SpeakInPrivate Your Confidential Communication Device.
Simple and affordable privacy. Secure voice, video, text, file transfers and lot more.
“
”
SpeakInPrivate“Security-oriented intelligence device” version of customized Android software that uses a virtual private network (VPN) to make users’ phone activity anonymous. It allows users to untraceably and privately make calls, send texts, send and receive files, and video chat.
It is an interesting and undoubtedly useful device, it has valuable specs that any person would want to have on his handset.
Key Features
Unlimited user to user Calling
Unlimited calls & text data sharing among users anywhere.
World Wide Encrypted Calling
User can make encrypted calls to non users also.
Free Credit
Users are allow to get free credit to make calls on non users.
Security Features
• Cryptography• Steganography
• Syscall Proxying technique where local program proxies process system call to remote server.
• Wiping – Securely deleting data, so that it cannot be restored even with forensic software.
• Erasing and overwriting data, so that they cannot be read by unauthorized persons.
Anti-Forensics Data Destruction
Data HidingData Contraceptio
n
Other Features – (Basic Model)
Particulars Features
BodyDimension - 142 x 71.9 x 9.2 mmWeight - 150 g Sim - Dual Sim
Display Size - 5.0 inches
Platform OS - Android OS, v4.2.2
MemoryCard Slop - Up to 32 GBInternal - 4 GB , 1 GB RAM
CameraPrimary - 8 MPSecondary - 2 MP
Other Features – (Superior Model)
Particulars Features
BodyDimension - 76.6 x 153.5 x 8.5 mmWeight - 176 g Sim - Single Sim
Display Size - 5.7 inches
Platform OS - Android OS, v4.4 (KitKat)
MemoryCard Slop - Up to 128 GBInternal - 32 GB , 3 GB RAM
CameraPrimary - 16 MPSecondary - 3.7 MP
Benefits of Speak in Private
• Extreme confidentiality for every voice transmission; control and prevention of eavesdropping and interceptions.Confidential
• High security for every type of voice threat: from toll fraud, denial of service, spoofing, and more. Secure
• Easier to use and Its GUI is user friendly. User Interface
• Proof that the contents of a message have not been changed since it was sent.Integrity
• The sender of a message cannot deny sending the message.Non-repudiation
Target Market
Target markets include India and
India friendly nations-
IndiaSouth East Asia except ChinaCentral AsiaMiddle East Africa Caribbean
Market Penetration Strategy - INDIA
Direct Sales in India through agents.
Public Private Partnerships.
Leveraging on Existing Clientele.
Leveraging a network of IPS and army officers for client reference.
Seek empanelment's in various bodies to get authorized access to
opportunities.
Market Penetration Strategy - International
Developed Sales partners in Saudi Arabia , UAE, Mongolia, Malaysia, Zimbabwe etc.
Developing more Sales Partners in target market globally.
Seeking opportunities in International defense sectors across developing economies.
Business Threats
Business Threats
Eavesdropping - Message
Interception (Attack on
Confidentiality)
Integrity Attack - Tampering
Authenticity Attack -
Fabrication
Attack on Availability
Service Speak in private Cell Crypt Black Phone Secure StarAnti Forensics Yes No No NoAnti Recording Yes No No NoAnti Snap shot Yes No No NoBiometric lock Yes No No NoCalling outside network Yes Yes Yes YesDevice specific Yes Yes Yes NoEncrypted calling Yes Yes Yes YesEncrypted file system Yes No Yes NoEncrypted File Transfer Yes No Yes NoEncrypted Text Yes No Yes NoEncrypted Video Calling Yes No No NoFirewall Yes No No NoKey Exchange Yes Yes Yes YesPersonalised Key Yes No No NoPrivate OS Yes No Yes NoRemote Wipeout Yes No Yes NoSignalling Encryption Yes Yes Yes YesVPN Yes No Yes No
Comparison
Summary
With the rapid growth of mobile phone usage in recent years, it is often observed that it has also become a part of many illegal and criminal activities. So, in most cases tracing the mobile number becomes a vital part of the investigation process.
Also, sometimes we just want to trace a mobile number back to the caller for reasons like annoying prank calls, blackmails, unknown number in a missed call list and so on.
Advent of smart phones and 4G connections give this opportunity a unique timing advantage.