Swissline communicator is the world's most secure and unhackable device designed for use in high profile scenarios where security is  paramount!

If you need 100% privacy in communications, this is it. As operators, we have no technical ability to eavesdrop on our clients’ communications. And we can prove it with maths. No one else stands a chance at this at all. We offer top privacy solutions for the most paranoid. Our communication system is the only one in the market with ultimate isolation & multi-level quantum resistant encryption. We don’t use unsecure cloud technologies. With us, you are above the clouds. We know products that the majority of security focused consumers use – our studies and the leaks in most of them show that they do not provide perfect security. If you are concerned about your current security product, feel free to send us an email with your concerns and we will advise you. Because we value your privacy, we accept anonymous orders. Read more below to understand and compare the security aspects between other existing technologies.
accepted
protection from
Sample entities from which we are guarding your private communications.
Hackers
Agents
Courts
Governments
NSA
MI6
CIA
FSB/Former KGB
Dictators
Quantum computer
Supercomputer
Exploits
Surveilance
Intelligence agencies

Security facts

Our solution is made by using entirely different concepts and technologies which makes it highly resistant against various attack vectors.
Satellite Gateway
Need to have private communication capabilities in a rural area? We offer extra services to get connected from almost any point on the planet. Please contact us privately (About Us)

Technology comparison

For informative purposes, the diagram below explains – to a certain degree and in a visual manner – how security within our solution operates. It also makes a comparison with other communication technologies available in the market. When a user speaks into the phone, during the call, the system produces a payload (speakers digital voice) every 25 milliseconds. We are taking one payload for the analysis below and showing you what happens with it during its short lifetime – of about 200 milliseconds – in different stages. All the stages below happen very fast – in some cases, even faster than 100 milliseconds – on 7 different processing systems in our infrastructure. All these 7 devices are highly customized and developed specifically for the tasks and security measures described below. More or less the same happens with video call and text messaging, with the same security level.
Below information is best viewed on a computer.
Stage
Swissline
Attack vectors
Other privacy solutions (This applies to now widely popular apps and slightly customised phones)
Attack vectors
Standard  smartphone/telephone call
Attack vectors

Stage 1 - encoding

Speakers’  voice is captured via microphone, digitalised and encoded. Text is encoded as  well.

NONE.

Speakers’ voice is captured via microphone, digitalised and encoded. Text is encoded as well.

Speakers’ voice is captured via microphone and encoded.

The smartphone might have spyware on it. According to Wikileaks leaked documents, there are over 10 spyware programs developed just in one country. The user never knows if spyware is present.

Stage 2 - 1st encryption

Encoded data is then encrypted with a proven and unbreakable cipher by using the keys derived via ephemeral key exchange to provide perfect forward secrecy. For the less techy ones – this simply means 2 major things. 1. If a user spoke on the phone yesterday and somebody managed to record packets in the cell tower or anywhere similar, they cannot be decrypted. That recording is not even possible, because before such packets travel through cell towers, they will be encrypted once more with a different security layer [at later/in the next] stage. Furthermore, if this wasn’t the case – and even if the users’ equipment and server core got in to the wrong hands with a recording, which isn’t possible – it is still not possible to decrypt it because ephemeral cipher provides perfect forward secrecy. In other words, anything recorded – even having the original keys – is still mathematically not possible to decrypt. 2. This data is encrypted only on the other telephone. It cannot be decrypted at the server core in the data centre because of how such ciphers operate. The core only relays this information to its destination. Decrypting this would take current super computers a billion times more years than our universe has existed. Why? Because of maths. Governments use some pieces of this cipher for their top secret projects. This is publicly available information. In our solution, that is just the first line of privacy.

NONE.

Encoded data is encrypted on the phone.

The biggest issue here is that such phone might be infected via some agency spyware program. It means that whatever secure communications app is used on it – since the phone is compromised – the security on the app is no longer valid. This is a general principle of security of digital devices, and that is how technology works. The other issue is that such phone has internet access. Thus, it can be hacked later, and not just by some agencies. That is why phones and computers are receiving security updates constantly. To patch security holes. Specific agencies and high-profile individuals use exploits to hack into such user devices without the user ever knowing. Some exploits are public and they get patched a bit faster, but there are many in the underground and private ones that do not get patched for years. Our company knows this. It can be confirmed by qualified  security expert. There are many attack vectors here, as a phone with internet connectivity uses a lot of protocols for its communications. We are talking about connections to different servers during the day, updates, app services, notification services, time services, and more. Plus normal usage of the phone. During the day, for an average user, it can reach around a hundred random destinations – even with privacy in mind. For more specialised phones, the amount of connections happens at a lesser degree, but the whole idea still applies.

No encryption happening here.

