Individual software applications cannot isolate themselves from other installed software applications, the operating system the device relies on, or the network they connect to. The integrity of the solution is paramount. This includes securing the hardware, operating system, software applications, data transit, network infrastructure and servers. Ignoring any facet of this is devastating and renders the actual security of the product to the level of marketing hype.

At power on Our Technology data, whether at rest or in transit, is always fully encrypted. All clients directly negotiate keys automatically with each other’s devices. Our servers, located offshore in our datacenter, never create, store, or decrypt keys, message conversations or user data.


Global Service

Quad-band GSM, UMTS and CDMA all supported. Unlimited international SIM included +120 countries.

Guaranteed Anonymity

No way to associate device or SIM card to customer account.

Customized Android Platform

Fully encrypted from power on. Focus on security and privacy. Simplified user settings.

Industry Leading Hardware

Specially tailored to harden security. Camera, microphone, GPS are completely safe.

Dual Operating System (OS)

Subscribers can now launch either a standard Android OS or the Encripted OS. Two distinctive Operating Systems packaged with each device.

Tamper Proofing

Attack surfaces such as ADB connectivity and recovery mode have been removed.

Encripted Messaging Protocol

The electronic equivalent of a regular conversation between two people in an empty room.

Messages that Self-Destruct

With our advanced burn a user can force wipe their own messages from another user’s device using a timer countdown.

Secure Boot

Upon boot, the device internally checks itself to ensure no one has tampered with the system files.

Panic Wipe

From screen lock a user can type in a PIN and instantly wipe device’s data.

Over-the-Air (OTA) Service

Enhancements, patches, and features can be securely added directly to the Android Operating system of a subscriber device.

Password Wipe

After a set amount of password attempts on device all data is wiped.

Updates & Live Support

Frequent application updates direct. Includes live support.

Simplified Verification

Using our Notary verification process vastly simplifies the complexities of encryption for end users.

Field Factory Restore

A user can now securely wipe subscriber device and rebuild it in the field.

Hardware Cryptographic Engine (FIPS 140-2 certified)

An Encripted device can not be brute forced to mount the encrypted data partition. We generate an RSA public/private keypair with which the public key portion is combined with your disk encryption passphrase.


Encripted Chat

Our flagship product. It is a user-friendly secure instant messaging client designed for mobile environments. Security is guaranteed using our Encripted Chat Messaging Protocol. This is an end-to-end encryption messaging protocol which provides excellent forward and future secrecy properties for symmetric-key updating, along with improved deniability guarantees over the OTR protocol and its variants. We have also vastly simplified user verification to remove the complexities of encryption for end users.

Encrypted Camera

Send and receive encrypted images from point to point without compromising your security.

Status Notifications

Gives users information about their SIM card, notifications about renewals, remaining subscription time and VOIP time.

Encripted Talk

Encrypts all Voice over IP (VoIP) conversations using the ZRTP protocol and transmits them over a closed loop network. A subscriber can send an invite request to another user on our network and, if accepted, can contact them almost anywhere an Encripted talk user resides. We currently have users speaking globally to one another in countries like Australia or China talking securely and crystal clear to subscribers in Canada or South America.

Encripted Notes

You can safely encrypt your notes which are stored locally on your device in an encrypted database with its own passphrase contained within an encrypted partition. It is optional to backup your notes and contacts to our Encripted secure data center. To restore your EncroNotes, we use two factor authentication – the IMEI of your device and your EncroNotes passphrase.

Support Client

Users can send messages about any support issues or questions through a separate communciations path.

Purchase online

Get your hands on a secure device!

Buy now