Swissline communicator is probably the most secure communications  device designed for use in high profile scenarios where security is  paramount!

The communications solution which allows you to communicate with your peers with absolute peace of mind. Our technology provides highest level of protection from all the possible threats in communications. As operators we also have no technical ability to eavesdrop on our clients’ communications. Our system is the only one in the market with physical customer isolation at a HW level & multi-level  encryption which is resistant against quantum attacks. We don’t use insecure cloud technologies. With us, you are above the clouds. Todays average secure communications equipment and widely popular secure chat apps do not provide this level of security for a variety of reasons - which are explained on our website. Anonymous orders are also accepted for your privacy. No technical knowledge is needed to operate our solution and we include a quick start manual which allows you to get up and running very quickly.
protection from
Below is a list of sample entities we guard your private communications from.
FSB/Former KGB
Quantum computer
Intelligence agencies

Security facts

Our solution is made by using entirely different concepts and technologies which makes it highly resistant against various attack vectors.
Satellite Gateway
Need to have private communication capabilities in a rural area? We offer extra services to get connected from almost any point on the planet. Please contact us privately (About Us)

Technology comparison

For informative purposes, the diagram below explains – to a certain degree and in a visual manner – how security within our solution operates. It also makes a comparison with other communication technologies available in the market. When a user speaks into the phone, during the call, the system produces a payload (speakers digital voice) every 25 milliseconds. We are taking one payload for the analysis below and showing you what happens with it during its travel from one speaker to another – in about 100 milliseconds.
Below information is best viewed on a computer.
Attack vectors
Other privacy solutions (This applies to now widely popular chat apps and slightly customised phones)
Attack vectors
Standard  smartphone/telephone call
Attack vectors

Stage 1 - encoding

Speakers’  voice is captured via microphone, digitalised and encoded. Text is encoded as  well.


Speakers’ voice is captured via microphone, digitalised and encoded. Text is encoded as well.

Speakers’ voice is captured via microphone and encoded.

The smartphone might have spyware on it. According to Wikileaks leaked documents, there are over 10 spyware programs developed just in one country. The user never knows if spyware is present.

Stage 2 - 1st encryption

Encoded data is then encrypted with a proven and unbreakable cipher by using the keys derived via ephemeral key exchange to provide perfect forward secrecy. For the less techy ones – this simply means 2 major things. 1. If a user spoke on the phone yesterday and somebody managed to record packets in the cell tower or anywhere similar, they cannot be decrypted. That recording is not even possible, because before such packets travel through cell towers, they will be encrypted once more with a different security layer [at later/in the next] stage. Furthermore, if this wasn’t the case – and even if the users’ equipment and server core got in to the wrong hands with a recording, which isn’t possible – it is still not possible to decrypt it because ephemeral cipher provides perfect forward secrecy. In other words, anything recorded – even having the original keys – is still mathematically not possible to decrypt. 2. This data is encrypted only on the other telephone. It cannot be decrypted at the server core in the data centre because of how such ciphers operate. The core only relays this information to its destination. Decrypting this would take current super computers a billion times more years than our universe has existed. Why? Because of maths. Governments use some pieces of this cipher for their top secret projects. This is publicly available information. In our solution, that is just the first line of privacy.


Encoded data is encrypted on the phone.

The biggest issue here is that such phone might be infected via some agency spyware program. It means that whatever secure communications app is used on it – since the phone is compromised – the security on the app is no longer valid. This is a general principle of security of digital devices, and that is how technology works. The other issue is that such phone has internet access. Thus, it can be hacked later, and not just by some agencies. That is why phones and computers are receiving security updates constantly. To patch security holes. Specific agencies and high-profile individuals use exploits to hack into such user devices without the user ever knowing. Some exploits are public and they get patched a bit faster, but there are many in the underground and private ones that do not get patched for years. Our company knows this. It can be confirmed by qualified  security expert. There are many attack vectors here, as a phone with internet connectivity uses a lot of protocols for its communications. We are talking about connections to different servers during the day, updates, app services, notification services, time services, and more. Plus normal usage of the phone. During the day, for an average user, it can reach around a hundred random destinations – even with privacy in mind. For more specialised phones, the amount of connections happens at a lesser degree, but the whole idea still applies.

No encryption happening here.

Clearly anyone with minimal access, like telecom operators and staff can listen.

Stage 3 - packet leaving the phone

Packet is then transmitted to our fog node by using one more encryption layer. A little box carried with the phone.


Packet is then transmitted through the internet or VPN towards the solution provider’s servers.

According to the above analysis, the same applies. Packet is encrypted and transmitted. But that information could have been intercepted earlier and leaked. Furthermore, if some unknown VPN’s are used here, more information is leaked, as it is unknown who operates them, who has access, whether they are on conventional data centres with spectre and meltdown bugs, or similar, and whether somebody is watching. At the other end of the VPN, packets can be seen by administrators of the solution – technically. This is how VPN works.

Voice data is transmitted to the nearest telephone exchange.

Unencrypted. Accessible by anyone intercepting the cables at any end or signal. 0 security.

Stage 4 - fog node

This device is responsible for making sure no other information leaves your phone ever. Packet is inspected, verified and accepted based on our security criteria. Only this type of packet travels within our systems.




Stage 5 - 2nd post-quantum encryption

On top of it, still in the fog node, after verification, the packet is encrypted one more time with different technologies. A symmetric encryption ciphers suite - quantum computer resistant. Thus, future, more powerful quantum computers will not be able to crack this encryption. Todays’ commonly used HTTPS security and alike, which is used by users browsing internet banking and similar sites, is at risk of being broken pretty soon because of developments in quantum computers – if it does not improve.




