How are we different?

A crypto card, this is part of your assurance of security

Enigma is one of only few secure mobiles to use a second, highly secure SIM card to store the signed digital key pair that are used to authenticate each user in a secure call. This SIM card is not only secure (many times more secure than your credit card)...

Enigma is one of only few secure mobiles to use a second, highly secure SIM card to store the signed digital key pair that are used to authenticate each user in a secure call. This SIM card is not only secure (many times more secure than your credit card), it actively protects the information stored within. Any unauthorised access of the card using scanning or mechanical techniques will result in the destruction of the card and the information stored on it. Not only are the keys guaranteed to be unique but the guarantee extends to the fact that there is no record kept of the keys programmed into each card, preserving anonymity. These SIM cards play a vital role in keeping the hackers away from your call.

Why is this important? This card forms the basis of the secure digital identity of the E2 unit and its user. It allows E2 units to authenticate each other making certain that you are secure.

Total Audio Separation

Each time you make an encrypted call the audio, both incoming and outgoing are physically switched away from the GSM part of the phone to the crypto module. This is also called Red/Black separation and is a requirement at governmental levels of security...

Each time you make an encrypted call the audio, both incoming and outgoing are physically switched away from the GSM part of the phone to the crypto module. This is also called Red/Black separation and is a requirement at governmental levels of security. This level of detail can only be found in a product that is specifically designed from the ground up to be secure.

Why is this important? This feature ensures that no unencrypted speech in either direction can be routed or transmitted anywhere other than the internal encryption processes.

Hardware Random Number Generator

The heart of any encryption is the process by which the encryption keys are created. With E2 the 256 bit session key is unique to EACH CALL that is made or received...

The heart of any encryption is the process by which the encryption keys are created. With E2 the 256 bit session key is unique to EACH CALL that is made or received.

This key is created using a Hardware Random Number Generator which is at the core of the security process. This device is certified to 10 77 permutations which for the interested is a number that looks something like 1 followed by 77 zero’s…

100, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000,

This device is located on the crypto card and is not only protected by E2 but also by on-board active security. This really is different to any other product out there. This device produces a seed for the session key that is unique every time a call is made and discarded when the call is finished.

Why is this important? The Hardware Random Number Generator cannot be manipulated by any source either internal or more importantly external. It will always generate random keys that are unique, a crucial element in securing anything. Many pretenders will use software random number generators which can be manipulated by external sources as has been shown during the Snowden revelations.


Point to Point Communication

E2 is truly autonomous. All encryption is handled on the handsets without any need for external resource. The network provides only the communication link between each phone. Once authentication is successfully completed...

E2 is truly autonomous. All encryption is handled on the handsets without any need for external resource. The network provides only the communication link between each phone. Once authentication is successfully completed no attack on a conversation can be made without E2 detecting it.

Why is this important? External influences to a device, the call setup or the call itself can provide a weak point and can be attacked. This attack can form a back door to the device or at the very least the communication flow itself. Such an attack could prevent use of encryption services or compromise the conversation itself. This is not a danger in a hybrid solution such as E2.

Crystal Clear Speech

If users cannot recognise each other’s voice or pick up the nuances of language, they are not fully communicating. Voice quality is not just a critical development requirement for us, it is one of the primary measures by which we judge our products...

If users cannot recognise each other’s voice or pick up the nuances of language, they are not fully communicating. Voice quality is not just a critical development requirement for us, it is one of the primary measures by which we judge our products. Enigma uses one of the finest voice codecs available, CrystalSpeech®. When this is coupled with our voice encryption process, the result is encrypted speech at a quality that surpasses what is considered acceptable in modern mobile phones. Time and again users comment on the clarity of speech - yet another feature that puts Enigma ahead of the field.

Why is this important? You should be comfortable using a product. Also the best security is one that you naturally recognise. Recognising a person’s voice at the other end of the call means you are talking to the correct person. E2 will make sure that nobody else is listening.

So simple to use, but so secure

There is little point in having a secure system that is complicated to use; it will not be used. Much time has been taken to ensure that E2 is simple to use...

There is little point in having a secure system that is complicated to use; it will not be used. Much time has been taken to ensure that E2 is simple to use. So, from the point that you enter the number and press the crypto key the process is completely automatic. Approximately seven seconds after pressing the crypto button you should be talking to the other party and at that point you will be assured of two things. You know exactly who you are talking to and that no one else is listening.

