New philosophy – new product

Download PDF


X-Machine is an autonomous wireless terminal with built-in GSM 3G modem and internal SIM card designed to encrypt and decrypt your private data and be small enough to fit in your pocket.

A powerful presence in a realm of information security.


Establishes secure channels of communication

for global digital mobile networks

X-Machine is a self-sustainable portable unit with built-in multi-mode GSM/HSPA+/EV-DO modem,
a Bluetooth 4.0 interface, Li-ion battery and an integrated microprocessor for complex cryptographic functions



Developed in accordance with the FIPS 140-2 Level 3 security requirements

Secure data exchange for your chat software

File sharing protection

Email service protection

Secure data exchange for your audio communications

Secure data exchange for your text messaging (SMS)




FIPS 140-2 security Level 3 security compliance

X-Machine’s crypto-scheme was developed in accordance with the FIPS 140-2 Level 3 security requirements


New session - new key

Each transmission is established using a unique communication key. Secure information exchange protocol is based on the HMQV security scheme – an advanced Diffie-Hellman elliptic curves protocol with a built-in 256 bit authentication. Data encryption protocol is using an AES-256 crack-resistant cipher with the OFB mode.


Build-in Bluetooth 4.0

Mobile data exchange via Bluetooth is encrypted using an AES-256 crack-resistant cipher with the OFB mode.



Why us


Security Levels

Software based security modules had always offered the lowest level of protection, as they only comply with the FIPS 140-2 Level 1 security requirements

Any software package that runs on any operating system is always susceptible to virus and malware attacks. FinFisher suite is just one example of a multitude of malicious software programs that can infect any of your installed applications

High level of protection is attainable using only encryption devices that have a build-in hardware security module

This is possible because only hardware encryption modules truly comply with FIPS 140-2 Level 3 requirements, which can prevent any unauthorized access to your personal info


Mobile wireless network

Common approaches to initiating a secure communication

1. Packet switching technology

When a protected transmission is established using networks like GPRS, EDGE, 3G, 4G, Wi-Fi, etc., which generate a random IP address for your communication, it requires use of a dedicated
server that manages this type of broadcast.
These transmissions are often relayed using a SIP
or Session Initiation Protocol and a SIP server

However, using a SIP server is a potential security risk, because it is located at a remote site and users have no way of ensuring that the SIP server is virus and/or spyware free

There is always an option of using static IPs for your transmission, which will establish a direct connection between subscribers, but this type of approach present its own set of problems, since it restrict all parties involved to a single network

2. Circuit switching technology

Circuit switching (CSD) type of transmission is therefore the most preferable, as it allows a user
to connect to any network directly, without
a need for a third party

Since the introduction of M2M technologies the use of a CSD protocol got a new boost

CSD protocol can be used anywhere, where there
is a GMS network coverage

In contrast, support of CSD technology by 3G and Wi-Fi networks is substantially smaller





X-Machine is fully compatible with all of mobile phone models that support Bluetooth 4.0 interface and run on the iOS, Android, or Windows Phone operating system.