image
Services and Solutions

The G1 is a closed mobile system for person-to-person messaging

image

The entire ARMA G1 communications platform is designed and manufactured by ARMA Instruments, including the communications software, Linux based ARMA operating system and the electronics board. By tailoring the ARMA G1 system to secure messaging we reduced the attack surface to minimal proportions. It has the smallest possible codebase, no 3rd party applications, microphone, NFC, WIFI, Bluetooth, GPS or even a single connector. It charges wireless and connects to the cellular network only.

End to end encrypted data is sent directly to its intended recipient through TOR, a public network, that anonymously routes user data through several random and encrypted relay servers across the globe. Messaging servers are not used at all. This leaves no infrastructure or persistent data to attack. ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.


    This site is protected by reCAPTCHA and the Google
    Privacy Policy and
    Terms of Service apply.

    image
    Services and Solutions

    Direct Benefits

    image

    DEVELOPED FOR TOP SECRET LEVEL SECURITY

    Our secure communications technology is designed to provide the highest safety achievable in secure communications.

    NO INFRASTRUCTURE

    The ARMA G1 communications system relies on Tor network, which is public infrastructure. Therefore, the purchase and maintenance of infrastructure is not needed.

    SEAMLESS INTEGRATION

    Setting up a closed secure communications network based on the ARMA G1 requires no significant actions. Users activate the device in minutes and can easily add contacts by sharing short lived codes. ARMA can provide its clients with additional custom services.

    DYNAMIC IDENTITY

    ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.

    SERVERLESS INFRASTRUCTURE

    End to end encrypted data is sent directly to its intended recipient through TOR, a public network, that anonymously routes user data through several random and encrypted relay servers across the globe. Messaging servers are not used at all. This leaves no infrastructure or persistent data to attack.

    Controlled ecosystem

    Secure ecosystem through zero-trust policy, from hardware and operating system to software and organisation.

    Non-extractable keys

    Encryption and decryption with non-extractable keys that are generated and stay on the device, unknown to ARMA or any third party.

    Isolated cellular modem

    Modem is isolated from the device’s main computing core and has no direct memory access.

    Controlled execution environment

    Trusted boot and firmware updates and cryptographic verification of the boot image integrity.

    Microservice architecture

    Individual software components are isolated using operating system containers.

    Single application

    Dedicated messaging, no third party applications.

    Passports

    Multiple aliases are possible on a single device. Certain contact groups may be handled isolated and independently.

    Self destruct

    All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.

    Closed network

    No interoperability with other communications systems.

    Anti-tamper

    Tamper resistant enclosure, if compromised, all encryption keys are irrecoverably erased.

    TEMPEST resistant

    Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.

    Minimal attack surface

    No connectors, NFC, Bluetooth, WIFI, GPS, speaker, microphone or sensors

    Governance

    Control System for Transparency provides transparency in root of trust, manufacturing, system and organisation.


      This site is protected by reCAPTCHA and the Google
      Privacy Policy and
      Terms of Service apply.

      image
      Services and Solutions

      G1 SPECIFICATIONS

      image

      Platform

      • OSARMA Linux
      • ChipsetARMA
      • CPUArm i.MX8M
      • RAM1 GB
      • Internal storage16 GB
      • SIM
        ARMA virtual SIM OS
        ARMA Dynamic Identity
      • ModemU-Blox Global Use

      Network

      • LTE FDD
        Bands: 1, 2, 3, 4, 5, 7, 8, 18, 19, 20, 3, 4, 5, 7, 8, 18, 19, 20, 26, 28
      • 3G UMTS/HSDPA/HSUPA
        Bands: 1, 2, 5, 8
      • 2G GSM/GPRS/EDGE
        GSM 850 Mhz
        E-GSM 900 Mhz
        DCS 1800 Mhz
        PCS 1900 Mhz

      Display

      • TypeAMOLED 5.44”
      • Resolution1920×1080
      • InputCapacitive, multi-touch

      Body

      • Dimensions length x width x height (mm)114 x 85 x 15
      • Weight (g)244 grams
      • Battery capacity (mAh)7000
      • ChargingWireless
      • InputTouch
      • MaterialStainless steel and Kevlar Aramid composite
      • Dust and water resistanceIP65 and IP67
      • Shock resistanceMIL STD 810G standard


        This site is protected by reCAPTCHA and the Google
        Privacy Policy and
        Terms of Service apply.

        image
        Services and Solutions

        Photo

        image


          This site is protected by reCAPTCHA and the Google
          Privacy Policy and
          Terms of Service apply.