Have Any Questions?
Call Now +353 1-211-8666
Total Security For Government
Enterprise & Individual clients

T2 Communicator

Total security for government and enterprise clients

T2 Communicator

The device has 360-degree protection for any individual or organization. Thanks to the sophisticated encryption, zero-day exploits, malware attacks, phishing, wiretapping, DDoS, MiTM, and online hacking don’t have a chance to succeed.

Powered by Secure OS

But The T2 Today

Zero-attack-surface;
Verified boot & triple password protection;
Multiple layers of encryption & wipe options;
Secure key store & trusted updates.

Encrypted Communication Applications

Buy The T2 Today

Serverless P2P & PGP chat;
Secure PGP group chat;
Secure P2P voice and video calls;
Secure vault (file storage) & calendar.

Hardware & management

Buy The T2 Today

Complete security-hardened solution;
Numerous quality assurance methods;
A faraday bag and a privacy screen protector;
MDM system, billing system, training, and support.

SECURE OS

Secure OS utilizes multiple defense layers to isolate, encrypt, and secure mobile data against any mobile threat. Our operation system provides a zero-attack surface by blocking numerous entry points such as GPS, SMS, NFC, Bluetooth, etc.

SECURE CHAT 

The Secure Chat is an end-to-end encrypted serverless secure messaging app that allows users to send peer-to-peer messages, join group chats, make unlimited voice and video calls. 

Serverless P2P chat characteristics and protocols:

Buy The T2 Today

OTR cryptographic protocol;
Messages encrypted with 256-bit AES cipher;
4096-bit Diffie-Hellman key exchange;
SHA-2 hashing used for authentication;
Different keys for every chat session.

Secure group chat characteristics and protocols

Buy The T2 Today

OMEMO cryptographic protocol;
Double Ratchet Algorithm for multi-end
to multi-end encryption;
Elliptic curve (ECC) Curve25519/Ed25519;
Elliptic curve Diffie–Hellman (ECDH) key
agreement scheme;
SHA-256 hash function.

P2P voice and video call characteristics and protocols

Buy The T2 Today

ZRTP cryptographic protocol;
Diffie-Hellman key exchange;
Secure Real-time Transport Protocol (SRTP);
Short authentication string (SAS) against MiTM;
Keys discarded after every call.

SECURE VAULT

Secure Vault is an encrypted file storage app. Your clients can store information as encrypted notes, rich file formats, conversations and create secure backups of their settings, contacts, and data.

PGP chat characteristics and protocols

4096-bit RSA key pair used for encryption and decryption;
Content encrypted with IDEA cipher;
User managed encryption keys;
Private keys are never stored server-side.

Secure Calendar

Secure Calendar is a private calendar app to organize
any work schedule, create meetings and events,
set reminders, and securely share them with
peers through Secure Chat.
Secure calendar characteristics and protocols:SQLCipher 256-bit AES full database encryption;
Additional password protection.

Secure vault characteristics and protocols

XTS encryption with state-of-the-art SHA-512 hashing;
SQLCipher 256-bit AES full database encryption;
Additional password protection;
Compatible with multiple file formats;
Encrypted notes;
Encrypted backups.

SECURE ADMINISTRATION SYSTEM (MDM)

The Secure Administration System gives you the ability to granularly control, monitor, and configure your user devices. It allows IT teams to manage single or multiple mission-critical devices from a centralized command center.
  • KEY FUNCTIONALITIES Deployment of applications; Set-up and remote management of devices; Configuration of device settings and features; Encrypted backup of data; Monitoring of network security; Detection of fake towers; User authentication and verification of digital fingerprint; Manage access to 3rd party applications.

SECURE MANAGER

The Secure Manager platform helps you purchase and manage your encryption products and services as our trusted partner. You can use the system as a billing platform, online store, sales, and administrative system.

KEY FUNCTIONALITIES

  • Complete visibility & control over sales;
  • Management of due payments;
  • Administrating client statuses and profiles;
  • Supervise account receivables.

SECURE SIM

The data-only SIM card running is on Secure Group’s private network. The network has an SS7 Firewall and a VPN tunnel that ensures that all incoming and outgoing data is protected.

KEY BENEFITS:

  • Multi-IMSI SIM card;
  • Connectivity in more than 120 countries;
  • SS7 Firewall Built-in VPN;
  • Freedom from 3rd party service providers.

SIM REGIONS & COUNTRY COVERAGE

Europe

Africa

North America

South America

Albania, Armenia, Austria, Azerbaijan, Belarus, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Gibraltar, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Macedonia, Malta, Moldova, Montenegro, Netherlands, Norway, Poland, Portugal, Romania, San Marino, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Ukraine, United Kingdom. 

Algeria, Burkina Faso, Congo, Egypt, Ghana, Kenya, Mali, Mauritius, Morocco, Nigeria, Rwanda, Senegal, South Africa, Tanzania, Tunisia, Uganda, Zambia. 

Anguilla,  British  Virgin  Islands,  Canada, Costa  Rica, Dominican  Republic, El Salvador, Haiti, Mexico, Nicaragua, Panama, Trinidad and Tobago 

Argentina, Aruba, Bolivia, Brazil, Chile, Colombia, Ecuador, Guyana, Netherlands Antilles, Paraguay, Peru, Suriname, Uruguay, Venezuela 

SECURE BOX

We’ve fully integrated a dedicated server with our product ecosystem. Lowers the risk of security breaches, credential stealing, data loss, unauthorized access, reduced visibility, and control.

KEY BENEFITS

Complete control at all times;

High availability;

Dedicated environment;

Infinitely scalable;

Configuration of different architectures;

Manage redundancy

Secure updates and responsive support

Our rigorous quality assurance procedures guarantee the high availability of services. Moreover, we ensure smooth updates and provide long-term support. 

Zero-knowledge architecture

There’s no chance of experiencing a human error. No sensitive information, confidential data, or private encryption keys are ever stored on the server. 

Full control

Complete control of mission-critical communications. Nothing leaks, not even metadata. 

Top Notch Support

We provide 5-stars level support, and customers love us with that. We can ensure to reply to customers within 10-14 minutes in business day.

Pre-Sale Questions

If you are not sure if this product a fit for you or not, or if you can’t find any required features, feel free to ask us first. We are pleased to talk to you.