Swissline communicator is probably the most secure communications  device designed for use in high profile scenarios where security is  paramount!

Do you need a telephone which allows you to communicate with your peers with absolute peace of mind? Then please read on. Our technology provides highest level of protection from all the possible threats in communications. As operators we also have no technical ability to eavesdrop on our clients’ communications. Our communications system is the only one in the market with physical customer isolation at a HW level & multi-level  encryption which is resistant against quantum attacks. We don’t use insecure cloud technologies. With us, you are above the clouds. Todays average secure communications equipment and widely popular secure chat apps do not provide this level of security for a variety of reasons - as explained in this table. Please send us an email with any questions you may have and we will come back to you. Anonymous orders are accepted for your own privacy. Read below to learn more.
protection from
Sample entities from which we are guarding your private communications.
FSB/Former KGB
Quantum computer
Intelligence agencies

Security facts

Our solution is made by using entirely different concepts and technologies which makes it highly resistant against various attack vectors.
Satellite Gateway
Need to have private communication capabilities in a rural area? We offer extra services to get connected from almost any point on the planet. Please contact us privately (About Us)

Technology comparison

For informative purposes, the diagram below explains – to a certain degree and in a visual manner – how security within our solution operates. It also makes a comparison with other communication technologies available in the market. When a user speaks into the phone, during the call, the system produces a payload (speakers digital voice) every 25 milliseconds. We are taking one payload for the analysis below and showing you what happens with it during its travel from one speaker to another – in about 100 milliseconds.
Below information is best viewed on a computer.
Attack vectors
Other privacy solutions (This applies to now widely popular chat apps and slightly customised phones)
Attack vectors
Standard  smartphone/telephone call
Attack vectors

Stage 1 - encoding

Speakers’  voice is captured via microphone, digitalised and encoded. Text is encoded as  well.


Speakers’ voice is captured via microphone, digitalised and encoded. Text is encoded as well.

Speakers’ voice is captured via microphone and encoded.

The smartphone might have spyware on it. According to Wikileaks leaked documents, there are over 10 spyware programs developed just in one country. The user never knows if spyware is present.

Stage 2 - 1st encryption

Encoded data is then encrypted with a proven and unbreakable cipher by using the keys derived via ephemeral key exchange to provide perfect forward secrecy. For the less techy ones – this simply means 2 major things. 1. If a user spoke on the phone yesterday and somebody managed to record packets in the cell tower or anywhere similar, they cannot be decrypted. That recording is not even possible, because before such packets travel through cell towers, they will be encrypted once more with a different security layer [at later/in the next] stage. Furthermore, if this wasn’t the case – and even if the users’ equipment and server core got in to the wrong hands with a recording, which isn’t possible – it is still not possible to decrypt it because ephemeral cipher provides perfect forward secrecy. In other words, anything recorded – even having the original keys – is still mathematically not possible to decrypt. 2. This data is encrypted only on the other telephone. It cannot be decrypted at the server core in the data centre because of how such ciphers operate. The core only relays this information to its destination. Decrypting this would take current super computers a billion times more years than our universe has existed. Why? Because of maths. Governments use some pieces of this cipher for their top secret projects. This is publicly available information. In our solution, that is just the first line of privacy.


Encoded data is encrypted on the phone.

The biggest issue here is that such phone might be infected via some agency spyware program. It means that whatever secure communications app is used on it – since the phone is compromised – the security on the app is no longer valid. This is a general principle of security of digital devices, and that is how technology works. The other issue is that such phone has internet access. Thus, it can be hacked later, and not just by some agencies. That is why phones and computers are receiving security updates constantly. To patch security holes. Specific agencies and high-profile individuals use exploits to hack into such user devices without the user ever knowing. Some exploits are public and they get patched a bit faster, but there are many in the underground and private ones that do not get patched for years. Our company knows this. It can be confirmed by qualified  security expert. There are many attack vectors here, as a phone with internet connectivity uses a lot of protocols for its communications. We are talking about connections to different servers during the day, updates, app services, notification services, time services, and more. Plus normal usage of the phone. During the day, for an average user, it can reach around a hundred random destinations – even with privacy in mind. For more specialised phones, the amount of connections happens at a lesser degree, but the whole idea still applies.

No encryption happening here.

Clearly anyone with minimal access, like telecom operators and staff can listen.

Stage 3 - packet leaving the phone

Packet is then transmitted to our fog node by using one more encryption layer. A little box carried with the phone.


Packet is then transmitted through the internet or VPN towards the solution provider’s servers.

According to the above analysis, the same applies. Packet is encrypted and transmitted. But that information could have been intercepted earlier and leaked. Furthermore, if some unknown VPN’s are used here, more information is leaked, as it is unknown who operates them, who has access, whether they are on conventional data centres with spectre and meltdown bugs, or similar, and whether somebody is watching. At the other end of the VPN, packets can be seen by administrators of the solution – technically. This is how VPN works.

Voice data is transmitted to the nearest telephone exchange.

Unencrypted. Accessible by anyone intercepting the cables at any end or signal. 0 security.

Stage 4 - fog node

This device is responsible for making sure no other information leaves your phone ever. Packet is inspected, verified and accepted based on our security criteria. Only this type of packet travels within our systems.




Stage 5 - 2nd post-quantum encryption

On top of it, still in the fog node, after verification, the packet is encrypted one more time with different technologies. A symmetric encryption ciphers suite - quantum computer resistant. Thus, future, more powerful quantum computers will not be able to crack this encryption. Todays’ commonly used HTTPS security and alike, which is used by users browsing internet banking and similar sites, is at risk of being broken pretty soon because of developments in quantum computers – if it does not improve.