Clearly anyone with minimal access, like telecom operators and staff can listen.

Stage 3 - packet leaving the phone

Packet is then transmitted to our fog node by using one more encryption layer. A little box carried with the phone.

NONE.

Packet is then transmitted through the internet or VPN towards the solution provider’s servers.

According to the above analysis, the same applies. Packet is encrypted and transmitted. But that information could have been intercepted earlier and leaked. Furthermore, if some unknown VPN’s are used here, more information is leaked, as it is unknown who operates them, who has access, whether they are on conventional data centres with spectre and meltdown bugs, or similar, and whether somebody is watching. At the other end of the VPN, packets can be seen by administrators of the solution – technically. This is how VPN works.

Voice data is transmitted to the nearest telephone exchange.

Unencrypted. Accessible by anyone intercepting the cables at any end or signal. 0 security.

Stage 4 - fog node

This device is responsible for making sure no other information leaves your phone ever. Packet is inspected, verified and accepted based on our security criteria. Only this type of packet travels within our systems.

NONE.

NA

NA

Stage 5 - 2nd post-quantum encryption

On top of it, still in the fog node, after verification, the packet is encrypted one more time with different technologies. A symmetric encryption ciphers suite - quantum computer resistant. Thus, future, more powerful quantum computers will not be able to crack this encryption. Todays’ commonly used HTTPS security and alike, which is used by users browsing internet banking and similar sites, is at risk of being broken pretty soon because of developments in quantum computers – if it does not improve.

NONE.

NA

NA

Stage 6 - fog sending out

After our packet is fully secured and encrypted multiple times, our fog node encapsulates it and assembles an IP protocol 17 packet as defined by RFC768 and transmits it to the nearest cell tower. In case we are using a satellite plugin, then this gets transmitted to the satellite directly. If we use WAN function, then it is transmitted through a home/office/public router. Or if it is the year 2020 and the node has a satellite plugin, it then is transmitted via Starlink satellite constellation.

NONE.

NA

NA

Stage 7 - routing via public infrastructure

Our secured packet is routed via public network infrastructure until it reaches our data centre in Switzerland.

NONE.

Packet is routed via public infrastructure towards servers.

Depending on the actual app, even if the phone is not tapped, some information would leak here in the majority of cases because of APNS and FCM notification servers. By using correlation techniques, it is then possible to build up a profile about the user, his habits, and other users he speaks with, based on timings.

Voice data is then routed through multiple exchanges and then goes backwards, via the same stages, until it reaches the recipient.

Unsecure and unencrypted. Accessible by anyone who is managing telephone exchanges in the path of this routing. 0 security.

Stage 8 - shield inspection

Packet reaches our shield device in the data centre. This is the first line of defence. It gets inspected for security and, only if it is legit and coming from our systems, it is passed further to the relevant silicon core for further processing.

NONE. Our swarm computing systems are 100% stealthy. There is no possibility for an outsider to know what this is based on and what it is running.

We can only assume that there is some degree of inspection and usage of standard firewall software, which does provide some security. This is the standard. But…

And it’s still not full proof security because of many other protocols communicating through this. Using firewall software from major companies has flaws because some administrators are just not good at configuring them properly, or they don’t do security updates, as it is time consuming. Even if they do security updates, flaws can come through them if the provider is infected. And these cases do happen in the software world.

NA

Stage 9 - core processing

Packet is received at an individual client core. It is again inspected by using specific techniques backed up by heavy maths to ensure it is legit and then gets directed to the core of the other user involved in the call.

NONE.

Packet reaches provider’s servers. It is then processed and sent backwards via the same stages to the other user on the call.

There are quite a few issues here. A lot of companies use virtualised servers. They are prone to bugs like spectre and meltdown. It means that information handled there might be intercepted. If the user’s billing information is kept, it can be leaked. Technical administrators can have access to it as well, by design. Based on our study, a lot of companies do not use the right encryption – meaning that some data is decrypted for processing at this stage. Hence, anyone with access to these servers can see it if they wish. We have also not seen any explanation of what happens at this stage in some widely used solutions. It is not known, and this cannot be trusted. Moreover, if such server is hacked, any app updates can carry an infection to the actual handset of the user to spy on them. A potential attack vector for agencies and individuals working on espionage.

NA

Stage 10 - 2nd core processing

Second core receives the packet, inspects, verifies, and accepts it. Then, it is processed. From here, its journey goes backwards through the same stages in reverse logic but towards a second user on the phone who will be receiving the voice. When it goes back to stage 1, the second user gets played this over his telephone speaker once it is decrypted and decoded. All of this happens fast and, as a result, it feels and works like a telephone call for the callers.

NONE.

