Why you need it

Why you need it

Hackers and spies today are everywhere and people have no sense of it. It has become very easy today to tap a voice call and to hack a mobile phone. Protecting your communication before transferring it to your device is essential for your security.

Hackers and spies today are everywhere and people have no sense of it. It has become very easy today to tap a voice call and to hack a mobile phone. Protecting your communication before transferring it to your device is essential for your security.

  • MALWARE / HACKERS

    Mobile phones and tablets are vulnerable to malware that can be installed without the owner noticing it. Even the phone’s OS can be modified to become a tool for hackers and spies. Third parties can take control of the phone’s microphone and speaker, and that way the can be intercepted, even if you use an app that encrypts it.

  • CARRIER / APP SERVER

    The voice signal is handled by the carrier or the APP server. Those servers can capture your voice signal without your consent. The only way to avoid this is to encrypt the voice before transmitting it to the carrier or the app server.

  • RADIO WAVES

    Certain devices can attack a cell phone using radio waves, to capture the voice transmitted. For example the NSA’s TEMPEST system is proven to be able to do that. If the voice is not encrypted before entering the phone, there is a concrete risk of eavesdropping.

  • FAKE BASE STATIONS

    Cell phones use cell towers (base stations) to connect to the network and transmit the voice. A device called “IMSI catcher” can be used as a fake base station in order to intercept all the phone’s traffic. These devices can be bought by anyone even online, and are becoming very cheap.