection against surveillance applications
- up to 6 hours of battery life
Office security system Selcom ST-402 Cayman for detection of wiretaps, hidden cameras, mobile phones and others
Availability: Available
- Frequency range 2-3 GHz
- Actuating signal power 2 W
- Two operation modes: search and adaptation
- Graphical detection display
- Operation time of the office security system up to 4 h

Lornet 36 - Long range detector of non linear junction
Availability: Available
- Precise detection and location of electronic devices
- Long range non linear junction detector
- High search selectivity
- Signal in 3580 – 3620 MHz band
- Easy to use, compact and lightweight
Multi-Channel Bug Detector Protect 1207i
Availability: Available
962,09 $ (brutto)
- Detects a wide variety of RF signals!
- Multi-Channel Bug Detector Protect 1207i
- 6 independent channels - very good sensitivity
- 10-level indicator for each channel
- Efficient rechargeable battery with up to 15h run-time

Spy detector of surveillence devices ST-031M Piranha-M for bugs, microphones, and hidden cameras detection
Availability: Available
- Frequency range of the Spy detector 0.05 MHz - 4420 MHz
- Locating source of sound
- Detecting GSM, UMTS, LTE, WiFi
- Electromagnetic field sensor
- IR and UV bands and ultra-sounds detecting
Wireless activity monitor JJN WAM-108T for hidden cameras, bugs and GPS trackers detection
Availability: On order
6 021,21 $ (brutto)
- Wireless activity monitor JJN WAM-108T for hidden cameras, bugs and GPS trackers detection
- Graphic representation of signal
- Memory capable to store 4000 logs
- Detection length - up to 50 meters
- Durable aircraft grade aluminium enclosure

Cellbusters Zone Protector system - effective detection of mobile devices
Availability: Available
3 026,82 $ (brutto)
- Wi-Fi, Bluetooth, GSM transmission detection
- Sound and light alarm
- Mains and battery power supply
- Range up to 30 m
- Up to 12 h of continuous operation
Drone frequency jammer Zoro DZ-B1 – drone protection in a range of 2 km
Availability: Available
23 782,21 $ (brutto)
- Detection range - 2 km
- Operation time up to 3 h
- Simple to operate
- Detection of radio frequencies
- Bringing drones down to the ground
Utility OffGrid Faraday Duffel Bag - roomy interior, RF signal attenuation
Availability: Available
388,08 $ (brutto)
- Versions: Large and Extra Large
- Dimensions: 55 x 25 x 25 cm / 101 x 50 x 50 cm
- Immunity against RF signals
- Material: Faraday fabric
- Pockets for laptop, phone, tablet etc.

Data protection bag OffGrid Faraday Vector - USB 2.0, 2 types included
Availability: Available
270,25 $ (brutto)
- 2nd generation design
- Carrying bag + Data protection bag
- USB cable protection
- Transparent window
- 2 sizes
Drone jammer - Defender DZ-01 Pro for different types of signal jamming
Availability: Available
30 268,27 $ (brutto)
- Detection range - 5 km
- Bringing drones down to the ground
- Operation time up to 3 h
- Ergonomic design of the drone jammer
- Jamming frequencies, incl. WiFi
Mic-Lock 3.5 mm - computer microphone eavesdropping blocker
Availability: Available
20,54 $ (brutto)
- Digital audio blocker
- For computers
- Connects to the audio port
- Suitable for computers and mobile devices
- Compact dimensions
Secure conversation system BR-99 - high mobility, noise generation, 8 people in conversation
Availability: Available
- Set: noise generator, speakers, headphones
- Number of callers: from 2 to 8 people
- 100% immune to eavesdropping
- Operation on its own or with another device
- Full mobility
Fold Faraday Key Fob OffGrid - durable fabric, full protection from electromagnetic signals
Availability: Available
32,42 $ (brutto)
- Faraday fabric
- Shielding technology
- Dimensions: 8.25 x 3.1 cm
- Dimensions when unfolded: 8.25 x 12.7 cm
- Magnetic closure
Bank Account Protection - YubiKey 5 Nano
Availability: On order
91,88 $ (brutto)
- Quick login without password
- Bank account protection
- Works without charging or software