NA

NA

Isolated cores
Each one of our clients get their own isolated core where data is processed to some extent. Our company transfers access keys of the core to the client after the service is purchased. Cores operate at such security standards where, even if they are compromised, they still don't leak private data. Though it is not possible to compromise them remotely.
Check out our current availibility

Solution availibility

At the moment, the portable cell tower model is available for usage at the EMEA countries highlighted below. However, if it is plugged in directly via a cable to an existing home/office router or to the upcoming satellite plugin, it already works anywhere on the planet. The global model is coming during Q3 2019 - email us to join the waiting list. The global satellite plugin is coming in Q3-Q4 2019.

Packages & Ordering

We currently accept bank transfers & crypto payments via Bitcoin, Litecoin, Ethereum, and Monero. More payment methods coming soon.
General package specification
Each package comes with a number of phones.
EMEA PACKAGES
Below packages are designed to work in EMEA region mobility wise. They work globally by utilising physical connection or satellite plugin (Contact us for any questions)
GOLD
€6000
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your core is physically located inside our infrastructure in a Swiss data centre.

number of phones
Orders launching ~2019/09. Limited stock. Email for waitlisting
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
exclusive
platinum
€20000
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your core is located in the highest security data centre inside the Swiss Alps.

number of phones
Orders launching Q4 2019
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Diamond
€50000
per year

Anonymous ordering. Unlimited voice calls, video calls, texts. Your own choice of  isolated infrastructure location (Home premises as well) around Europe.

number of phones
Orders launching Q1 2020
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
exclusive

