Add a review
-
Compliance with the description:
-
Durability:
-
Quality:
-
Usability:
Hello, if you already have an account, log in.
Attention! We have switched to a new store engine!
Our online store switched to a new IT infrastucture on February 23, 2023. Old accounts created before 23.02.2023 still work and you can easily log in using your old access data. However, your purchase history from before 23.02.2023 is no longer visible in your accounts. If, as an old customer, you need your data for previous orders (placed before 23.02.2023), please contact us by email.
You are a new user?
Create an accountCart: (0)
You do not know where to start?
See recommended productsEncrypted smartphone TAG T2 - secure calls and messages
2 926,40 $ VAT included
The TAG T2 encryption phone is an easy-to-use device for making secure phone calls and sending text messages. The smartphone uses a strong cryptographic standard that guarantees superior, unbreakable protection. Practical features such as self-destructing messages and masking mode result in an effective tool for businessmen and all those who value their privacy.
Mobile solutions are the domain of current times. Standard work and communication tools are being displaced by smartphones, which are essential tools for functioning in the modern world, both privately, but also in business and the operation of public institutions. Critical data and communications can easily fall into the wrong hands. Institutions and organizations fall prey to such hacking techniques as zero-day exploits, malware attacks, phishing, eavesdropping, DDoS, MiTM, among others. These attacks have the potential to turn a mobile device into a spying tool to monitor communications and data.
Is it possible to easily ensure security in the realm of modern mobile communications? The number of potential attack vectors, the availability of technical means to carry them out in order to intercept messages, conversations and data determines the answer - NO. It is certainly a very difficult task, but with a comprehensive approach to security, the use of multi-layered security, proven strong cryptographic algorithms, with the support of engineers and developers with a wealth of knowledge and experience, it is possible.
T2 Communicator is a solution from Canadian company TAG Consultation Inc. part of the Secure Group, which provides turnkey cybersecurity solutions for organizations operating in critical sectors to protect mobile communications and data storage. For more than 10 years, T.A.G. Consultation Inc. has been a reliable partner for more than 100 clients - serving government institutions, the military, critical infrastructure-related organizations, financial institutions and high-tech companies.
The system is designed and optimized for use as a secure communications platform, on the software and hardware side. A personalized, modified operating system based on the Android platform, equipped with a set of security mechanisms and applications, using only encrypted storage and data transmission channels, is designed to ensure data confidentiality and prevent interception of communications, block malicious programs, prevent user tracking and ensure the safety of all data in the event of device loss. It comes with a SIM card for global and anonymous connectivity.
T2 is a purpose-built device, designed and built for data security and user privacy. The consistency of the hardware platform, allows for control and easy response to potentially emerging security vulnerabilities and optimization of supporting software. Attack vectors were further reduced by controlling sensors that could be potential threats.
Dedicated hardware has been designed to prevent data extraction from the device once a third party has gained physical access to it. All memory is hardware encrypted, reading the data is in practice impossible. Using the wrong password several times will automatically delete the data. In addition, data can be deleted remotely.
The smartphone's operating system is the foundation for other applications, ensuring the secure operation of the device. The goal in designing Secure OS Professional was to make this system as tight and secure as possible. - It runs on a highly modified Android system, comprehensively reducing attack vectors and offering extensive security functionality:
The system has been cleaned of vulnerabilities and potential attack vectors:
Secure OS Professional also provides secure updates managed by Secure Administration System (SAS), encrypted data backup and access to a trusted application repository.
All communications are end-to-end encrypted at the end-device level, transmitted via non-despherable channels to the target device, and can only be read by the authorized recipient. Encrypted chat, voice and video calls use proven cryptographic methods that guarantee their security:
In addition, additional mechanisms are used to increase the security and functionality of communication:
Secure Vault provides fully secure storage for file management - creating, storing and sharing video recordings, photos, text documents and voice memos, and encrypted backups, among others. The storage is protected by a separate password. Secure Calendar allows you to create and share events in a secured form. XTS encryption with SHA-512 hashing is used, with full SQLCipher 256-bit AES database encryption.
Privacy is the elimination of a third party from the communication process and ensuring it between users. One solution to facilitate this is to provide SIM cards with the phone that provide global, fully anonymous and secure communications under a single tariff plan:
NOTE
the use of a secure SIM card is strongly recommended to ensure the highest standard of security, however, a standard SIM card from the local operator can be used.
Dedicated editions of the T2 Communicator system are available for corporate and institutional customers:
Dedicated to medium and large enterprises that need secure mobile devices for their employees managed through the Secure Administration System (SAS) platform by the system administrator with the possibility of their own hosting.
A customized solution available exclusively to institutions and government services. It offers, among other things, a dedicated Secure Box server, custom encryption and certification management, additional security mechanisms, and full source code auditing and complete control of each system component by the organization. In addition, Secure SIM Plus cards are available with additional security-enhancing functionalities implemented. The solution is scalable, flexible and customizable.
T2 phone guarantees secure communication in more than 180 countries. Using it abroad does not involve roaming charges. With no contracts or registration with a local operator, the user is not tied to the phone and SIM card in any way.
The T2 secure smartphone runs on a highly modified Android 8.1 system comprehensively reducing attack vectors and offering extensive security functionalities.
In order to avoid the risk of tracking the device through dangerous applications, the encryption phone is deprived of access to Google services. As a result, data is not shared between applications, preventing other programs from using data mining mechanisms.
To ensure all the necessary functionality, secure communication and data protection, as well as discretion, T2 offers 3 modes of operation to be used depending on current needs:
All communication is end-to-end encrypted at the end-device level, transmitted over non-despherable channels to the target device and can only be read by the authorized recipient. Encrypted chat and calls use Off-the-Record Messaging (OTR) and OMEMO cryptographic protocols to support face-to-face communications and group chats using the AES256 algorithm. ZRTP key reconciliation protocol is used to encrypt voice calls and video chats (including group chats).
The T2 phone also offers a fully secure encrypted email client. It uses an improved implementation of the PGP protocol using 4096 bit keys - unbreakable by modern computers.
T2 offers several layers of protection against file extraction from the device. First of all, all memory is encrypted with very strong algorithms, making it practically impossible to read them. Next, all databases are encrypted with a different password. Using the wrong password several times results in automatic deletion of the data. In addition, data can be deleted remotely.
With a T2 phone, you can send messages that will automatically delete themselves after a certain period of time from both devices - the sender and the recipient. A great way to communicate quickly and securely with a business partner.
TAG T2 encryption phone specifications | |
---|---|
Processor | 8-core |
RAM | 4 GB |
Internal memory | 128 GB |
Camera |
|
Battery | 4500 mAh |
Screen | 6,53" |
Overall rating
Availability: Available
735,03 $ (brutto)
Availability: Awaiting delivery
1 933,82 $ (brutto)
Please sign in first.
Sign in