Thank you for visiting us! The shop is in catalogue mode. It is not yet possible to buy online. If you are interested in a product, please contact us. See you later!

RAW SECURE Phone

ARTICLE - SECURE PHONE, COMBINATION OF MOBILITY WITH MILITARY TECHNOLOGY

Stock Status: Not applicable -> Information page
Not applicable -> Information page
This item is currently out of stock and cannot be purchased.

Description

RawCyber  

RAW SECURE Phone
A cutting-edge combination of mobile device and software, using military-grade technology to protect against every type of threat.

Always-on protection
- Multi-layered protection at its heart

Three layers of security stacked together make it one of the most secure smartphones in the world.

Physical protection layer

- SIM card lock
- Self-destruction in case of device loss
- Limited trust in WiFi and BT networks
- USBC – charging only
- PIN never in the same system and additional need to unlock with a fingerprint (2FA)
- Dedicated sensor protection

Operating system layer

- Monitoring of application permissions
- No Google Services
- Attestation profile using blockchain technology validation
- No possibility of installing unknown applications
- Monitoring data usage per application
- Hardened Android kernel

Network layer

- Native detailed packet analysis (DPI) without using VPN
- SMS and MMS content inspection
- URL and endpoint classification
- Blocking of unencrypted outgoing traffic

Privacy protection features

Nowadays, it is not enough to simply secure and protect your data – our users expect to detect and monitor real threats to their security and reduce risk. RAW Secure Phone offers many privacy settings options that guarantee full protection.

- Blocking dangerous app permissions
- Protection against dangerous WiFi networks and USBC attacks
- Microphone, camera and other sensor disablement
- Data sending restrictions for apps
- Features that prevent location tracking
- Self-destruction of data in case of phone loss

Use your own apps

Ensuring security doesn't mean introducing restrictions - the RAW Secure Phone app store is installed on every device. The store gives you access to a wide range of apps that have been reviewed and approved by cybersecurity experts. Every app in the store undergoes thorough and rigorous testing, so privacy and security are not compromised. Additionally, users can choose apps from the Google Play store, which are verified by our specialists before delivery.

What's included:
- RAW Secure Phone
- Individual customer card with serial number and technical support contact details
- Information booklet containing instructions and a guide on how to conduct secure calls
- Welcome letter
- Secure power bank and high-quality Bluetooth headset
- Charger

RAW Messenger APP

Application encryption system compliant with NATO requirements

With RAW Messenger you get:
- Intrusion detection. Automatic messenger lock.
- Communication via your own server. Control over data confidentiality.
- Encrypted exchange of correspondence, including: voice calls, text messages, chats, documents.

Internal address book exclusively for the RAW communicator user.

Basic functionality

Secure Communicator offers the most desirable functionalities, ensuring that each communication channel is secure.

Voice calls
Private and group messages
Private address book
Sharing location on demand
Voice messages

Encryption Technology

End-to-end communication encryption is used in the communication between two back-end applications. The server acts as a proxy for messages sent over this secure communication channel. "End-to-end encrypted" means that no one other than the intended recipient can decrypt the sent message - neither the server nor anyone else who might intercept it during transmission.

- Distributed encryption key
Local data is protected and encrypted by a distributed encryption key.

- Secure channel
Two devices establish a single secure channel with different keys for each communication session.

- Trusted encryption components
The cryptographic core and encryption protocols are based on X25519, XSalsa20, ChaCha20, and Ed25519.

- Double ratchet
Part of the cryptographic core that provides end-to-end encryption.

- Transport layer security
All traffic between the server and the client is secured by TLS. Server identity verification is provided.
- Communication verification
All communication is provided by a mutual verification mechanism between the server and the client.
- Secure message dispatcher
The server allows sending and channel configuration only between confirmed devices (contacts).

Full control over the entire on-prem infrastructure.
Full E2E encryption.
No content on the server side (data at rest).
RASP (Runtime application self-protection).
Application code obfuscation.
Attestation.
Distributed management of the private session key.
The key is never stored in persistent memory.
The key in RAM only at the time of building the cryptogram.

RAW CONTROL
Security of your phone, wherever you are
Install an application that will detect threats before it's too late.

RAW Control was created for you

Thanks to advanced analysis of telemetry data, without violating your privacy, we detect threats and notify you when they are detected. We advise you what to do to be safe online using your smartphone. The application does not have access to your private data in any situation.

How does it work?
- You install the application
- The application analyzes the state of your phone and telemetry data
- When suspicious traffic or applications are identified, it sends you information
- Based on the information and practical recommendation, you take action to restore your phone to a safe state

RAW Control provides the following protective functions to the device on which it is installed:

- Automatic VPN configuration and outgoing traffic inspection. URL screening and end-point classification.
Traffic is redirected to the RAW infrastructure - a detailed inspection of outgoing traffic is performed by automatic mechanisms and SOC analysts in RAW. Anomalies and suspicious connections are identified – if malware is detected, the user is immediately informed in order to take remedial action.

- Checking whether a code is set on the home screen
Home screen protection is the basic mechanism protecting the smartphone user from unauthorized access if the device is lost or stolen – the lack of a screen lock is a serious error, the correction of which significantly increases the level of user security.

- Checking the device attestation, consisting of, among others:
Detecting jailbreak
Detecting debugger mode
Detecting reverse engineering frameworks
Device integrity is one of the key elements proving that the device has not been hacked – RAW Control checks many elements related to the permissions system and attestation profile to verify whether the device's operating system remains consistent and whether there are no suspicious tools in it indicating hacking activity.

- Alerts and information screen:
Automatically generated
Once a month written by our analyst after reviewing the traffic from the device
From time to time written by our analyst about current threats and attacks
The user is informed about threats along with practical information on what to do. Once a month, the SOC RAW analyst will review the logs and generated reports and prepare a dedicated threat analysis for the user. In the event of detecting serious threats, they will contact them by phone to discuss the situation. In the case of current information about hacking campaigns and attacks, SOC RAW will inform the user about them.

15.01.2025
source: RawCyber


bezpieczny telefon, wielowarstwowe zabezpieczenia, rządowe wymagania bezpieczeństwa, certyfikacja poziomu poufne, zdalne czyszczenie urządzenia, zaostrzona polityka haseł, szyfrowane połączenia głosowe, szyfrowane połączenia wideo,secure phone, multi-layered security, government security requirements, confidential level certification, remote device wipe, strict password policy, encrypted voice calls, encrypted video calls, sicheres Telefon, mehrschichtige Sicherheit, behördliche Sicherheitsanforderungen, Zertifizierung der Vertraulichkeitsebene, Remote-Löschung von Geräten, strenge Passwortrichtlinie, verschlüsselte Sprachanrufe, verschlüsselte Videoanrufe


Similar Products