Login
Hello, if you already have an account, log in.
Attention! We have switched to a new store engine!
Our online store switched to a new IT infrastucture on February 23, 2023. Old accounts created before 23.02.2023 still work and you can easily log in using your old access data. However, your purchase history from before 23.02.2023 is no longer visible in your accounts. If, as an old customer, you need your data for previous orders (placed before 23.02.2023), please contact us by email.
You are a new user?
Create an accountCart: (0)
You do not know where to start?
See recommended productsEncryption device Hekate X-1 for encrypting secret messages
- Encryption via external devices
- Encryption via QR code possible
- Reading via Hekate scanner
- 100% effective
- Intuitive and easy operation
Encryption device Hekate X-1 for encrypting secret messages
DHL/UPS STANDARD: 11,00 £
UPS courier. Delivery time: 3-4 working days. Online payment or wire transfer.
UPS EXPRESS: 3,50 £
UPS-EXPRESS courier. Delivery time: 4 working day. Online payment or wire transfer.
If you are still not sure if this is the product for you, please write to us. We will try to answer as soon as possible.
If you are still not sure if this is the product for you, please write to us. We will try to answer as soon as possible.
Description
Hekate X-1 encryption device
Encrypt your most important messages without worrying about their contents falling into unwanted hands! X-1 Hekate will ensure that no outsider is able to read the message. This top-quality encryption device is an enigma of the 21st century!
Key features of the Hekate X-1
-
NEW TECHNOLOGY
CHIPY-RISC
-
MATRIX
7" IPS
-
PROCESSOR
1Ghz
-
TRUE-RNG FUNCTION
YES
Highest level of message encryption
Hekate's X-1 encryption machine is the ultimate in encrypting important messages. The machine operates offline and uses entropy-based symmetric encryption. The message leaves the machine in encrypted form before it is transmitted further via external channels, such as a smartphone with an instant messaging device or radio.
Used for special tasks
Thanks to a random number generator, a unique security key is created for each message exchange between X-1 Hekate devices, with which texts can be encrypted or decrypted. This is the perfect tool for those who value fast and secure text messaging.
The device is also used in any area that requires the highest level of secrecy in all communications. It is used, for example, by the military or escorts of a high-profile politician.
Encrypt with QR codes!
One of the advantages of the X1-Hekate is its ability to convert messages into encrypted 2D matrix codes (QR codes). Content of up to 640 characters is sent via an external mobile device and then read by a compatible Hekate reader.
However, it is important to note that both devices must be equipped with cards with identical keys. All this to ensure 100% encryption effectiveness.
Encrypt even when the communication system fails
The model offers the possibility to connect to a radio device. In this way, you will build your own infrastructure for the wireless exchange of encrypted messages between two X-1 Hekate. Even if the wireless data transmission between the two devices fails due to a failure, it is still possible to create a text encryption using the X-1.
We then write down the encrypted message on a piece of paper and send it as a letter by post to the recipient, who, equipped with his X-1 device with the appropriate security key and switched to text encryption mode, can decrypt the message.
Hackers don't stand a chance!
The device is very simple to use, but this does not affect the encryption power. The manufacturer has even dispensed with a physical keypad to prevent the sensitive microphone from reading the message.
The X-1 Hekate is based on secure RISC chips with open source architecture and known technical specifications for electronic components, which do not include controllers or other wireless modules. In addition, many measures were taken during the design of X-1 Hekate to significantly minimise the possibility of side-channel attacks (alternative means of accessing content other than text decoding).
