

A combination of a phone and modern software using military technology to provide protection.
A combination of a phone and modern software using military technology to provide protection. The phone is distinguished by three layers of protection:
Physical protection layer
- SIM card lock
- Self-destruction in case of loss of the device
- Limited trust in WiFi and BT networks
- USBC - charging only
- PIN never in the same system and additional necessity of unlocking with a fingerprint (2FA)
- Dedicated sensor protection
Operating system layer
- Monitoring of application permissions
- No Google Services
- Attestation profile using blockchain technology validation
- No possibility of installing unknown applications
- Monitoring data usage per application
- Hardened Android kernel
Network layer
- Native detailed packet analysis (DPI) without using VPN
- SMS and MMS content inspection
- URL and endpoint classification
- Blocking of unencrypted outgoing traffic
RAW Secure Phone offers several privacy settings options
- Blocking of dangerous application permissions
- Protection against dangerous WiFi networks and USBC attacks
- Microphone, camera and other sensor disablement
- Restrictions sending data via applications
- Functions preventing location tracking
- Self-destruction of data in the event of phone loss
Using the application
Each phone is equipped with the RAW Secure Phone application store, which are verified and approved by cybersecurity experts. Users can use applications from the Google Play store, which are verified before delivery.
Package contents
- RAW Secure Phone telephone
- Individual customer card with serial number and technical support contact details
- Information brochure containing instructions and a guide on how to conduct safe conversations
- Welcome letter
- Secure power bank and high-quality Bluetooth headset
- Charger
Additionally available for download
RAW Messenger APP
Application encryption system compliant with NATO requirements
With RAW Messenger you gain:
- Detection of intrusions. Automatic blocking of the messenger.
- Communication via your own server. Control over data confidentiality.
- Encrypted exchange of correspondence, including: voice calls, text messages, chats, documents.
- Internal address book exclusively for the RAW communicator user.
RAW CONTROL
Thanks to advanced analysis of telemetry data, without violating your privacy, we detect threats and notify you when they are detected. We advise what to do to be safe online using your smartphone. The application does not have access to your private data under any circumstances.
cyber telefon, cyber smartfon, bezpieczny telefon, wielowarstwowe zabezpieczenia, rządowe wymagania bezpieczeństwa, certyfikacja poziomu poufne, zdalne czyszczenie urządzenia, zaostrzona polityka haseł, szyfrowane połączenia głosowe, szyfrowane połączenia wideo, smartfon dla wojska, smartfon dla organizacji rządowych, smartfon dla dziennikarzy, smartfon dla aktywistów, smartfon dla biznesu, smartfon z technologią wojskową, cyber phone, cyber smartphone, secure phone, multi-layered security, government security requirements, confidential level certification, remote device wipe, strict password policy, encrypted voice calls, encrypted video calls, smartphone for military, smartphone for government organizations, smartphone for journalists, smartphone for activists, smartphone for business, smartphone with military technology, Cyber-Telefon, Cyber-Smartphone, sicheres Telefon, mehrschichtige Sicherheit, staatliche Sicherheitsanforderungen, Zertifizierung der Vertraulichkeitsstufe, Remote-Löschung von Geräten, strenge Kennwortrichtlinie, verschlüsselte Sprachanrufe, verschlüsselte Videoanrufe, Smartphone für das Militär, Smartphone für Regierungsorganisationen, Smartphone für Journalisten, Smartphone für Aktivisten, Smartphone für Unternehmen, Smartphone mit Militärtechnologie,