Endoacustica Europe, Exclusive Customer Service, Consulting and Training
prod cod: ZIMMERMANN-MOBILE
Technical and operational support
Dedicated consultation service
After-Sales training and support
The Zimmermann smartphone provides a high level of protection when you are going to communicate with other phones or connect to sites, social networks, messaging apps, FTP servers, and so on. The phone is equipped with an Android-based operating system, expressly designed to protect you from any attacks of malware, trojans, viruses, network sniffing, leackage etc. used in mobile data theft. The Zimmermann's OS is not recognized by viruses and trojans at all, so that it does not become accessible to infections or intrusions.
All secure calls made with this smartphone are over IP (VoIP) and encrypted. Thus they are absolutely immune from attacks such as "Man in The Middle" carried by interception equipment (IMSI catcher, GSM interceptor etc.) that force the listening of calls via GSM and attack what is the standard coding of the network network. The connection between the smartphone and the cell phone bridge is constantly monitored by a control server that guarantees its authenticity. Data exchanged to or from the mobile phone take place safely, without the risk of being identified or, still worse, compromised by hacking. Anyway the system is equipped with two types of dialer: one for encrypted calls and the other for normal GSM line using a SIM card inserted in the phone, while for protected calls (VoIP) no SIM is required, just a data connection, for example WiFi with the help of a portable modem.
Not only the communications affecting two or more Zimmermann smartphones, but also those occurring between other normal mobile phones or landline phones* may benefit of the same protection level by their side. The call to any other unprotected phone number is in fact protected by the passing through the control data center which ensures that the request is made to carry out the call on the GSM line to the recipient. Instead when you receive a call from an unprotected phone, this latter does not directly call the GSM SIM card inserted in the Zimmerman smartphone, but actually it composes a virtual phone number registered on the server in charge to pass the call from the control center to the destination Zimmerman smartphone. The call thus made will be equally over IP, then protected and encrypted.
Furthermore this system allows to completely mask the real position of the Zimmermann mobile phone, so that it will not be possible to trace the virtual phone number as it will never be registered on the network.
Among the most innovative ZImmermann Mobile's features, we can find the ability to virtualize the whole operating system as well as the creation of multiple accounts and virtual spaces, that are completely customizable and independent of each other (up to 4 virtual spaces).
These protected areas allow the phone to work in virtual mode, through indipendent and individual accounts (of emails, social networks, etc.), with randomized PIN, lock passcodes, passwords etc, undetectable from the outside. Actually it's as if you have four different phones available!
The Zimmermann smartphone also provides maximum protection when you are forced to connect to free and unprotected hotspots in public spaces such as airports, hospitals, universities and so on. In such cases user is procted by means of a VPN protected channel, a continuous network vulnerability scanning, as well as specific alerts in case of any intrusion attempts.
The Zimmermann mobile phone can be also used for safely managing cryptocurrency wallets such as Bitcoin or Altcoin in general!
- Certifications and encryption: FIPS 140-2 Cert. #2465, AES-256/Two Fish, SHA-384/Skein, ECDHE/Bernstein Curve
- Secure Android-based OSa
- ZRTP/SRTP/ZINA key exchange protocol
- SIM unlocked
- Encryption of calls, files, messages
- Operating system virtualization
- Data and photo auto-wipe/burn
- Safe from malware, virus, sniffing, leackage ecc.
- Immune from Man-in-The-Middle attacks
- WiFI protection via VPN
- Network vulnerabilities scanning
The email encryption software package called PGP (Pretty Good Privacy) has been created by the US cryptographer Philip R. Zimmermann and published for free on the Internet in 1991. This caused him many problems in 1993, when Zimmermann was involved in a government investigation, because of the US export restrictions for cryptographic software. Despite that, PGP became the most widely used encryption software in the world.
Since 2004, the main purpose of Zimmermann was to focus on secure telephony for the Internet, which later led to the development of ZRTP protocol concerning over IP calls (VoIP) and the creation of all those products that make use of it. Before founding PGP Inc, Zimmermann had been working for over twenty years as software engineer, skilled in cryptography, data security and communications also spreading his interest about encryption in military field.
Size: 152.40 x 76.40 x 7.90 mm
Operating System: Android-based
Display: 5.5 inches, full HD
CPU: octa-core 1.7GHz processor
Memory: 32GB, expandable up to 128GB
Main camera: 13 megapixel, with flash led
Frontal camera: 5 megapixel
Connectivity: Wi-Fi, GPS, Bluetooth, GSM/CDMA, 3G/4G/LTE
For personal data protection and privacy for the exchange of information between managers of large companies and important people
For safe and secure communication between groups of business people
For self-defense against hackers and bad guys