22
SpeakInPrivate Your Confidential Communication Device. Simple and affordable privacy. Secure voice, video, text, file transfers and lot more.

SpeakInPrivate Phones - Introduction

Embed Size (px)

Citation preview

SpeakInPrivate Your Confidential Communication Device.

Simple and affordable privacy. Secure voice, video, text, file transfers and lot more.

Index

Concept

Benefits Marketing Plan

Business Threats Comparison

Financials Closing

SpeakInPrivate“Security-oriented intelligence device” version of customized Android software that uses a virtual private network (VPN) to make users’ phone activity anonymous. It allows users to untraceably and privately make calls, send texts, send and receive files, and video chat.

It is an interesting and undoubtedly useful device, it has valuable specs that any person would want to have on his handset.

Key Features

Unlimited user to user Calling

Unlimited calls & text data sharing among users anywhere.

World Wide Encrypted Calling

User can make encrypted calls to non users also.

Free Credit

Users are allow to get free credit to make calls on non users.

Security Features

• Cryptography• Steganography

• Syscall Proxying technique where local program proxies process system call to remote server.

• Wiping – Securely deleting data, so that it cannot be restored even with forensic software.

• Erasing and overwriting data, so that they cannot be read by unauthorized persons.

Anti-Forensics Data Destruction

Data HidingData Contraceptio

n

Other Features – (Basic Model)

Particulars Features

BodyDimension - 142 x 71.9 x 9.2 mmWeight - 150 g Sim - Dual Sim

Display Size - 5.0 inches

Platform OS - Android OS, v4.2.2

MemoryCard Slop - Up to 32 GBInternal - 4 GB , 1 GB RAM

CameraPrimary - 8 MPSecondary - 2 MP

Other Features – (Superior Model)

Particulars Features

BodyDimension - 76.6 x 153.5 x 8.5 mmWeight - 176 g Sim - Single Sim

Display Size - 5.7 inches

Platform OS - Android OS, v4.4 (KitKat)

MemoryCard Slop - Up to 128 GBInternal - 32 GB , 3 GB RAM

CameraPrimary - 16 MPSecondary - 3.7 MP

Technology Used

OTR

ZRTP

SRTP

XMPP, RTP

AES 128/256

Process of Encryption Communication

Plaintext

Encryption

OTR Cipher text

Decryption

Plaintext

Index

Concept

Benefits Marketing Plan

Business Threats Comparison

Financials Closing

Benefits of Speak in Private

• Extreme confidentiality for every voice transmission; control and prevention of eavesdropping and interceptions.Confidential

• High security for every type of voice threat: from toll fraud, denial of service, spoofing, and more. Secure

• Easier to use and Its GUI is user friendly. User Interface

• Proof that the contents of a message have not been changed since it was sent.Integrity

• The sender of a message cannot deny sending the message.Non-repudiation

Index

Concept

Benefits Marketing Plan

Business Threats Comparison

Financials Closing

Target Market

Target markets include India and

India friendly nations-

IndiaSouth East Asia except ChinaCentral AsiaMiddle East Africa Caribbean

Target Customers

Individuals Businesses Political groups Governments

Non-governmental organizations

Market Penetration Strategy - INDIA

Direct Sales in India through agents.

Public Private Partnerships.

Leveraging on Existing Clientele.

Leveraging a network of IPS and army officers for client reference.

Seek empanelment's in various bodies to get authorized access to

opportunities.

Market Penetration Strategy - International

Developed Sales partners in Saudi Arabia , UAE, Mongolia, Malaysia, Zimbabwe etc.

Developing more Sales Partners in target market globally.

Seeking opportunities in International defense sectors across developing economies.

Index

Concept

Benefits Marketing Plan

Business Threats Comparison

Financials Closing

Business Threats

Business Threats

Eavesdropping - Message

Interception (Attack on

Confidentiality)

Integrity Attack - Tampering

Authenticity Attack -

Fabrication

Attack on Availability

Index

Concept

Benefits Marketing Plan

Business Threats Comparison

Financials Closing

Service Speak in private Cell Crypt Black Phone Secure StarAnti Forensics Yes No No NoAnti Recording Yes No No NoAnti Snap shot Yes No No NoBiometric lock Yes No No NoCalling outside network Yes Yes Yes YesDevice specific Yes Yes Yes NoEncrypted calling Yes Yes Yes YesEncrypted file system Yes No Yes NoEncrypted File Transfer Yes No Yes NoEncrypted Text Yes No Yes NoEncrypted Video Calling Yes No No NoFirewall Yes No No NoKey Exchange Yes Yes Yes YesPersonalised Key Yes No No NoPrivate OS Yes No Yes NoRemote Wipeout Yes No Yes NoSignalling Encryption Yes Yes Yes YesVPN Yes No Yes No

Comparison

Summary

With the rapid growth of mobile phone usage in recent years, it is often observed that it has also become a part of many illegal and criminal activities. So, in most cases tracing the mobile number becomes a vital part of the investigation process.

Also, sometimes we just want to trace a mobile number back to the caller for reasons like annoying prank calls, blackmails, unknown number in a missed call list and so on.

Advent of smart phones and 4G connections give this opportunity a unique timing advantage.

Thank You