Greater communications privacy than military has

Swissline communicator is probably the most secure communications device designed for use in high profile scenarios where security is paramount!

Explore

I About Us

Introduction

The communications solution that allows you to communicate with your peers with an absolute peace of mind. Our communication system is the only one in the market with physical customer isolation at the HW level, as well as multi-level, quantum-resistant encryption. We use no insecure cloud technologies. With us, you are above the clouds. Today's average secure communications equipment and widely popular secure chat apps do not give you this level of security for a variety of reasons – as explained here. Our technology provides the highest level of protection from all possible communication threats. As operators, we have no technical ability to eavesdrop on our customers' communications.

With your privacy in mind, we accept anonymous orders. Read below to learn more. If you have any questions, send us an email and we will get back to you.

With Swissline you get a lot security tech working behind the scenes to protect you. With others like telegram, sky and encro - you only get broken promises

Learn More

I Swissline Consulting

Swissline Consulting is the company behind the Swissline Communicator. The Swiss-based company was founded in 2019 after several years of development in an attempt to provide high-security communications equipment. The company's mission is to develop more security products for today's environment, where security needs are rapidly increasing. In response to the latest technology trends in the communications and cryptocurrency sectors, we have other high-profile security solutions on the roadmap.

I Protection From

Sample entities we guard your private communications from
Special Forces
FSB/Former KGB
CIA
MI6
NSA
Government
Dictators
Courts
Agents
special equipment
Intelligence agencies
Super computer
Quantum computer
Exploits
spies
Surveilance
Hackers
Contact Us

I Security Comparison

The diagram below gives an overview of how information travels within our solution and how it compares to other privacy solutions and standard smartphones and calls. For security reasons, we do not show the detailed path, and we omitted several processes.

Step 1
Swissline
Voice and text are captured, digitalised, and encoded. Data is encrypted with a proven and unbroken cipher.

Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed.

No security issues
Competition

Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption.

Security issues
The smartphone might be infected with spyware, which the user never knows. Even if the phone has a secure communications application, it is no longer secure. When using standard calls and sms, anyone with minimal access, like telecom operators and staff, can listen, technically.
Step 2
Swissline
The packet is transmitted to our fog node, which is responsible for making sure no other information leaves your phone. It is inspected, verified, and accepted based on our security criteria. Only our packets travel within our systems.

Not even future, more powerful quantum computers will be able to crack this encryption.

No security issues
Competition

The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted.

Security issues
In infected phones, even encrypted information could be intercepted and leaked. If unknown VPNs are used, this is more likely to happen. Data in standard phone calls are accessible by anyone intercepting the cables at any end of the signal.
Step 3
Swissline
Our fog node encapsulates the packet and transmits it to the nearest cell tower or satellite.

The packet can be transmitted directly to the satellite or through a home, office, or public router.

No security issues
Competition
Other solutions have no equivalent step.
Step 4
Swissline
Our secured packet is routed via public network until it reaches our data centre and onto our shield device. It gets inspected for security and, only if it is legitimate and is proven to come from our systems, it goes through further processing.

Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening.

No security issues
Competition

In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient.

Security issues
1. Even if the phone is using secure chat app, some information can leak at this stage due to notification servers. From this, it is possible to build up a profile about the user, his habits, and other users he communicates with.
2. Information can get intercepted due to bugs in virtualised servers, accessibility from technical administrators, decryption of information for processing, and infected app updates.
3. The data in standard phones are technically accessible by anyone managing telephone exchanges in the path.
Step 5
Swissline
The packet is received at the caller's core, inspected once more, and directed to the recipient's core. The second core receives the packet, inspects, verifies, and accepts it. Then, it is processed.
No security issues
Competition
Other solutions have no equivalent step.
Step 6
Swissline
The packet starts its journey back towards the recipient through the same stages, but in reverse. It happens fast, so it feels and works like a regular telephone call.
No security issues
Competition
The packet travels following the same steps above in reverse order until it reaches the other user.
Swissline
Competition
Step 1
Voice and text are captured, digitalised, and encoded. Data is encrypted with a proven and unbroken cipher.

Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed.

No security issues
Step 1

Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption.

