Users' desire for anonymity drives global demand for Aussie-built secure smartphones

An Australian smartphone designed to preserve privacy and anonymity has attracted global attention as startup company Ncryptcellular promotes the software-and-hardware combination as an antidote to increased government surveillance.

The $1465 Ncrypt Mega, $1314 Ncrypt Super, and $1182 Ncrypt Slim are [[xref: |customised versions]] of the Android-based Oppo N3, R5, and Find 7 smartphones, respectively, which have been packed with open-source applications and custom tools that allow users to strip identifying information, encrypt their voice and data communications, and even generate fake traffic designed to throw off government metadata sniffers.

“The reality is that the government is doing a lot of snooping,” chief technical officer Alex Kesik told CSO Australia, “and a lot of people are starting to care. A year and a half ago I told myself this was going to start happening in four years, but it's happening much more quickly. We even have the ATO [[xref: |trying to get access]] to people's metadata now – and people don't like that.”

In the weeks since its launch, a marketing campaign combining Facebook promotions and Google ads has spawned a stream of enquiries from potential distributors and small mobile-phone retailers keen to buy the devices wholesale in their thousands. These companies see the Ncryptcellular devices as appealing to the growing demographic of business and personal users that want to keep their online activities private.

The Ncryptcellular devices embed security tools including integrated connectivity to the Tor anonymity network, an integrated XMPP client that can also be used over the Tor network, and purpose-built system tools including the Secure Talk phone application; Secure Text for encrypted SMS: Secure Mail; anonymous and private Secure Browsing; and Protect & Remote Wipe features.

As well as these secure apps, the devices include Anti Listening features – which detect IMSI-Catcher surveillance tools often implemented as fake Wi-Fi base stations – and Anti Tracking features that control what kinds of data each mobile app can access. They can also spoof GPS locations, allowing users to feed applications incorrect GPS information to confound attempts to track them.

“We're moving these phones to people outside of Australia in large quantities,” Kesik said, “because they are concerned about privacy. They're not criminals per se – they're just people who are worried about people monitoring them.”

The Ncryptcellular software will run on other high-end smartphones, but the Oppo units were chosen both for their sleek design and the fact that the manufacturer's warranty is preserved even when modifications are made to the root system software, as is required for the security tools to function correctly.

The phones' encryption features require another Ncryptcellular device on the other end, but Kesik believes growing adoption of the technology within communities of interest will overcome the initial limitations of this effect. It is also playing into a steadily growing market for secure and anonymous devices, which puts it into the same market as Geeksphone's Blackphone [[xref: |secure smartphone]], [[xref: |Blackphone 2]], and [[xref: |tablet]]. However, Kesik noted, Ncryptcellular's devices don't require any ongoing subscription to function properly.

Blast from the past?

Try our new Space Invaders inspired video game NOW.

What score can you get ?

Join the CSO newsletter!

Error: Please check your email address.

Tags technologyNcryptcellular softwareAustraliadesignAlex Kesiksecure smartphonesprivacyCSO AustraliainventionNcrypt Superanonymity

More about CSOFacebookGoogleIMSIOppo

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts