X-Machine is an autonomous wireless terminal with built-in GSM 3G modem and internal SIM card designed to encrypt and decrypt your private data and be small enough to fit in your pocket. A powerful presence in a realm of information security. |
X-Machine is an autonomous wireless terminal with built-in GSM 3G modem and internal SIM card designed to encrypt and decrypt your private data and be small enough to fit in your pocket. A powerful presence in a realm of information security. |
X-Machine is a self-sustainable portable unit with built-in multi-mode GSM/HSPA+/EV-DO modem, |
Secure data exchange for your chat software |
File sharing protection |
Email service protection |
Secure data exchange for your audio communications |
Secure data exchange for your text messaging (SMS) |
FIPS 140-2 security Level 3 security compliance X-Machine’s crypto-scheme was developed in accordance with the FIPS 140-2 Level 3 security requirements |
New session - new key Each transmission is established using a unique communication key. Secure information exchange protocol is based on the HMQV security scheme – an advanced Diffie-Hellman elliptic curves protocol with a built-in 256 bit authentication. Data encryption protocol is using an AES-256 crack-resistant cipher with the OFB mode. |
Build-in Bluetooth 4.0 Mobile data exchange via Bluetooth is encrypted using an AES-256 crack-resistant cipher with the OFB mode. |
Security Levels Software based security modules had always offered the lowest level of protection, as they only comply with the FIPS 140-2 Level 1 security requirements Any software package that runs on any operating system is always susceptible to virus and malware attacks. FinFisher suite is just one example of a multitude of malicious software programs that can infect any of your installed applications High level of protection is attainable using only encryption devices that have a build-in hardware security module This is possible because only hardware encryption modules truly comply with FIPS 140-2 Level 3 requirements, which can prevent any unauthorized access to your personal info |
Mobile wireless network Common approaches to initiating a secure communication 1. Packet switching technology When a protected transmission is established using networks like GPRS, EDGE, 3G, 4G, Wi-Fi, etc., which generate a random IP address for your communication, it requires use of a dedicated However, using a SIP server is a potential security risk, because it is located at a remote site and users have no way of ensuring that the SIP server is virus and/or spyware free There is always an option of using static IPs for your transmission, which will establish a direct connection between subscribers, but this type of approach present its own set of problems, since it restrict all parties involved to a single network 2. Circuit switching technology Circuit switching (CSD) type of transmission is therefore the most preferable, as it allows a user Since the introduction of M2M technologies the use of a CSD protocol got a new boost CSD protocol can be used anywhere, where there In contrast, support of CSD technology by 3G and Wi-Fi networks is substantially smaller |
X-Machine is fully compatible with all of mobile phone models that support Bluetooth 4.0 interface and run on the iOS, Android, or Windows Phone operating system. |