Stage 6 - fog sending out

After our packet is fully secured and encrypted multiple times, our fog node encapsulates it and assembles an IP protocol 17 packet as defined by RFC768 and transmits it to the nearest cell tower. In case we are using a satellite plugin, then this gets transmitted to the satellite directly. If we use WAN function, then it is transmitted through a home/office/public router. Or if it is the year 2020 and the node has a satellite plugin, it then is transmitted via Starlink satellite constellation.




Stage 7 - routing via public infrastructure

Our secured packet is routed via public network infrastructure until it reaches our data centre in Switzerland.


Packet is routed via public infrastructure towards servers.

Depending on the actual app, even if the phone is not tapped, some information would leak here in the majority of cases because of APNS and FCM notification servers. By using correlation techniques, it is then possible to build up a profile about the user, his habits, and other users he speaks with, based on timings.

Voice data is then routed through multiple exchanges and then goes backwards, via the same stages, until it reaches the recipient.

Unsecure and unencrypted. Accessible by anyone who is managing telephone exchanges in the path of this routing. 0 security.

Stage 8 - shield inspection

Packet reaches our shield device in the data centre. This is the first line of defence. It gets inspected for security and, only if it is legit and coming from our systems, it is passed further to the relevant silicon core for further processing.

NONE. Our swarm computing systems are 100% stealthy. There is no possibility for an outsider to know what this is based on and what it is running.

We can only assume that there is some degree of inspection and usage of standard firewall software, which does provide some security. This is the standard. But…

And it’s still not full proof security because of many other protocols communicating through this. Using firewall software from major companies has flaws because some administrators are just not good at configuring them properly, or they don’t do security updates, as it is time consuming. Even if they do security updates, flaws can come through them if the provider is infected. And these cases do happen in the software world.


Stage 9 - core processing

Packet is received at an individual client core. It is again inspected by using specific techniques backed up by heavy maths to ensure it is legit and then gets directed to the core of the other user involved in the call.


Packet reaches provider’s servers. It is then processed and sent backwards via the same stages to the other user on the call.

There are quite a few issues here. A lot of companies use virtualised servers. They are prone to bugs like spectre and meltdown. It means that information handled there might be intercepted. If the user’s billing information is kept, it can be leaked. Technical administrators can have access to it as well, by design. Based on our study, a lot of companies do not use the right encryption – meaning that some data is decrypted for processing at this stage. Hence, anyone with access to these servers can see it if they wish. We have also not seen any explanation of what happens at this stage in some widely used solutions. It is not known, and this cannot be trusted. Moreover, if such server is hacked, any app updates can carry an infection to the actual handset of the user to spy on them. A potential attack vector for agencies and individuals working on espionage.


Stage 10 - 2nd core processing

Second core receives the packet, inspects, verifies, and accepts it. Then, it is processed. From here, its journey goes backwards through the same stages in reverse logic but towards a second user on the phone who will be receiving the voice. When it goes back to stage 1, the second user gets played this over his telephone speaker once it is decrypted and decoded. All of this happens fast and, as a result, it feels and works like a telephone call for the callers.




Isolated cores
Each one of our clients get their own isolated core where data is processed to some extent. Our company transfers access keys of the core to the client after the service is purchased. Cores operate at such security standards where, even if they are compromised, they still don't leak private data. Though it is not possible to compromise them remotely.
Check out our current availibility

Solution availibility

At the moment, the portable cell tower model is available for usage at the EMEA countries highlighted below. However, if it is plugged in directly via a cable to an existing home/office router or to the upcoming satellite plugin, it already works anywhere on the planet. The global model is coming during H1 2020 - email us to join the waiting list. The global satellite plugin is coming in 2020.

Packages & Ordering

We currently accept bank transfers & crypto payments via Bitcoin, Litecoin, Ethereum, and Monero. More payment methods coming soon.
package specification
Each package contains phone's, fog node's and a dedicated swarm node only you get access to. To put it in more simple words - 2 people get a phone and a little device each. With this, they can communicate across long distances with highest security and privacy. Their swarm node which connects them sit's in Swissline infrastructure located in Switzerland. This infrastructure is designed in a way where only data between it and users is exchanged. There is 0 bytes of data ever traveling to/from the actual internet. All HW and SW is 100% managed by Swissline.
Fog node:
Swarm node:
Below packages are designed to work in EMEA region mobility wise. They work globally by utilising physical connection or satellite plugin (Contact us for any questions)
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your core is physically located inside our infrastructure in a Swiss data centre.

number of phones
Orders launching ~2020Q3. Limited stock. Email for waitlisting
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your core is located in the highest security data centre inside the Swiss Alps.

number of phones
Orders launching 2020
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your own choice of  isolated infrastructure location (Home premises as well) around Europe.

number of phones
Orders launching 2020
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

About Us & Contacts

Swissline Group is the company behind Swissline communications product and it is legally registered in Switzerland. It was founded in 2019 after over a year of development for the first product in an attempt to provide easier access to highest security communications equipment. Companys mission is to develop more top security products in todays environment where security needs are increasing every year. Other high profile security solutions are on companies roadmap in response to latest technology trends in communications and cryptocurrency sectors.
You have these options for emailing us:
  • If technology challenges you, just send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
General enquiries and support
You have these options for emailing us:
  • If technology challenges you, just send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
Patrick Brown
Johnny Trow
Jennifer Atkinson