For the security of your phone conversations, the Stealth Phone allows you to achieve a high level of protection against the risks of interceptions, now more and more common when you use an unprotected mobile phone.
Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable, and impossible life for those who want to listen to it.
This result is obtained thanks to the IMEI (identification code transmitted to your telephone provider), but above all to an elaborate analysis algorithm of the telephone network to which you are connected. The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it's the device itself to be intercepted.
Ultimately, by having the ability to change the IMEI you get the same result as an effective and real change of cellphone. And that's not all. The Endoacustica Stealth Phone will alert you immediately by a vibrating display text message when someone will try to intercept you.
The active equipment, normally used in wiretapping, as the IMEI/IMSI catcher and GSM Interceptors, works on the C2 level, masking itself as a new cell. The C2 (reselection criterion) value is used to determine if a new cell should be selected to camp-on. If the transmitted C2 value of a neighbor-cell is higher than the serving-cell (for a period longer than 5 seconds), the phone will catch the new cell.
In addition, Stealth Phone also allows to encrypt the SMS, so as to protect them from any external interception, by means of an internal application into the device. If there has been, in this condition, an encrypted exchange of SMS, you can be quite: the message will be completely incomprehensible and unrecoverable. Anyway, any attempt to intercept the cellphone will be reported by means of a message viewable directly on the phone.
How the SMS encryption works
The SMS encryption takes place, with military-level security, using an AES elliptic curved-based encryption (CFB mode 192bit). The application for end-to-end secure communication of SMS is PIN protected, so that to prevent any physical access to the reading of message. Moreover, since the encryption key is not unique (it is different for each contact stored in the address book) Stealth Phone makes much more safe the sending and receiving of message between two or more users.
In recent years, the wiretaps are very frequent and assume the theft of military, economic and political information that offer benefits to competitors. There are a variety of devices on the market today to encrypt your conversation. Though using of encryption to protect your privacy might be the prudent choice, the method has its own disadvantages:
- You never know if encryption you use is indeed trustworthy and there is no reliable way to check it.
- Using of such devices might make you looking suspicious and attract undesired attention to your personality.
Main features and capabilities
This untraceable Stealth Phone (Nokia 5000-d2 model) provides a 3-layer protection, along with unique features.
- Audio/text alert in case of connection to active equipment
- Automatic and manual phone IMEI change
- Capability to set the C2 to any value, to avoid the cell detection
- Ability to view a log of all attacks and the elapsed time
- Application for end-to-end encrypted SMS communication