Security issues
The smartphone might be infected with spyware, which the user never knows. Even if the phone has a secure communications application, it is no longer secure. When using standard calls and sms, anyone with minimal access, like telecom operators and staff, can listen, technically.
Step 2
The packet is transmitted to our fog node, which is responsible for making sure no other information leaves your phone. It is inspected, verified, and accepted based on our security criteria. Only our packets travel within our systems.

Not even future, more powerful quantum computers will be able to crack this encryption.

No security issues
Step 2

The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted.

Security issues
In infected phones, even encrypted information could be intercepted and leaked. If unknown VPNs are used, this is more likely to happen. Data in standard phone calls are accessible by anyone intercepting the cables at any end of the signal.
Step 3
Our fog node encapsulates the packet and transmits it to the nearest cell tower or satellite.

The packet can be transmitted directly to the satellite or through a home, office, or public router.

No security issues
Step 3
Other solutions have no equivalent step.
Step 4
Our secured packet is routed via public network until it reaches our data centre and onto our shield device. It gets inspected for security and, only if it is legitimate and is proven to come from our systems, it goes through further processing.

Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening.

No security issues
Step 4

In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient.

Security issues
1. Even if the phone is using secure chat app, some information can leak at this stage due to notification servers. From this, it is possible to build up a profile about the user, his habits, and other users he communicates with.
2. Information can get intercepted due to bugs in virtualised servers, accessibility from technical administrators, decryption of information for processing, and infected app updates.
3. The data in standard phones are technically accessible by anyone managing telephone exchanges in the path.

Step 5
The packet is received at the caller's core, inspected once more, and directed to the recipient's core. The second core receives the packet, inspects, verifies, and accepts it. Then, it is processed.
No security issues
Step 5
Other solutions have no equivalent step.
Step 6
The packet starts its journey back towards the recipient through the same stages, but in reverse. It happens fast, so it feels and works like a regular telephone call.
No security issues
Step 6
The packet travels following the same steps above in reverse order until it reaches the other user.
No standard computer systems are involved in the whole solution

The processing architecture in some of the components is also used in modern satellites and spacecraft. This means no usage of conventional Intel or AMD systems that may have back doors and security flaws.

Contact Us
Resistant against spectre

All the components of our solution are resistant against current and future security vulnerabilities of this kind, mainly due to its design. These security issues affected major data centre systems in 2018. The personal information of millions was at risk of being stolen from the platforms of the world’s biggest companies.

Contact Us
Privacy at the foundation

We surpass GDPR compliance guidelines. Additionally, we offer anonymous ordering and operation for the clients who require top privacy. Only the shipping address is required when making an order, which gets immediately deleted after successful delivery is confirmed.

Contact Us
Resistance against exploitation programs

It is believed that conventional consumers’ smartphones are being infected with highly engineered spyware tools without the end-user noticing it. If an average user’s phone is compromised – no matter what app is used inside it – it is not secure anymore. Wikileaks has numerous documents on governments’ activities on exploitation and spyware program development on a massive scale. It showed the development of more than ten such programs over the last decade just in one major government.

Contact Us
The handset

It has a direct channel to a little box that comes with it. The box is engineered to ensure it provides a communication channel for the phone, through which it communicates directly with the separate, physical silicon core sitting in our data centre. Upon purchase, only the customer can access it. Even if the phone is handed for spyware infection and then goes back to the customer, the box itself ensures that any further communication will remain private and secure. Let’s put it this way: any spyware or virus needs internet connectivity to leak your data – and our smartphone has none.

Contact Us
No internet

No need to worry about attacks, leaks, or any other security issues. In a call between two users, the information flows through different devices in our infrastructure. None of them has internet connectivity. Some have a custom configured channel where the internet is used only as a medium to exchange secured packets. Each one of them is thoroughly inspected to ensure no false positives travel through these channels. Further, there are no standard notifications as those required by Google’s FCM or Apple’s PNS servers to work, which, in our view, are very insecure. We use different methods with our infrastructure. For instance, on any app on today’s phones, 99.99% of the notifications are going through these servers every time the phone users make calls send texts over apps like Telegram[TM], Line[TM], WhatsApp[TM], and others. Moreover, if a typical smartphone user’s phone is compromised, it can send out private information without the user knowing it. Even from the most secure apps on that phone. In our solution, this is not possible.

