What you need to know
1What is a secure encrypted smartphone?
Our encrypted smartphones are developed with an individuals or corporate information security and privacy in mind. This allows for private communication to remain private at all times without intervention from the user, rather than remaining exposed to published and undocumented smartphone security threats.
2How secure are Ncryptcellular handsets?
Ncryptcellular handsets offer class-leading security built using a heavily specialized and customized operating system to offer several additional layers of smartphone security over a standard smartphone, including full encrypted storage at the file system level, malicious code execution protection , application isolation, firewall & network hardening.
3Do I need more security than my current smartphone?
When you place a value on your privacy on the Internet and would like to protect your personal information, and correspondence from your family and friends from being harvested by data brokers and hackers, then you need to increase the level of security on your mobile device.
4How much security is enough?
This depends on the sensitivity of data you transmit over the internet. You can never be too careful with new data leaks of sensitive data being published on a weekly basis & frequently sold on. If you use your smartphone to access your personal and financial business online, there are threats of unauthorized third party access at your device level. Our anonymous browser prevents the gathering of one’s browsing habits.
5How can I stop all third parties from capturing my data without my permission?
What you can do is minimize your exposure to malicious third parties by preventing attacks on your mobile device - also known as end-point security. End-to-end encryption of your Voice calls, SMS messages and email propose significant technical difficulties and computational power requirements in order to intercept without your passcode.
6Who are most vulnerable of having their phones hacked?
Firstly, anyone which has unknowingly installed applications onto their phone with bundled malware, or even rooted or jailbroken their handsets. People in the public eye, government agencies, those working in the Legal profession, or within the financial sector with information of interest are especially vulnerable.
7What carrier or network does the handset use?
Our handsets are completely free from ongoing contracts and as such, the selection of carrier is completely up to you.
8What ongoing support is available after I purchase a handset?
We offer support and initial product training through our distributor network, further customisation and support options are available for corporate users who are looking for integration within an existing environment and product training for information security support staff.
9What do you think about criminals using your phones to avoid being monitored by police?
We don't support criminals, or illegal acts of any kind. Ultimately our is a phone tool, and like any other tool, it can be used for good or for ill, even the police can benefit from using our platform to stop their communications from being intercepted by criminal enterprises.
10What are some of the stories you have heard from clients as to why they require an encrypted phone?
We've been contacted by a Journalist whilst working on a foreign assignment requiring privacy to protect their information source from interception. Another client had their phone stolen whilst in a hotel lobby and had private photos downloaded from their device without consent.
11What are some of the challenges of using a secure phone?
In terms of challenges - if someone has lost or forgotten their passcode or encryption key it is impossible to get your data back without significant computing power and a lot of time.
12What is Tor and why do you use it on your platform?
Tor is the most robust online security service and it is independent from government intervention. Over 500 million users have directly accessed the Tor network and 1.3 million people use Tor daily. From the Tor website: “Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.” https://www.torproject.org/about/overview.html.en “Orbot is the only app that creates a truly private Internet connection. As The New York Times writes, “When a communication arrives from Tor, you can never know where or whom it’s from.” Tor won the 2012 Electronic Frontier Foundation (EFF) Pioneer Award.” https://guardianproject.info/apps/orbot/
13Will the handset work in my country?
Our handsets are compatible with all major network bands, fully carrier-unlocked and they will work on major carrier networks.
14What's included in the package?
15What ongoing fees once I purchase a Handset?
Our phones are sold on an outright basis through our distributor network. No ongoing monthly fees are payable.
16What is the warranty period?
Our handsets are backed by a full 12-month handset warranty, excluding faults caused by accidental breakage and/or water damage.
17What are the benefits of joining your mailing list?
Be the first to receive the latest update on our platform and exclusive promotions.
18Can I load your software onto my device?
We are a hardware and software provider. To ensure that your device receives regular security updates we do not retrofit existing phones. Our enterprise package offers messaging and conference applications for iOS and Android devices as a further integration service.
19Do you offer Second hand devices at a cheaper price?
Sign up for our mailing list to find out about our periodic promotions including factory refurbished handsets.
20What new devices are coming out?
Currently, our Ncryptcellular Pixel device is under development - Subscribe to our Mailing list to get the latest from us!
21Do you offer phones on a contract basis?
We are currently introducing a flexible payment option to pay for our phones with an instalment plan. In the meantime, If you require this please let one of our staff know and we will do our best to accommodate your needs
22Can I communicate with non-encrypted mobile users?
Yes – Unencrypted phone calls and Messages can still be made on our devices. However, end-to-end encryption is not possible without both mobile end-points having encryption. Coupled without a hardened secure OS, the unencrypted recipient is vulnerable to malware and MITM attacks