Have Any Questions?
Call Now +353 1-211-8666
T2 Communicator

The Product

Protect Your Sensitive Data

T2 COMMUNICATOR

In a world of rampant mass surveillance and hacking attacks, you need a specialized solution to secure your communications and protect your sensitive data. T2 COMMUNICATOR is specially designed for that purpose.

  • Premium services and beyond your expectation
  • Get the best 24 hour support
  • Competitive Pricing

Globally Secured Communications and Data

The encrypted mobile device T2 COMMUNICATOR is built up with data protection in mind, achieving a zero-attack-surface solution, with security-hardened features able to address the evolving threat landscape.

Storage and Data

We keep all cryptographic keys only on the T2 COMMUNICATOR devices, ensuring that even we cannot access users’ sensitive data. To guarantee greater integrity, we also offer a self-hosted version of our solutions.

Unlimited data, No roaming

No need to deal with mobile operators and worry about their access to sensitive communication data. T2 COMMUNICATOR comes with a multi-IMSI SIM card, which provides unlimited worldwide data coverage.

End-to-end-encryption

The cryptographic protocols used by the device’s email, chat, and voice call apps ensure all communications remain encrypted until they reach the intended recipient. T2 COMMUNICATOR is powered by Secure OS.

Layered Security

Why Choose Us?

Security Apps

The device comes with a suite of security apps that include encrypted chat, email and file storage with additional encrypted databases.

Remote Control

The T2 Communicator is paired with the secure administrator system (SAS) platform, which allows administrators to assign policies to the device in order to control its functions or disable vulnerabilities.

 

  • Premium services and beyond your expectation
  • Get the best 24 hour support
  • Global Data Roaming
Layered Security

Secure Communication Suite

Our end-to-end encrypted apps ensure that sensitive data is shared only between the peers in the communication, and no third party can access it.

 

Encrypted Chat, Voice and Video Calls

Encrypted messenger with OTR 1:1 chats, OMEMO group conversations, and ZRTP encrypted calls. No sensitive data reaches the premises of our servers.

PGP Chat

PGP chat clients with user-managed encryption keys. No copies of messages or keys are stored on third party servers.

Encrypted Vault

Encrypted file storage gives you the ability to store rich file formats, messages and whole conversations. Save information as encrypted notes or create highly secure backups of your settings, contacts and data.

 

You’re in Control

 

T2 COMMUNICATOR is managed through the Secure Administration System (SAS) platform. It can be used to push policies on the device, enabling and disabling hardware, apps, and features, as well as for remote wipe.

Manage fleet of T2 COMMUNICATOR devices

Install and run on your own infrastructure

Enable third-party apps of your choosing

Self-hosted option available

Instant Connectivity

 

T2 COMMUNICATOR comes pre-equipped with a Multi-IMSI SIM card that gives users complete independence from third-party service providers and allows perfect connectivity around the globe.

Talk freely wherever you are without any roaming fees

Enjoy the best signal, auto-picked for you

Have unlimited data and coverage in more than 120 countries

Ensure providers have no access to your sensitive data or location

AFRICA

Asia

Europe

North America

Algeria, Burkina Faso, Congo, Egypt, Ghana, Kenya, Mali, Mauritius, Morocco, Nigeria, Rwanda, Senegal, South Africa, Tanzania, Tunisia, Uganda, Zambia.

Bahrain, Bangladesh, Brunei Darussalam, Cambodia, China, Hong Kong, India, Indonesia, Iran, Israel, Japan, Jordan, Kazakhstan, Republic of Korea, Kuwait, Kyrgyzstan, Macau, Malaysia, Myanmar, Pakistan, Philippines, Qatar, Russian Federation, Saudi Arabia, Singapore, Sri Lanka, Taiwan, Tajikistan, Thailand, Turkey, United Arab Emirates, Uzbekistan, Vietnam

Albania, Armenia, Austria, Azerbaijan, Belarus, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Gibraltar, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Macedonia, Malta, Moldova, Montenegro, Netherlands, Norway, Poland, Portugal, Romania, San Marino, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Ukraine, United Kingdom.

Anguilla, British Virgin Islands, Canada, Costa Rica, Dominican Republic, El Salvador, Haiti, Mexico, Nicaragua, Panama, Trinidad and Tobago

Let’s discuss about how we can help make your business better

Astrate

Nitrox

Wirox

DataTel

Boxy

Corniz

MULTIPLE LEVELS OF ENCRYPTION

All data stored on the device is secured and encrypted. Incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted network.

SECURE KEYSTORE

All encryption keys are generated and stored on a FIPS 140-2 certified cryptographic module. No private keys are ever shared or stored outside the device.

ZERO-ATTACK SURFACE

Exploitable entry points such as Google services are entirely removed. Others, such as GSM and SMS services, Bluetooth, NFC, GPS, and more, can also be blocked on OS level.

VERIFIED BOOT

During first enrollment, the device creates a unique fingerprint. When booting, the system validates the fingerprint against a server-side copy.

TRUSTED UPDATES

Updates are issued and digitally signed exclusively through the Secure Administration System (SAS). Devices apply updates only after verifying the authenticity.

MULTIPLE WIPE OPTIONS

T2 COMMUNICATOR provides several ways to wipe all data, including in case of physical tampering attempts, lost access, or the device is continuously disconnected or turned off.