Contact Us
No DNS

Since we need no internet, we do not use DNS. This greatly enhances security, as DNS is prone to data leaks and security breaches.

Contact Us
Data Centre

Our nodes are located in Switzerland’s data centre and are protected by Swiss law. This means that nobody has access to it. We also do not use conventional and hacking prone data centre and cloud technologies for enhanced security reasons.

Contact Us
Satellites

Customers from remote areas like deserts, seas, and jungles are able to connect via satellite plugins. Our solution will also work with Starlink’s constellation.

Contact Us
Encryption cracking

Instead of single encryption algorithms deployed on conventional secure chat apps, we use a combination of algorithms which have higher standards than those used by governments, ensuring that no supercomputer or quantum computer can breach it. Our algorithms are taken from different parts of the world to ensure that no single territory/government can have access even if they have engineered a backdoor in one of them. All current conventional solutions have this immediate risk.

Contact Us
Trust and transparency

We welcome the security auditors of certain customers to review and audit specific parts of the solution to verify our claims, on-demand. Our company is open to such activities to provide transparency and trust. As a special arrangement, we also offer custom and private installation for clients who require more assurance. A dedicated 1:1 hardware contract in data centres inside the Swiss mountains or clients premises is also possible. Contact us for more information.

Contact Us
No reliance on third party companies

Todays’ solutions, which provide some degree of privacy, rely on third party services and software development. If the software provider is hacked, it can carry infected updates and infect secure communication providers. Our solution is contained in an environment where not a single byte of data travels outside of our infrastructure. Ever.Conventional security solutions are insecure and lead to information leaks. When the users send texts, other solution providers use the already mentioned servers, such as Apple[TM] and Google[TM]. Other solutions rely on Blackberry[TM] servers and similar software. All of that is insecure, as they are connected to the internet and subject to updates. Also, any agency with access to these software companies can (technically speaking) view the data. We would not know, but it is technically possible. Our solution does not rely on any third party for the software nor any notifications.

Contact Us
Resistant against spectre

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Privacy at the foundation

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Resistance against exploitation programs

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
The handset

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
No internet

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
No DNS

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Data Centre

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Satellites

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Encryption cracking

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
Trust and transparency

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us
No reliance on third party companies

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft.

Contact Us

I Satellite Gateway

Do you need secure communication capabilities in remote areas? We offer additional services to connect you from almost anywhere on the planet.

Contact Us

I Solution Availability

Our Current Availability

The current model works worldwide.
For remote areas like jungles, deserts, and seas, we can provide a satellite connectivity contract for you.

I Isolated Cores

End user equipment is connected to the corresponding core in our infrastructure. There, data is processed to some extent. The cores operate at such high-security standards that, even if they are compromised, they do not leak private data. However, it is not possible to compromise them remotely.

Contact Us

I Packages and Ordering

Each package contains 1 phone, 1 fog node and 1 swarm node.

Phone Set Specification

Each phone set contains 1 phone, 1 fog node, and allocated swarm node. You need 2 phone sets in order to communicate across long distances with the highest security and privacy. The swarm node that connects the devices sits in Swissline's infrastructure located in Switzerland. It is designed to allow only the exchange of data between callers. There are 0 bytes of data traveling to or from the Internet. All hardware and software are managed 100% by Swissline.

I Global Packages

The packages below are designed to work globally by utilizing a physical connection or satellite plugin.
Gold
Anonymous ordering is possible. Includes unlimited voice calls, video calls, and texts. Your core is physically located inside our infrastructure in a Swiss data centre.
Contact Us
Platinum
The same as the Gold package, but your core is hosted inside a secure data centre in the Swiss Alps.
Contact Us
Diamond
The same as the Gold package, but your core is installed in your home or office.
Contact Us
For packages in Latin America and the Caribbean, contact the authorized distributor in the region.

I Contact Us

If you use secure emails, send us an encrypted email, or PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well.
Copy to clipboard PGP Key

Сopied to clipboard

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

I Contact Us

Thank You!
We will contact you as soon as possible
Back to Home Page
Your protection company number one