Crypto security pro

Advanced communications privacy and data security services

Contact us

CSP Phone

About phone

Cryptophone is an upgraded phone, with innovative data and voice, internal memory and privacy encryption technology, based on strong cryptography tools. The device provides seamless, integrated security, protecting not only the information you exchange on the phone, but also the data on your mobile device.

We use in-house development with software content, depending on the task at hand.

  • All data protection software (keys, settings, contacts, smart folders, etc.) are integrated into the operating system (OS) and there is no possibility of physical transfer to another device if it is locked or disabled. All this protects sensitive data from unauthorised access if your phone is lost or stolen.
  • Possibility to install microSD cards as an additional internal storage expansion
  • Possibility to disable user identification sensors/scanners, camera and microphone
  • Irretrievable deletion of information from the device
  • No use of Google or other data collection services
  • Blocking of suspicious network (GSM) activity, detection of spoofed cells
  • Prohibit system updates from external sources
  • Modified encrypted operating system boot loader with customisation options
  • Hardware encryption OS Android version 10 and above
  • Network standards: WIFI, 3G, LTE Traffic
  • Calls with dialing capability to ordinary subscribers worldwide (substitution of "outgoing telephone number", switching to external subscribers via encrypted dynamic channel, acceptance of calls to virtual DID number of different countries)
  • Improved XMPP messenger (messaging/data transfer)
  • Internal software ecosystem based on ARS 256 + RSA 4096 bit encryption
  • Supports full IMEI (International Mobile Equipment Identity) change, both manually and from operator's IMEI database
  • Support for changing the Android ID (operating system identifier)
  • Location protection (geolocation services disabled at OS level). Data emulation capability for programmes (as required).
  • Double encryption of data transmitted over IP by applying Double VPN technology, AES256 + RSA2048 bit encryption level (possibility of creating a separate cluster at customer's request, increasing encryption level to Triple VPN, Quad VPN).
  • Voice encryption algorithms: SRTP packet encryption TLS signalling

Benefits of the CSP Phone

Security
An upgraded phone, with innovative data and voice encryption security, based onstrong cryptographic tools.
User
Enabling the user to make use of all security features as required and to manage identifiers such as IMEI and others as he wishes, depending on the situation.
Cryptophone
A modified encrypted crypto bootloader prevents theft and unauthorised access to the crypto phone.
Data
In case of compromise or possible data loss, the user can permanently delete all information from the cryptophone so that personal information will not reach an intruder. Encrypted internal phone memory.

CSP Router

Specifications

Based on a cryptophone with the possibility to use it as a wifi router. It is reliable and fast protection for internet traffic, bypassing any blockers

  • Bypasses internet traffic blockades in many countries
  • Form Factor of a normal GSM mobile phone
  • Encrypts internet traffic by default with Double VPN technology
  • Supports IMEI change
  • Supports Android ID change
  • And other features to suit your needs
Order

Benefits of CSP Router

Speed
Using own servers for VPN in different countries of the world makes it possible to get the maximum speed available, depending on the user's location and network operator.
Router
Creation of a WiFi repeater, using the connected VPN as an access point for USB/WiFi/Bluetooth.
Convenience
It is possible to use it as an ordinary phone, while keeping the device with a protected cryptographic key, as well as to use all the necessary functions for data security.
User protection
It is possible to use ANY source of public internet traffic and retransmit it to other devices: mobile or wifi, as all data transmission sessions are through a double VPN cluster. As a consequence, it is possible to work in normal networks (Clearnet) only output ip is displayed. All internal data services run through the double VPN ecosystem cluster.

VPN

Specifications

2 types of protocols:

  • Open VPN Double encryption of data transmitted over IP by applying Double VPN technology AES256 + RSA2048 bit encryption level (possibility of creating a separate cluster at customer's request, increasing the encryption level to Triple VPN, Quad VPN).
  • Wire Guard VPN protocol, which provides high speed connection and reliable protection using modern cryptography, such as Curve25519, ChaCha20 Poly1305, BLAKE2s and SipHash 24.

Benefits:

  • Easy to set up;
  • Modern protocol;
  • Open code;
  • Security of the protocol, without compromising bandwidth or latency in an uncontrolled environment.
Order More detailed

CSP flash drive

Specifications

Ensures secure data storage and deletion.

  • Flash drive, with the possibility of instant and irreversible destruction of confidential information - further recovery of the data stored on it is impossible!
  • Gives you the security of storing and discarding data.
  • Unique flash drive, which features instant data destruction system, without connection to your computer. A convenient and reliable device will help keep your data confidential.
Order
Specifications
  • 32 GB to 128 GB of memory
  • One button quick delete function
  • Power for data erasure (no need to keep the flash memory in the USB device)
  • Irreversible data deletion
Benefits
  • High quality components that are used in the assembly
  • Classic design that makes it look like a normal flash drive
  • Built-in rechargeable battery that charges whenever you connect it to your computer
Compatibility
  • Linux
  • Mac OS
  • Win 8/10/11
Use
Convenient and easy to use

CSP laptop

COMING SOON
Specifications

All specifications are individually tailored to the customer's requirements

Order

Purchase and delivery

All devices ordered are delivered by courier or by post, pre-configured with the cryptophone precisely for the customer's purposes and the required functionality, and prepaid for 6 months in advance.

And most important, prompt customer support!

About the Company

CSP provides innovative solutions in the corporate communication security market. Reliability, confidentiality and data protection are the main criteria for the services we provide.

Our mission is to ensure businesses and individuals operate efficiently, with high-tech protection of corporate and personal data, preserving your anonymity and security.

The company was founded in 2017, headquartered in Zurich. Qualified programmers from Europe and Israel work on the development of the product.

We specialise in the following areas: