Greater communications privacy than military has
Swissline communicator is probably the most secure communications device designed for use in high profile scenarios where security is paramount
Swissline communicator is probably the most secure communications device designed for use in high profile scenarios where security is paramount
The communications solution that allows you to communicate with your peers with an absolute peace of mind. Our communication system is the only one in the market with physical customer isolation at the HW level, as well as multi-level, quantum-resistant encryption. We use no insecure cloud technologies. With us, you are above the clouds. Today's average secure communications equipment and widely popular secure chat apps do not give you this level of security for a variety of reasons – as explained here. Our technology provides the highest level of protection from all possible communication threats. As operators, we have no technical ability to eavesdrop on our customers' communications.
With your privacy in mind, we accept anonymous orders. Read below to learn more. If you have any questions, send us an email and we will get back to you.
With Swissline, there is a lot of security technology working behind the scenes to protect you. We offer you privacy that others cannot guarantee.
Swissline Consulting is the company behind the Swissline Communicator. The Swiss company was founded in 2019 after several years of development to provide high-security communications equipment. The company's mission is to develop more security products for today's environment, where security needs are rapidly increasing. In response to the latest technology trends in the communications and cryptocurrency sectors, we have other high-profile security solutions on the roadmap.
The diagram below gives an overview of how information travels within our solution and how it compares to other privacy solutions and standard smartphones and calls. For security reasons, we do not show the detailed path, and we omitted several processes.
Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed.
Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption.
Not even future, more powerful quantum computers will be able to crack this encryption.
The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted.
The packet can be transmitted directly to the satellite or through a home, office, or public router.
Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening.
In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient.
Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed.
Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption.
Not even future, more powerful quantum computers will be able to crack this encryption.
The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted.
The packet can be transmitted directly to the satellite or through a home, office, or public router.
Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening.
In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient.
The processing architecture in some of the components is also used in modern satellites and spacecraft. This means no usage of conventional Intel or AMD systems that may have back doors and security flaws.
Contact UsAll the components of our solution are resistant against current and future security vulnerabilities of this kind, mainly due to its design. These security issues affected major data centre systems in 2018. The personal information of millions was at risk of being stolen from the platforms of the world’s biggest companies.
Contact UsWe surpass GDPR compliance guidelines. Additionally, we offer anonymous ordering and operation for the clients who require top privacy. Only the shipping address is required when making an order, which gets immediately deleted after successful delivery is confirmed.
Contact UsIt is believed that conventional consumers’ smartphones are being infected with highly engineered spyware tools without the end-user noticing it. If an average user’s phone is compromised – no matter what app is used inside it – it is not secure anymore. Wikileaks has numerous documents on governments’ activities on exploitation and spyware program development on a massive scale. It showed the development of more than ten such programs over the last decade just in one major government.
Contact UsIt has a direct channel to a little box that comes with it. The box is engineered to ensure it provides a communication channel for the phone, through which it communicates directly with the separate, physical silicon core sitting in our data centre. Upon purchase, only the customer can access it. Even if the phone is handed for spyware infection and then goes back to the customer, the box itself ensures that any further communication will remain private and secure. Let’s put it this way: any spyware or virus needs internet connectivity to leak your data – and our smartphone has none.
Contact UsNo need to worry about attacks, leaks, or any other security issues. In a call between two users, the information flows through different devices in our infrastructure. None of them has internet connectivity. Some have a custom configured channel where the internet is used only as a medium to exchange secured packets. Each one of them is thoroughly inspected to ensure no false positives travel through these channels. Further, there are no standard notifications as those required by Google’s FCM or Apple’s PNS servers to work, which, in our view, are very insecure. We use different methods with our infrastructure. For instance, on any app on today’s phones, 99.99% of the notifications are going through these servers every time the phone users make calls send texts over apps like Telegram™, Line™, WhatsApp™, and others. Moreover, if a typical smartphone user’s phone is compromised, it can send out private information without the user knowing it. Even from the most secure apps on that phone. In our solution, this is not possible.
Contact UsSince we need no internet, we do not use DNS. This greatly enhances security, as DNS is prone to data leaks and security breaches.
Contact UsOur nodes are located in Switzerland’s data centre and are protected by Swiss law. This means that nobody has access to it. We also do not use conventional and hacking prone data centre and cloud technologies for enhanced security reasons.
Contact UsCustomers from remote areas like deserts, seas, and jungles are able to connect via satellite plugins. Our solution will also work with Starlink’s constellation.
Contact UsInstead of single encryption algorithms deployed on conventional secure chat apps, we use a combination of algorithms which have higher standards than those used by governments, ensuring that no supercomputer or quantum computer can breach it. Our algorithms are taken from different parts of the world to ensure that no single territory/government can have access even if they have engineered a backdoor in one of them. All current conventional solutions have this immediate risk.
Contact UsWe welcome the security auditors of certain customers to review and audit specific parts of the solution to verify our claims, on-demand. Our company is open to such activities to provide transparency and trust. As a special arrangement, we also offer custom and private installation for clients who require more assurance. A dedicated 1:1 hardware contract in data centres inside the Swiss mountains or clients premises is also possible. Contact us for more information.
Contact UsTodays’ solutions, which provide some degree of privacy, rely on third party services and software development. If the software provider is hacked, it can carry infected updates and infect secure communication providers. Our solution is contained in an environment where not a single byte of data travels outside of our infrastructure. Ever. Conventional security solutions are insecure and lead to information leaks. When the users send texts, other solution providers use the already mentioned servers, such as Apple™ and Google™. Other solutions rely on Blackberry™ servers and similar software. All of that is insecure, as they are connected to the internet and subject to updates. Also, any agency with access to these software companies can (technically speaking) view the data. We would not know, but it is technically possible. Our solution does not rely on any third party for the software nor any notifications.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsThis means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.
Contact UsDo you need secure communication capabilities in remote areas? We offer additional services to connect you from almost anywhere on the planet.
Contact UsThe current model works worldwide.
For remote areas like jungles, deserts, and seas, we can provide a satellite connectivity contract for you.
End user equipment is connected to the corresponding core in our infrastructure. There, data is processed to some extent. The cores operate at such high-security standards that, even if they are compromised, they do not leak private data. However, it is not possible to compromise them remotely.
Contact UsEach phone set contains one phone, one fog node, and the allocated swarm node. You need two phone sets in order to communicate across long distances with the highest security and privacy. The swarm node that connects the devices sits in Swissline's infrastructure located in Switzerland. It is designed to allow only the exchange of data between callers. There are zero bytes of data traveling to or from the Internet. All hardware and software are managed 100% by Swissline.