XStealth Hardware Security

There is a kill switch to self-destruct on command even if the phone is turned off. As no other secure phones, XStealth USB port is protected by our well known volatile security filters: any attempt to connect the device to any other external device (no matter if PC, service box or forensic grade equipment), other than its own paired charger, will trigger a self-nuke mechanism that literally fry the whole motherboard in the same way as USB Kill work. Anti-tamper JTAG protection is also implemented: serial communications interface for low-overhead access without requiring direct external access to the system address and data buses are disabled by default at serial interface level.

XStealth Phones use a Tamper-Resistant Platform: any unauthorized attempts to connect the phone to any external device will delete the keys that encrypt all sensitive data. A remote wipe function is also available.

Authentication to login to the phone uses multi-factor (MFA) technology, like voice biometrics and facial recognition. Due to security risks involved by fingerprint recognition login, this option has been removed. Trusted Execution Environment (TEE) uses encrypted memory and includes a hardware random number generator.

Communication between the Secure Environment and the application processor is isolated to an interrupt-driven
mailbox and shared memory data buffers. There is also installed a Data Execution Prevention (DEP) technology to mitigate memory-based attacks. This defensive technology dramatically narrows the attack surface area for memory related exploits by preventing code
from being executable in sections of memory that have specifically allocated for read only data. DEP support is a
critically important defense when used in conjunction with Address Space Layout Randomization (ASLR). These core
improvements make it more difficult for spyware to perform buffer overflow, heap spraying, and other low-level
attacks. Therefore, even if an attacker succeeds in loading the spyware code into memory, the spyware code will not

XStealth Phones are not susceptible to side channel attacks, including various forms of power analysis attacks to ensure the protection of cryptographic keys.

XStealth Phones have the ability to execute a secure boot based on using a hardware root of trust for checking and storing hashes or signatures of firmware and other software loaded starting with the initial BIOS. XStealth Phones have separates CPU from Cellular Baseband, preventing this way external manipulation by baseband attacks.


XStealth Software Security

Today too many apps are engineered to collect and disseminate enormous amounts of user data—such as location, Web browsing histories, device-unique IDs, search terms, and contact lists – data they often simply don’t need.

Some app providers also try to obfuscate their data collection functions to get around restrictions by marketplaces such as Apple’s that are intended to prevent abuse of APIs and ensure better privacy for users. For example, researchers have recently discovered hundreds of apps in the App Store that extract personally identifiable user information via private APIs that Apple has forbidden them from calling. The abuser that was singled out – a Chinese mobile advertising developer called Youmi – used simple obfuscation techniques and dynamic linking to get around the application vetting checks performed by Apple. Same for Android platform, on weaker Google Play Store.

XStealth Phones runs a special version of the Android operating system—XROM—that blocks many of the ways phones leak data about your activities. XROM is an Android fork developed by XCell Technologies; it uses Google’s code for the underlying platform but skips Google Services in the same way Amazon’s FireOS does. The connection between XROM and software applications is filtered by Secure X-OS bridge, keeping both firmware and software applications away from exploits. Obfuscated code is adding an extra protection layer.

XStealth Phones does have Android trackers disabled by default, leaving no traces on Internet.

XStealth Phones comes with preinstalled generic applications which we have modified certain features (like removing back doors used by law enforcement and some security flaws), adding a plus of security and privacy (especially for Yahoo and Hotmail clients). This is why we have blocked any OTA software update which can restore security issues. Software updates usually refer to compatibility with new Android versions, which is not our case and will not impact application workflow.

Antivirus and Software Updates

XROM firmware is secure by default: no other software applications can be installed by the phone user (which have the phone on its hands) nor remotely, by obscure third parties or abusive law enforcement. Hence, no anti-virus software is needed. Also, XStealth Phone will not perform any OTA firmware/software update, which may lead to remote exploits. You have to understand our point of view and hopefully reconsider your approach when it comes to mobile security: XStealth Phones are not aiming average users. All our Stealth Phones has been developed for professional use: intelligence agencies, law enforcement and homeland security. All above entities does not rely on encryption when it comes to secure communications because of a simple fact: all mentioned agencies have legal access and gain information they need by using back doors provided right by the software developers. If there is no cooperation from developer, then they will use other effective methods to gain access to relevant info, other than the ones used by hackers. There are plenty of companies that provide a wide variety of methods to penetrate any system such as computers and mobile phones. FinFisher is one of them: "Our Deployment Methods & Exploitation Solutions cover the latest PCs, smartphones, tablets and most common operating systems." "FinFisher can be covertly installed on targets' phones by exploiting security lapses in the update procedures of non-suspect software." "The software suite, which the company calls "Remote Monitoring and Deployment Solutions", has the ability to take control of target phones and to capture even encrypted data and communications. Using "enhanced remote deployment methods" it can install software on target phones." FinFisher malware is installed in various ways, including fake software updates and security flaws in popular software. Sometimes the surveillance suite is installed after the target accepts installation of a fake update to commonly used software. The software, which is designed to evade detection by antivirus software, has versions which work on mobile phones of all major brands.

FinSpy is a field-proven Remote Monitoring Solution that enables Governments to face the current challenges of monitoring Mobile and Security-Aware Targets that regularly change location, use encrypted and anonymous communication channels and reside in foreign countries. FinSpy is bypassing 40 regularly tested Antivirus Systems.

Hence, no point to install an anti-virus as you have mentioned. XCell Technologies have opted for another effective solution to circumvent malware and harmful software install.

Please see also this short movie regarding remote mobile surveillance by "updating" a BlackBerry cell phone application: https://www.youtube.com/watch?v=n5ZJUXweayo

Even worst, also a not so skilled hacker can easily remotely install a spy application on a mobile phone which will not be detected by any antivirus, by the same "software update" procedure: https://www.youtube.com/watch?v=LicdrZwmHQo

There is a FinSpy detection algorithm installed deep on XROM firmware that will not only detect any intrusion attempt but will block any code execution.

Encrypted bootloaders comes as standard option.

XStealth Phones are also using SIM Toolkit inhibitor, a blocker for remote code execution via SIM Toolkit (used usually by both network operator and law enforcement).

XStealth Phones use adaptive security defenses, being ultra-secure and adaptive personal smartphones: we will install before shipping any software application desired by the buyer, but only after running a comprehensive security audit. We will refuse to pre-install applications that can affect user privacy and security, and phone functions. No file explorers will be installed, as well as forensic clients or modded applications. There are also things that we will not make them public available, as encryption algorithms used and firmware source code, simply because for any cryptanalyst will be easier to break encryption when used encryption algorithms are known.

Also, a user controlled source code is not an option for XStealth Phones: that might be a huge opportunity for hackers and state controlled entities to find exploits, remote install/RAT or spyware which in the end of the day will lead to no security.