Globally Secured Communications and Data

The encrypted mobile device T2 COMMUNICATOR is built up with data protection in mind, achieving a zero-attack-surface solution, with security-hardened features able to address the evolving threat landscape.

End-to-end-encryption

The cryptographic protocols used by the device’s email, chat, and voice call apps ensure all communications remain encrypted until they reach the intended recipient.

Unlimited data, No roaming

No need to deal with mobile operators and worry about their access to sensitive communication data. T2 COMMUNICATOR comes with a multi-IMSI SIM card, which provides unlimited worldwide data coverage.

Storage and Data

We keep all cryptographic keys only on the T2 COMMUNICATOR devices, ensuring that even we cannot access users' sensitive data. To guarantee greater integrity, we also offer a self-hosted version of our solutions.

Layered Security

Remote Control

T2 COMMUNICATOR is paired with the Secure Administration System (SAS) platform, which allows administrators to assign policies to the device to control its functions or disable vulnerabilities.

Security Apps

The device comes with a suite of security apps that include encrypted chat, email, and file storage with additionally encrypted databases.

Secure OS

With a modified system Kernel, no Google Services, and restricted Android runtime, Secure OS is a guarantee your phone cannot be hacked.

Hardware

T2 COMMUNICATOR is based on hardware that allows for the bootloader to be locked after the OS is installed. No one can make malicious modifications to the device.

Global Data Roaming

Мulti-IMSI SIM card always keeps you connected and lets you enjoy unlimited data everywhere in the world.

Secure Communication Suite

Our end-to-end encrypted apps ensure that sensitive data is shared only between the peers in the communication, and no third party can access it.

Encrypted Chat, Voice and Video Calls

Encrypted messenger with OTR 1:1 chats, OMEMO group conversations, and ZRTP encrypted calls. No sensitive data reaches the premises of our servers.

PGP Chat

PGP chat client with user-managed encryption keys. No copies of messages or keys are stored on third-party servers.

Encrypted Vault

Encrypted file storage gives you the ability to store rich file formats, messages, and whole conversations. Save information as encrypted notes or create highly secure backups of your settings, contacts, and data

Security hardened Operating System

T2 COMMUNICATOR is powered by Secure OS, introducing multiple defense layers addressing various threats and achieving zero attack surface.

ZERO-ATTACK SURFACE

Exploitable entry points such as Google services are entirely removed. Others, such as GSM and SMS services, Bluetooth, NFC, GPS, and more, can also be blocked on OS level.

VERIFIED BOOT

During first enrollment, the device creates a unique fingerprint. When booting, the system validates the fingerprint against a server-side copy.

MULTIPLE LEVELS OF ENCRYPTION

All data stored on the device is secured and encrypted. Incoming and outgoing communication is end-to-end encrypted and transmitted over an encrypted network.

MULTIPLE WIPE OPTIONS

T2 COMUNICATOR provides several ways to wipe all data, including in case of physical tampering attempts, lost access, or the device is continuously disconnected or turned off.

SECURE KEYSTORE

All encryption keys are generated and stored on a FIPS 140-2 certified cryptographic module. No private keys are ever shared or stored outside the device.

TRUSTED UPDATES

Updates are issued and digitally signed exclusively through the Secure Administration System (SAS). Devices apply updates only after verifying the authenticity.

Perfect Hardware Integrity at Your Disposal

T.A.G. Consultation’s encrypted mobile devices address not only software but hardware threats as well, guaranteeing perfect integrity.

Security-hardened solution

The inheritably vulnerable sensors of smartphones, such as the GPS and NFC, are disabled in T2 COMMUNICATOR to ensure there’s no chance of them being exploited by third parties.

Perfect Integrity

No vulnerability can pass the rigorous quality-assurance procedures that guarantee the perfect hardware integrity and zero-day-protection of our encrypted mobile devices.

Anti-chip-off

Techniques that dismantle the device and try to access the information stored on its chip are not implementable against T2 COMMUNICATOR due to the encrypted device storage.

You’re in Control

T2 COMMUNICATOR is managed through the Secure Administration System (SAS) platform. It can be used to push policies on the device, enabling and disabling hardware, apps, and features, as well as for remote wipe.

Manage fleet of T2 COMMUNICATOR devices

Install and run on your own infrastructure

Enable third-party apps of your choosing

Self-hosted option avaialble

Want to Host Our Solution on Your Infrastructure?

Instant Connectivity

T2 COMMUNICATOR comes pre-equipped with a Multi-IMSI SIM card that gives users complete independence from third-party service providers and allows perfect connectivity around the globe.

Talk freely wherever you are without any roaming fees

Enjoy the best signal, auto-picked for you

Have unlimited data and coverage in more than 120 countries

Ensure providers have no access to your sensitive data or location

GLOBAL COVERAGE

Algeria, Burkina Faso, Congo, Egypt, Ghana, Kenya, Mali, Mauritius, Morocco, Nigeria, Rwanda, Senegal, South Africa, Tanzania, Tunisia, Uganda, Zambia

On-demand Customization

For clients that have specific requirements, TAG Consultation offers the ability to customize our solution further to fit your organization’s needs.

Software customization
Integration of 3rd party applications
Custom hardware specifications