SECURE PHONE

COMPARISON CHART OVERVIEW MULTI-LAYER SECURITY

04

02

03

01

01 02 03 04 SIM Hardware Secure OS Communication apps Global connectivity Reliable devices Vulnerability-free Unbreakable encryption

The device comes with a Secure Phone comes Secure Phone runs on a The applications for email, multi-IMSI SIM card offering with vetted hardware that custom OS that shields chat, and calls provide unlimited data coverage features several layers of against data extraction, unbreakable encryption for across the globe. protection for data at rest. hacking, and malicious all your communications. activities. SECURE PHONE VS. REGULAR DEVICES

Product name Secure Phone iPhone 7 DTEK60 Galaxy S7 Secure OS iOS 10 Android 6.0 Android 6.0

PROTECTION Encrypted chat x x Encrypted calls x x Encrypted emails Not by default x x Encrypted device & storage Encrypted file sharing x x x Two-factor authentication x x IMSI-catcher detector [1] x x x Blocked Google Services Apple equivalents are on x x Multi-password protection [2] 3 x x Antivirus equivalent [3] x x Remote wipe [4] x x x

THREAT PREVENTION Baseband hacking prevention x x x No silent SMS x x x Malware protection x x Blocked third-party applications x x Man in the middle attacks detection x x x

REMOTE MANAGEMENТ Granular control of device security x x x Manage multiple devices x x x

SECURITY APPLICATIONS Encrypted backup [5] x x Encrypted notepad x x x Encrypted folder Yes, but cloud x Encrypted password container x x Enterprise-like firewall x x x

SUPPORT Entire product knowledge base 24/7 support

[1] A built-in app that warns you if the device is in the proximity of an IMSI-catcher device that can be used to wiretap your phone. It allows you to avoid baseband hacking. [2] Secure Phone uses multiple passwords to secure data at different levels: account password, device encryption password, lockscreen password and passwords for each application. [3] Secure Guard is the antivirus service on your Secure Phone. It performs integrity checks on the device and scans known attack surfaces. [4] Secure Wipe is an app that lets you irreversibly delete all confidential data from the device such as chat logs, contacts and files. It can be initiated remotely via SAS. [5] The Secure Backup арр on Secure Phone creates encrypted backups of contacts, settings, files and apps. SECURE PHONE VS. MOBILE SECURITY DEVICES

Product name Secure Phone Sky ECC BlackPhone 2 Granite phone Hardware HTC M9, Nexus 5X Blackberry models BlackPhone 2 Granite phone Operating system Secure OS Blackberry 10 Silent OS Granite OS

PROTECTION

Encrypted chat Encrypted calls x Encrypted emails Encrypted device & storage App storage x x Encrypted file sharing For pics Two-factor authentication - x IMSI-catcher detector x x x Blocked Google Services x - - Multi-password protection 3 1 1 + signature - Antivirus equivalent x x x Remote wipe x

THREAT PREVENTION Baseband hacking prevention x - x No silent SMS x x x Malware protection x x x Blocked third-party applications x x Man in the middle attacks detection - x

REMOTE MANAGEMENТ

Granular control of device security x x x Manage multiple devices x x

SECURITY APPLICATIONS Encrypted backup x x Encrypted notepad x Encrypted folder x x x Encrypted password container x x Enterprise-like firewall x x x

SUPPORT Entire product knowledge base x x x 24/7 support x x

SECURE SIM Unlimited data x x x Independence from service-providers x x x Product name MPC Handset Cryptophone 500i EncroChat Hardware Nexus 5 Samsung S5 EncroChat device Operating system MPC Platform/mOS Hardened Android EncroChat OS

PROTECTION

Encrypted chat Encrypted calls x Encrypted emails x Encrypted device & storage x Encrypted file sharing x - x Two-factor authentication x x x IMSI-catcher detector x x Blocked Google Services x - Multi-password protection x - - Antivirus equivalent x x Remote wipe x x x

THREAT PREVENTION Baseband hacking prevention x x No silent SMS x x Malware protection x x Blocked third-party applications x x x Man in the middle attacks detection x x x

REMOTE MANAGEMENТ

Granular control of device security x Manage multiple devices x x

SECURITY APPLICATIONS Encrypted backup x x x Encrypted notepad x Encrypted folder x Encrypted password container x x x Enterprise-like firewall x x x

SUPPORT Entire product knowledge base x x 24/7 support

SECURE SIM Unlimited data International roaming x Independence from service-providers x x FREQUENTLY ASKED QUESTIONS (FAQS)

Q: Why should I opt for Secure Phone over a Q: Where do you store user data? competitor product? A: We don’t store data. The chat and voice apps A: Secure Phone is a product built from the are peer-to-peer and user communications ground up with security and privacy in mind. don’t touch our servers. Additionally, users can It runs a custom Androind-based OS, and choose whether or not to save backups of their features encrypted communication apps, and data and also where to store it, on their device, a Secure SIM card keeping you connected an external hard drive or Secure Group’s everywhere in the world. It is managed encrypted servers. exclusively via the Secure Administration System (SAS). Q: Where are your servers located and how do you secure them? Q: Why is Secure Phone’s operating system more secure? A: At Secure Group we have a rule – never outsource. We own our servers, and only A: Secure OS is based on heavily modified our trained experts have access to them. Android, with all of the latter’s vulnerabilities Our primary data center is located in Sofia, taken out. For example, GPS and Google Bulgaria. We also have two backup data Services are disabled, along with a removed centers at undisclosed locations. All our USB, Bluetooth and camera drivers. servers’ hard drives and storage are fully encrypted. Q: What kind of encryption does it use? Q: Are you an open network or not? A: Secure Phone employs PGP, OTR, OMEMO and ZRTP end-to-end encryption for A: That could mean a few things, but we don’t email, chat and voice over IP (VoIP), whitelist, nor blacklist domains of other respectively. Moreover, the device’s security providers. In terms of interoperability, our is strengthened by the likes of TrueCrypt, subscribers are free to communicate with any SQLCipher. other PGP, OTR, OMEMO and ZRTP-compatible service; our email client can also send and Q: Does the phone feature regular apps and receive unencrypted messages. services? Q: Can we rely on 24/7 support for Secure A: No, as they pose security threats. They can Phone? be reintroduced via the Secure Administration System (SAS), but this is not recommended. A: Yes, you can expect round-the-clock, everyday Regular phone calls, for example, are not support. What’s more, you can browse through encrypted and are susceptible to wiretapping. an entire product Knowledge Base. CONTACT SECURE GROUP

If you have questions, we can schedule a demo and walk you through the whole process. Do not hesitate to write or call us.

CONTACTS:

+359 2 42 44 222, ext. 609

[email protected]

www.securegroup.com

130 Simeonovsko Shosse Blvd. Sofia, Bulgaria NO BACKDOOR ACCESS

© 2018 Secure Group. All rights reserved.