Stage 6 - fog sending out

After our packet is fully secured and encrypted multiple times, our fog node encapsulates it and assembles an IP protocol 17 packet as defined by RFC768 and transmits it to the nearest cell tower. In case we are using a satellite plugin, then this gets transmitted to the satellite directly. If we use WAN function, then it is transmitted through a home/office/public router. Or if it is the year 2020 and the node has a satellite plugin, it then is transmitted via Starlink satellite constellation.




Stage 7 - routing via public infrastructure

Our secured packet is routed via public network infrastructure until it reaches our data centre in Switzerland.


Packet is routed via public infrastructure towards servers.

Depending on the actual app, even if the phone is not tapped, some information would leak here in the majority of cases because of APNS and FCM notification servers. By using correlation techniques, it is then possible to build up a profile about the user, his habits, and other users he speaks with, based on timings.

Voice data is then routed through multiple exchanges and then goes backwards, via the same stages, until it reaches the recipient.

Unsecure and unencrypted. Accessible by anyone who is managing telephone exchanges in the path of this routing. 0 security.

Stage 8 - shield inspection

Packet reaches our shield device in the data centre. This is the first line of defence. It gets inspected for security and, only if it is legit and coming from our systems, it is passed further to the relevant silicon core for further processing.

NONE. Our swarm computing systems are 100% stealthy. There is no possibility for an outsider to know what this is based on and what it is running.

We can only assume that there is some degree of inspection and usage of standard firewall software, which does provide some security. This is the standard. But…

And it’s still not full proof security because of many other protocols communicating through this. Using firewall software from major companies has flaws because some administrators are just not good at configuring them properly, or they don’t do security updates, as it is time consuming. Even if they do security updates, flaws can come through them if the provider is infected. And these cases do happen in the software world.


Stage 9 - core processing

Packet is received at an individual client core. It is again inspected by using specific techniques backed up by heavy maths to ensure it is legit and then gets directed to the core of the other user involved in the call.


Packet reaches provider’s servers. It is then processed and sent backwards via the same stages to the other user on the call.

There are quite a few issues here. A lot of companies use virtualised servers. They are prone to bugs like spectre and meltdown. It means that information handled there might be intercepted. If the user’s billing information is kept, it can be leaked. Technical administrators can have access to it as well, by design. Based on our study, a lot of companies do not use the right encryption – meaning that some data is decrypted for processing at this stage. Hence, anyone with access to these servers can see it if they wish. We have also not seen any explanation of what happens at this stage in some widely used solutions. It is not known, and this cannot be trusted. Moreover, if such server is hacked, any app updates can carry an infection to the actual handset of the user to spy on them. A potential attack vector for agencies and individuals working on espionage.


Stage 10 - 2nd core processing

Second core receives the packet, inspects, verifies, and accepts it. Then, it is processed. From here, its journey goes backwards through the same stages in reverse logic but towards a second user on the phone who will be receiving the voice. When it goes back to stage 1, the second user gets played this over his telephone speaker once it is decrypted and decoded. All of this happens fast and, as a result, it feels and works like a telephone call for the callers.




Check our current availability

Solution availability

The current model works worldwide.

For remote areas like jungles, deserts, and seas, we can provide a satellite connectivity contract for you. Contact us to learn more.
Isolated cores
Each one of our clients get their own isolated core where data is processed to some extent. Our company transfers access keys of the core to the client after the service is purchased. Cores operate at such security standards where, even if they are compromised, they still don't leak private data. Though it is not possible to compromise them remotely.

Packages & Ordering

We currently accept bank transfers & crypto payments via Bitcoin, Litecoin, Ethereum, and Monero. More payment methods coming soon.
package specification
Each package contains 1 phone, 1 fog node and 1 swarm node. Swarm node always sit's in Swissline's infrastructure in Switzerland and communicates with client's equipment. This infrastructure is designed in a way where only data between it and users is exchanged. There is 0 bytes of data ever traveling to/from the actual internet. All HW and SW is 100% managed by Swissline. Below you can see details about each device.
Fog node
Swarm node
Please contact us to make an order
€ email us
for pricing

Anonymous ordering possible. Unlimited voice calls, video calls, texts. Your core is physically located inside our infrastructure in a Swiss data centre.

number of phones
Please contact us to make an order
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
€ email us
for pricing

Same as gold but your core is hosted inside secure data centre inside Swiss Alps.

number of phones
Online orders launching ~2021. Email us for purchasing prior to online orders launch
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
€ email us
for pricing

Same as gold but your core is hosted inside your home or office.

number of phones
Online orders launching ~2021. Email us for purchasing prior to online orders launch
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

About Us & Contacts

Swissline Consulting is the company behind Swissline communications product and it is legally registered in Switzerland. It was founded in 2019 after over a year of development for the first product in an attempt to provide easier access to highest security communications equipment. Companys mission is to develop more top security products in todays environment where security needs are increasing every year. Other high profile security solutions are on companies roadmap in response to latest technology trends in communications and cryptocurrency sectors.
You have these options for emailing us:
  • Send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
General enquiries and support
You have these options for emailing us:
  • Send us a conventional email.
  • If you use secure emails, send us an encrypted email.
  • You can also send us PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. You can also find our key below.
Patrick Brown
Johnny Trow
Jennifer Atkinson