X-Machine

New philosophy – new product

Download PDF

 

X-Machine is an autonomous wireless terminal with built-in GSM 3G modem and internal SIM card designed to encrypt and decrypt your private data and be small enough to fit in your pocket.

A powerful presence in a realm of information security.

X-Machine

Establishes secure channels of communication

for global digital mobile networks

X-Machine is a self-sustainable portable unit with built-in multi-mode GSM/HSPA+/EV-DO modem,
a Bluetooth 4.0 interface, Li-ion battery and an integrated microprocessor for complex cryptographic functions

X-Machine

Features

Developed in accordance with the FIPS 140-2 Level 3 security requirements

Secure data exchange for your chat software

File sharing protection

Email service protection

Secure data exchange for your audio communications

Secure data exchange for your text messaging (SMS)

X-Machine

Crypto-scheme

 

FIPS 140-2 security Level 3 security compliance

X-Machine’s crypto-scheme was developed in accordance with the FIPS 140-2 Level 3 security requirements

More

New session - new key

Each transmission is established using a unique communication key. Secure information exchange protocol is based on the HMQV security scheme – an advanced Diffie-Hellman elliptic curves protocol with a built-in 256 bit authentication. Data encryption protocol is using an AES-256 crack-resistant cipher with the OFB mode.

More

Build-in Bluetooth 4.0

Mobile data exchange via Bluetooth is encrypted using an AES-256 crack-resistant cipher with the OFB mode.

More

X-Machine

Why us

 

Security Levels

Software based security modules had always offered the lowest level of protection, as they only comply with the FIPS 140-2 Level 1 security requirements

Any software package that runs on any operating system is always susceptible to virus and malware attacks. FinFisher suite is just one example of a multitude of malicious software programs that can infect any of your installed applications

High level of protection is attainable using only encryption devices that have a build-in hardware security module

This is possible because only hardware encryption modules truly comply with FIPS 140-2 Level 3 requirements, which can prevent any unauthorized access to your personal info

More

Mobile wireless network

Common approaches to initiating a secure communication

1. Packet switching technology

When a protected transmission is established using networks like GPRS, EDGE, 3G, 4G, Wi-Fi, etc., which generate a random IP address for your communication, it requires use of a dedicated
server that manages this type of broadcast.
These transmissions are often relayed using a SIP
or Session Initiation Protocol and a SIP server

However, using a SIP server is a potential security risk, because it is located at a remote site and users have no way of ensuring that the SIP server is virus and/or spyware free

There is always an option of using static IPs for your transmission, which will establish a direct connection between subscribers, but this type of approach present its own set of problems, since it restrict all parties involved to a single network

2. Circuit switching technology

Circuit switching (CSD) type of transmission is therefore the most preferable, as it allows a user
to connect to any network directly, without
a need for a third party

Since the introduction of M2M technologies the use of a CSD protocol got a new boost

CSD protocol can be used anywhere, where there
is a GMS network coverage

In contrast, support of CSD technology by 3G and Wi-Fi networks is substantially smaller

More

X-Machine

Compatibility

 

X-Machine is fully compatible with all of mobile phone models that support Bluetooth 4.0 interface and run on the iOS, Android, or Windows Phone operating system.