Have Any Questions?
Call Now +353 1-211-8666
T2 Communicator

The Product

Protect Your Sensitive Data


In a world of rampant mass surveillance and hacking attacks, you need a specialized solution to secure your communications and protect your sensitive data. T2 COMMUNICATOR is specially designed for that purpose.

  • Premium services and beyond your expectation
  • Get the best 24 hour support
  • Competitive Pricing

Globally Secured Communications and Data

The encrypted mobile device T2 COMMUNICATOR is built up with data protection in mind, achieving a zero-attack-surface solution, with security-hardened features able to address the evolving threat landscape.

Storage and Data

We keep all cryptographic keys only on the T2 COMMUNICATOR devices, ensuring that even we cannot access users’ sensitive data. To guarantee greater integrity, we also offer a self-hosted version of our solutions.

Unlimited data, No roaming

No need to deal with mobile operators and worry about their access to sensitive communication data. T2 COMMUNICATOR comes with a multi-IMSI SIM card, which provides unlimited worldwide data coverage.


The cryptographic protocols used by the device’s email, chat, and voice call apps ensure all communications remain encrypted until they reach the intended recipient. T2 COMMUNICATOR is powered by Secure OS.

Layered Security

Why Choose Us?

Security Apps

The device comes with a suite of security apps that include encrypted chat, email and file storage with additional encrypted databases.

Remote Control

The T2 Communicator is paired with the secure administrator system (SAS) platform, which allows administrators to assign policies to the device in order to control its functions or disable vulnerabilities.


  • Premium services and beyond your expectation
  • Get the best 24 hour support
  • Global Data Roaming
Layered Security

Secure Communication Suite

Our end-to-end encrypted apps ensure that sensitive data is shared only between the peers in the communication, and no third party can access it.


Encrypted Chat, Voice and Video Calls

Encrypted messenger with OTR 1:1 chats, OMEMO group conversations, and ZRTP encrypted calls. No sensitive data reaches the premises of our servers.

PGP Chat

PGP chat clients with user-managed encryption keys. No copies of messages or keys are stored on third party servers.

Encrypted Vault

Encrypted file storage gives you the ability to store rich file formats, messages and whole conversations. Save information as encrypted notes or create highly secure backups of your settings, contacts and data.


You’re in Control


T2 COMMUNICATOR is managed through the Secure Administration System (SAS) platform. It can be used to push policies on the device, enabling and disabling hardware, apps, and features, as well as for remote wipe.

Manage fleet of T2 COMMUNICATOR devices

Install and run on your own infrastructure

Enable third-party apps of your choosing

Self-hosted option available

Instant Connectivity


T2 COMMUNICATOR comes pre-equipped with a Multi-IMSI SIM card that gives users complete independence from third-party service providers and allows perfect connectivity around the globe.

Talk freely wherever you are without any roaming fees

Enjoy the best signal, auto-picked for you

Have unlimited data and coverage in more than 120 countries

Ensure providers have no access to your sensitive data or location




North America

Algeria, Burkina Faso, Congo, Egypt, Ghana, Kenya, Mali, Mauritius, Morocco, Nigeria, Rwanda, Senegal, South Africa, Tanzania, Tunisia, Uganda, Zambia.

Bahrain, Bangladesh, Brunei Darussalam, Cambodia, China, Hong Kong, India, Indonesia, Iran, Israel, Japan, Jordan, Kazakhstan, Republic of Korea, Kuwait, Kyrgyzstan, Macau, Malaysia, Myanmar, Pakistan, Philippines, Qatar, Russian Federation, Saudi Arabia, Singapore, Sri Lanka, Taiwan, Tajikistan, Thailand, Turkey, United Arab Emirates, Uzbekistan, Vietnam

Albania, Armenia, Austria, Azerbaijan, Belarus, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Gibraltar, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Macedonia, Malta, Moldova, Montenegro, Netherlands, Norway, Poland, Portugal, Romania, San Marino, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Ukraine, United Kingdom.

Anguilla, British Virgin Islands, Canada, Costa Rica, Dominican Republic, El Salvador, Haiti, Mexico, Nicaragua, Panama, Trinidad and Tobago

Let’s discuss about how we can help make your business better








All data stored on the device is secured and encrypted. Incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted network.


All encryption keys are generated and stored on a FIPS 140-2 certified cryptographic module. No private keys are ever shared or stored outside the device.


Exploitable entry points such as Google services are entirely removed. Others, such as GSM and SMS services, Bluetooth, NFC, GPS, and more, can also be blocked on OS level.


During first enrollment, the device creates a unique fingerprint. When booting, the system validates the fingerprint against a server-side copy.


Updates are issued and digitally signed exclusively through the Secure Administration System (SAS). Devices apply updates only after verifying the authenticity.


T2 COMMUNICATOR provides several ways to wipe all data, including in case of physical tampering attempts, lost access, or the device is continuously disconnected or turned off.