DEVELOPED FOR TOP SECRET LEVEL SECURITY
Our secure communications technology is designed to provide the highest safety achievable in secure communications.
NO INFRASTRUCTURE
The ARMA G1 communications system relies on Tor network, which is public infrastructure. Therefore, the purchase and maintenance of infrastructure is not needed.
SEAMLESS INTEGRATION
Setting up a closed secure communications network based on the ARMA G1 requires no significant actions. Users activate the device in minutes and can easily add contacts by sharing short lived codes. ARMA can provide its clients with additional custom services.
DYNAMIC IDENTITY
ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.
SERVERLESS INFRASTRUCTURE
End to end encrypted data is sent directly to its intended recipient through TOR, a public network, that anonymously routes user data through several random and encrypted relay servers across the globe. Messaging servers are not used at all. This leaves no infrastructure or persistent data to attack.
Controlled ecosystem
Secure ecosystem through zero-trust policy, from hardware and operating system to software and organisation.
Non-extractable keys
Encryption and decryption with non-extractable keys that are generated and stay on the device, unknown to ARMA or any third party.
Isolated cellular modem
Modem is isolated from the device’s main computing core and has no direct memory access.
Controlled execution environment
Trusted boot and firmware updates and cryptographic verification of the boot image integrity.
Microservice architecture
Individual software components are isolated using operating system containers.
Single application
Dedicated messaging, no third party applications.
Passports
Multiple aliases are possible on a single device. Certain contact groups may be handled isolated and independently.
Self destruct
All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.
Closed network
No interoperability with other communications systems.
Anti-tamper
Tamper resistant enclosure, if compromised, all encryption keys are irrecoverably erased.
TEMPEST resistant
Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.
Minimal attack surface
No connectors, NFC, Bluetooth, WIFI, GPS, speaker, microphone or sensors
Governance
Control System for Transparency provides transparency in root of trust, manufacturing, system and organisation.