Peace of mind in your pocket

No matter where you go, your smartphone is under constant attack from criminals, corporations and foreign governments. Professionals around the world trust their Armadillo Phone to protect them. Communicate instantly using encrypted email, insant messaging and audio or video calling. Travel safely to over 150 countries with multiple passwords and advanced hacking protection. If you need mobile security, you need an Armadillo Phone.

Security

Armadillo Phone is designed from the hardware up to be secure. Cameras, microphones and fingerprint scanners can be physically removed. If you're forced to surrender your Armadillo, you can reveal a decoy password to enter a decoy mode. Or a wipe password to erase everything. Our unique anti-theft beacon will shutdown your phone if it's stolen. Your access card prevents unauthorized use, even if attackers have your password. Anti-hacking protection neuters attacks that would compromise other phones. High-strength encryption prevents us from being able to read any of your messages. Lockscreen improvements mitigate shoulder-surfing. Our network is monitored by a team of professionals waiting to defend against hackers. Regular updates keep you patched against the latest vulnerabilities. We even pay outside security experts to audit Armadillo Phone and help uncover unknown flaws.

Privacy

We value our customer's privacy and this is why we offer anonymous payment methods and require no personal information to purchase. We operate on a "zero-trust" basis, so we never have access to a user's messages or encryption keys. You can also purchase your own server to maintain total control of your metadata.

Protect yourself now

Features

Tamper-resistant packaging

All our packaging and shipments are sent with tamper-evident seals to prevent your orders from being intercepted and physically modified. Package interdiction is a common method state-sponsored attackers use to compromise your security.

Device inspection

Devices are disassembled and inspected prior to being sent to make sure we haven't received any tampered, modified or faulty hardware.

Secure hardware

Cameras, microphones and fingerprint sensors can be removed to prevent compromise in the unlikely event your Armadillo Phone is hacked. We use the Nexus 5X for our platform, a highly-audited smartphone with guaranteed security updates and security bounties of up to $350,000 for vulnerabilities.

Multiple passwords

Armadillo Phone uses multiple passwords to allow you to hide your secrets, even when you're forced to give them up. The encryption is also strengthened, making bruteforcing attacks extremely difficult.

Use your secret password to access your real data.
Use your decoy password to access your decoy data.
Use your wipe password to erase your data.

Zero-Day Protection

A stripped down operating system, combined with advanced memory protection and code sanitization make memory corruption vulnerabilities that affect other phones extremely difficult to exploit. We use memory-safe programming languages whenever possible to further prevent attacks.

Security Peripherals

Security peripherals combine with your Armadillo Phone to enhance physical security.

Anti-Theft Beacon: Prevent theft or forensic seizure by automatically shutting down when disconnected.
NFC Access Card: Authenticate for an additional level of protection.

Proactive defense

Armadillo Phone is engineered using advanced hacking protection to defend against unknown vulnerabilities.

Our applications also monitor suspicious activity, alert the user and prevent attacks before they happen.

RAM Sentinel: Monitor the temperature for cold-boot attacks and shutdown if too cold.
Theft Sentinel: Alarm and shutdown the phone if the anti-theft beacon is disconnected.

Communication

Use advanced features to communicate like video conferencing, self-destructing messages and group chats. Decentralized end-to-end encryption protects your data, so even if our server is hacked your conversations are still secure.

Chat: Secured using OMEMO encryption.
Email: Secured using PGP-N encryption.

Productivity

Enhance your business productivity without compromising security.

Calendar: Offline calendar to plan events.
Clock: Set alarms and timers.
Contacts: Offline contact storage.
Downloads: Manage downloaded files
Notepad: Encrypted notepad to store your thoughts.
PDF Viewer: Open and view PDF files securely.

Decentralized

Don't allow unknown third-parties to control your data. Protect yourself with our included communications network or use your own. We can supply you with private servers completely under your control.


CONTACT US to learn more.

Technical Details

  • Storage Encryption

    -AES-256-XTS block-level FDE
    -Block-level FDE instead of Android's file-based encryption
    -Scrypt work factors increased
    -Minimum 8-character alphanumeric password
    -Completely software-based
    -Keymaster and gatekeeper disabled
    -Normal password for deniable encryption
    -Secret password stored at randomized offset
    -Secret volume is hidden inside unused portion of decoy data
    -Wipe password in footer to erase device
    -Separate lockscreen password
    -Password verification order randomized at runtime to prevent timing attacks

  • Memory Protection

    -Enhanced KASLR and userland ASLR
    -Increased ASLR entropy
    -Several PaX patches ported
    -Zygote uses exec() spawning instead of fork()
    -Improved SELinux rules
    -Hardened malloc implementation
    -Stack and heap canaries detect overflows
    -Enhanced FORTIFY_SOURCE implementation
    -Function pointer protection
    -Restrictive compile-time sanitization
    -Additional attack surface reduction

  • Communication Encryption

    -All connections made using pinned TLS 1.2 connections with high-entropy 4096-bit certificates
    -Metadata can be further protected by enabling optional VPN
    -Verify encryption keys using manual verification, QR code, SMP or NFC
    -Chat uses OMEMO encryption
    -Email uses PGP encryption
    -Email uses randomized subjects
    -Email uses encrypted connection to keyserver and mailserver
    -Email requires 4096-bit PGP keys

  • Sentinels

    -Radio Sentinel: Monitors WiFi networks for ARP poisoning. Monitors cellular networks for 2G networks, performs sanity checks and compares cellular towers to a database of known network
    -RAM Sentinel: Monitors temperature to prevent cold-boot attacks
    -Theft Sentinel: Connects to anti-theft beacon over BLE, alarms both beacon and phone if disconnected. If phone isn't unlocked or beacon isn't reconnected within 5 minutes the phone will shutdown.

  • Interface

    -Easy-to-use mobile GUI
    -Get help from our team instantly through built-in apps
    -Control overall security level with a simple widget
    -Low security: browser enabled, insecure communication enabled, secure applications disabled
    -Medium security: browser disabled, insecure communication enabled, secure applications enabled
    -High security: browser disabled, insecure communication disabled, secure applications enabled, Sentinel applications activated, VPN enabled, USB file transfer disabled

Ready to protect yourself?

Your attackers aren't going to wait for you to decide...