About Us & Contacts

Swissline Group is the company behind Swissline communications product and it is legally registered in Switzerland. It was founded in 2019 after over a year of development for the first product in an attempt to provide easier access to highest security communications equipment. Companys mission is to develop more top security products in todays environment where security needs are increasing every year. Other high profile security solutions are on companies roadmap in response to latest technology trends in communications and cryptocurrency sectors.
Director
director@swissline.org
You have these options for emailing us:
  • If technology challenges you, just send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
General enquiries and support
support@swissline.org
You have these options for emailing us:
  • If technology challenges you, just send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
Patrick Brown
Designer
Johnny Trow
Designer
Jennifer Atkinson
Marketeer
PGP Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBF0DjksBEADUXKvwYnIQlmjuKYeCKFKdy5yljpxjoS1151SWyMSDt4C2+pTA
v78wmhvJQeHT/ZXGJ+Rn1Y6YjY9C8LMEMhUbOTC+HWF68WtENXf+OUIi8SnGJ3kW
hht8YuxCw5CK5pICCoJpUteejzIVjjQUxLenh6HnIBR0rSK2kokEgxfUnV1oLPyp
58CzLtWkWLlRYjHuloAf+26Gyns2bplzpuX2DuDg/KAfQ3eKjBfbR+SXVMpFJo+L
d3d3L7A6HpV8qrbpomA6aF/DgfHwK5RAJDRwp5MUjRa4ppk1t8BEVFzsGxmlFBIR
UfKwWDrJ3YKI7MR67UzZzVFmW0v+Ys5mwhmpnHsL1y+6/7ulF7uhNmgHXyMO4Thf
S9EdvxjaXGw8J4aofViM9oaVjY4YSwgTYzrbZ8BS5ZBRItJW8wdM7SngRAeixj1m
1PSBIV+TjO+8fUABw0qvZrXtywDbkbQXtDObsBzu6B5nmVteBkONFEUkvzPhmFVD
SYxBfrhCgEe53pT+GHyGMOoI9P7KvkFqtMs07yhNlAqZeugbVh1s69/c7gxX2QUz
ClQxgKdpMafbjaar5hFqspwQYKn/+RS6SV2RREQegrMynkiy/jVsh92EmhfLtVae
o18j3kaaUT8roqdF0yONFi5mqpIV5qONxENIvpUDxZCwhf7CMfBj717oawARAQAB
tCtTd2lzc2xpbmUgRGlyZWN0b3IgPGRpcmVjdG9yQHN3aXNzbGluZS5vcmc+iQJU
BBMBCAA+AhsDBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEE+wY4CHE8Bjk6AJRd
+epaMzsFF3kFAl0Dn7EFCTpZMIYACgkQ+epaMzsFF3k05A/8CD9onrltNu50JlTl
HnTFh1Fhxu3h3RhDUGQUAxhPerh68p0t1hyj9tEtfs1jmUqxE1xMrgd9m5PHuof0
2r2zEJIp84sDrG77Sy2v60/z5tMBJ8MrfinQZO/qfof+TXgl0SM8MJmVzrlN43f5
24pxJ9H7UTtQGbU+Yf6C1TMHgw30mV9XOqh3QXE3eheVPF+hrKLtXekyGqTBbqfd
+LzedAN7BRBWIvIbeXBn1h1Ei0TpT2bktrEzVHtDgrD9uFb11gu/jTwo6sAq2bTC
3nGxCI+adHcqwYiCgCJ8nuK+bzkeUrrM5kajK2cT0/vOymRbxqTWR+E5B18hO3wM
UZupu/rv8/I+2dybcSNUyuajwqSySdcjwj3fhDgXth6F+jA9YKBRzHDDiHFmEK2A
XFsNPlXfInGYR+Q6HKY7C5G+Tdxoy/z+MX7sosGAGgtv2GRBBQTdjXrVwYjRkWiX
ADu/sJwVJH2uhgWqB60nNQzb0FxTWibXcpyiQyyJBrJsV4vsF1iNVux9nUzB8rWT
EQUpQBDWyubWKrn0Ptn/lFn5+LOqaOiC5WGDGGAUgx4Onyfkp8tnDaUcVVgZkTN0
PuFCSmqFF6zWSRgycK1TU8mRFZVG2pB6auWuO7lRW01LuvgDW3LFNaxIiWIdjxaQ
EimxYPXV71n+ibQcmi3xXlcCv2G5Ag0EXQOOSwEQAJggYkgDlKOdAfana6q8th/j
zXRsqSfMQMUALEjPePGhrGbE4i5qGPzzo4CwPQlEOCJe6olFgmcl1Lm4Wy4rFcN8
5YJUk8wnLdvBJGWEfIhIgbLJ68hjRdQmAAWzqCe0D/xC1pg/CNUOyqjLQCzAISTe
S61io6mM6mMgVZ+SQRxsch50rNCA0MS8wtKiwdPNLiqqwoBrf7fbP9Rf3hwhUJoy
zekLfWlz0SaK9rZaThpemZeLYhh1MKiAaCqGs2R1ALwY0pXWJbW4cY5aL8gnWb+W
mc5acV3/Sd6TchWl2Um187WKumwSDL9KJGiXRekAllxIU6ezGGP/UoVZfb4eEUob
9W2DRkq/CciZbecyW7cix2/HyzNR8++j82uRwOEds6WcplAkBncYqumvpFCSKvXQ
rl9Wex835fbJRs43AfFOrfCDYccSuO6Iqh3gfQ2fKR7XgAjDZ8RTWtUemlmNNGRi
iHT0iSlDuaQIcYjA93HQj/oWOcYDnuTnk6WF7wFJ/Vx7hGrtnS6x4ybTW2ZDPBmG
lOrxpTN6kvnnQzny2Axr3nPZvhb2VjYvDE+FMXXPi6Db2459ybz7xQwWtP30dBWz
g+6DigJ1Kho+2mB2xarZZz6Z3HSXGTQpGsKlRoGkg/la7OwtjZOKQJM8BVkdtYJY
dq73Fxvr2/s32Rf8vnpTABEBAAGJAjwEGAEIACYWIQT7BjgIcTwGOToAlF356loz
OwUXeQUCXQOOSwIbDAUJAAAAAQAKCRD56lozOwUXeeJND/4p0fD2DlO2bwI/TP2x
w3dRbRIcbI1PkwgcyU4SFXxb3X5ARg8msHWPbB2l/V97OCbUXULoCM5yJrk/qijZ
w26An+s3XemOuENyoaevFySHZYBXmWjN1WTreOBjvEC9tfzLWER7HSpw3/WNVYqc
OPuMgoB22r4DcD0b5IjskPsDPcGyhDX8/RMf1bRd7z8pCakTxvhwDnj3m06vcYEY
1JNPkcm4oSFdhIaO4++mssasUjuQ698ddfH7Aler5al31PQEQoQOxdEz/YXPrgXo
vZggHpKIRVrmoNOC6Rb5smyBfu4qnUJBrb0Rg+/bawJyJKvm3kNXWDZyWELM0ZgP
4ykSwnXpzhwW++mDttbDlcFrIZH349G2z4TvnwYRCelpa2Hge98agijp2S01TVxi
bVaJjaz/UTAwHCIMo+mCjeKWAsf7D+n4/rwyVIOzG84XnZWXaGrZHN2G7s8JseRP
GJvc0pB2RwUogcCEkSFtoJcQVrEwqvuLYAbfhyS8n59cnMbzHUZiiyCmwAS2r4Ck
YZLlPJbar29Hlgj/p1ALB5SZkZbIBImyzlb0MQN9tQsYxBRNgOi3+kJMLYR2tHo0
9vae0rjB0io/R9PrXQflC95H7EcbYWHwgYjBcCfHZIAYoz5XEYUk7gzhvLoddRpg
P9gfHX3Qz5zbyz+WQHM58HpPaA==
=CPIP
-----END PGP PUBLIC KEY BLOCK-----