Specification
X-1 Hekate specifications | |
---|---|
Editor | 1GHZ RISC processor |
Memory | 1 GB |
Matrix | IPS 7" |
Input |
|
Output |
|
Font size | limited to memory |
Matrix code size | 640 characters per QR code |
Audio throughput | maximum 300 characters per second |
Digital interface | no |
Maximum key size | 16 MB |
Maximum number of keys | 400 |
Required voltage | 5V |
Electricity required | 3A maximum |
Power consumption | approx. 6 W |
Dimensions | 18 cm x 20 cm x 24 cm |
Weight | 500 g |
In box
- Cipher X-1 Hekate
- Connection cable for connection to mobile phone
- Connection cable for connection to radio device
- Splitter cable
Reviews
Cellbusters Zone Protector system - effective detection of mobile devices
Availability: Available
3 038,08 $ (brutto)
- Wi-Fi, Bluetooth, GSM transmission detection
- Sound and light alarm
- Mains and battery power supply
- Range up to 30 m
- Up to 12 h of continuous operation
Eavesdropping detector iProtect 1217 - detects Wi-Fi, Bluetooth, 4G/LTE, 5G, signals up to 6 GHz
Availability: Available
3 233,38 $ (brutto)
- Detects up to 26 types of bands
- Predefined search modes
- Operating time up to 5 h
- 43 levels of alarm sensitivity
- High-band directional antenna to help locate transmitters above 2400 MHz
Mic-Lock USB-C - protection against eavesdropping on conversations
Availability: Available
20,62 $ (brutto)
- Cyber attack protection
- USB-C connector
- For computers, tablets and smartphones
- Immediate action
Outdoor spectrum analyzer - Spectran XFR V5 Pro
Availability: Available
- Frequency range of the outdoor spectrum analyzer from 1 HZ up to 20 GHz
- GPS built-in
- Panoramic display Full HD 15,6"
- Processor Intel i7
- Disc capacity up to 8 TB
Handheld Wireless Activity Monitor JJN WAM-X25 0-14 GHz, 3G/4G/5G, WiFi, Bluetooth
Availability: Available
12 087,25 $ (brutto)
- 5G device detection
- wide tracking band from 0 to 14 GHz
- separate module analyzing WiFi networks and Bluetooth signals
- clear 7 inch screen
- directional visualization of detected signals
Drone jammer - Defender DZ-01 Pro for different types of signal jamming
Availability: Available
30 380,89 $ (brutto)
- Detection range - 5 km
- Bringing drones down to the ground
- Operation time up to 3 h
- Ergonomic design of the drone jammer
- Jamming frequencies, incl. WiFi
Radio frequency detector - PRO-W10GX
Availability: On order
2 484,71 $ (brutto)
- Radio frequency detector - PRO-W10GX detects both analogue and digital signals in range 0-10 GHz
- Frequency counter 0-6 GHz
- Signal strength is plotted on the 20 point scale
- 1000 event memory log
- Two antennas – omni-directional and directional
Anti-drone system MADDOS - detection, identification, tracking, neutralisation of the threat
Availability: Available
- system can be expanded as desired
- 24/7 monitoring and detection
- object identification and tracking
- drone interception and grounding function
- mobile system
JJN PRO-W12DX wiretap detector - range 0-12Ghz, memory for 1000 events, detects analog and digital signals
Availability: Available
4 296,72 $ (brutto)
- Detects analog and digital signals in the range of 0-12 GHz
- Audio demodulation through headphones
- Frequency counter 0-6 GHz
- Memory for up to 1000 events
- Two antennas: omnidirectional and directional
WallHound Pro - Wireless transmissions detection system / GSM / Bluetooth / WiFi
Availability: Available
- Wi-Fi, GSM and Bluetooth detection
- Emergency power supply up to 4 h
- Easy to assemble and operate
- Visual and audible alarm
- Autonomous operation
Telephone and line analyzer ST-301 Spider for wiretaps detection in wired installations
Availability: Available
- Detection of wiretaps in wired installations
- Frequency range: 20-25.000 Hz
- Electronic switch for testing multi-core cables
- Scanning time 0.3 - 1 sec.
- A complete set of adapters, connectors and accessories
Hand-held Non linear junction detector GPS JJN EDD-24T for different types of electronic devices
Availability: Available
10 730,96 $ (brutto)
- Detection of hidden electronics
- Advanced operating algorithm
- Easy to use
- Light design
- Hermetic, durable case
Confidential Phone Conversations - Mic-Lock USB-C Soundpass Eavesdropping Blocker
Availability: Available
31,47 $ (brutto)
- Protection against digital eavesdropping
- Connects to a USB-C port
- Color: black
- Adapter 3.5 mm
Lornet 36 - Long range detector of non linear junction
Availability: Available
- Precise detection and location of electronic devices
- Long range non linear junction detector
- High search selectivity
- Signal in 3580 – 3620 MHz band
- Easy to use, compact and lightweight
Ultrasonic sound generator Panel P11 Ultra-Max for audio jamming and safe business conversations
Availability: Available
- Range up to 10 meters
- Simple operation
- Remote control
- Mains or battery operation
- Quiet operation
UseCrypt Messenger secure communication application - encrypting correspondence
Availability: Available
16,26 $ (brutto)
- Secure messenger for smartphones
- HD encryption of messages and calls
- Encrypted database - data security even if the phone is lost
- Panic code - security that erases all data from the communicator
- Cryptographic operations performed directly on devices