Why is this important? Again, you should be comfortable using a product. It should not confuse or frustrate.

Hybrid Solution

Hybrid in this context means that encrypted services on E2 are provided by a fusion of purpose designed hardware and software as opposed to a software application. E2 is a purpose designed security device...

Hybrid in this context means that encrypted services on E2 are provided by a fusion of purpose designed hardware and software as opposed to a software application. E2 is a purpose designed security device. Powerful hardware controls and manages the encryption processes, generate the random numbers used to seed the encryption keys, store the certificates used to authenticate each unit in the call, protecting the complete audio path from external attack amongst many other features.

Why is this important? All other products are either software only or apps added to a standard phone. Without closely integrating hardware and software these can never be as secure as a hybrid solution. The hardware software combination cannot be breached or modified by any external source. E2 provides you with the very best levels of security possible.

The Absolute in Secure GSM Communications

Tripleton Secure Products, a brand of excellence from IntSec.

Who are we?

IntSec has, for over sixteen years, from our offices in the United Kingdom, developed and produced some of the most secure mobile products there are. Tripleton secure systems have become the devices of choice for many different types of clients ranging from individuals to governments around the world. Each user needs absolute confidence in the security as well as the reliability of these products. This confidence can be shared by all, no matter their application or industry. We constantly fulfil our obligation to our users to secure their voice data and messaging across the globe.

The IntSec development group behind our products are some of the most leading edge companies in the world, all of us committed to your security. E2 is the latest in a development programme that will bring our unique secure processes together with 3G and 4G technologies. This will ensure future proof compatibility across all networks across the globe. Our products are marketed and supported by resellers in many countries.

News

August 2017

A former head of MI5 has argued against undermining end-to-end encryption in messaging apps like WhatsApp, claiming it will damage broader cybersecurity efforts.

Jonathan Evans, who left the secret service in 2013 and is now a crossbencher in the House of Lords, made the comments in an interview with BBC Radio 4’s Today program on Friday.

Read more: Source Infosecurity Magazine

August 2017

The pressure is now on for UK organizations to comply with the EU’s General Data Protection Regulation (GDPR) after the government announced its intention to write the legislation officially into law in the form of a new Data Protection Bill.

The proposed bill will upgrade the UK’s privacy laws for the digital age, providing consumers with sweeping new rights while mandating strict requirements on businesses which handle their data.

Read more: Source Infosecurity Group

August 2017

Here at Tripleton so are we real people and we think that end-to-end encryption is not just good but vital.  Read more....

The refreshing thing about the recent encryption debate is how politicians cheerfully admit that their plans have no basis in reality.

Take Malcolm Turnbull, the Australian Prime Minister. Last month he proposed legislation that would force internet companies to remove end-to-end encryption, saying: "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

Read More: Source Sky News

August 2017

German police are set to make use of new laws to hack the devices of criminal suspects in order to monitor communications, bypassing the need to force tech companies to provide encryption backdoors.

Read more: Infosecurity Group

July 2017

Using photos of young women and Hebrew slang, the Palestinian militant group Hamas chatted up dozens of Israeli soldiers online, gaining control of their phone cameras and microphones, the military said on Wednesday.
 

Read more: source Reuters

July 2017

Reports show that soldiers in the US military who send emails that are not classified are leaving themselves open to attack as there is no encryption. 
After receiving a mountain of criticism the pentagon have finally given the order to start encrypting all emails within a year.

Read more, Source engadget

June 2017

The governemnets in the intelligence sharing partnership between Australia, Canada,
New zealand, the United Kingdom and the United States commonly known as 
"The Five eyes" are to meet in Ottawa to discuss how to bypass encryption.

Read more, Source Human Rights watch

June 2017

Draft reports seem to suggest that the EU wish to ban the implementation of so called backdoors to encrypted data. This might cause a problem for many systems; not Enigma E2. Backdoors are not possible on E2

Read more, Source; The Guardian 

June 2017

Information collected by Context Information Security (CIS) has shown that some conference call systems typically used in boardrooms are at risk to hackers. They were able to take root control of a market leading conference and video phone which would allow them to listen to meeting and gain potentially sensitive information undetected.

Read more; source Vanilla Plus

June 2017

A new cleaner, more informative look we hope that our new website will help you to be informed about mobile voice and message security and of course our products. There is much going on so please do watch this site.  Very soon you will also see our social media feeds light up with information about us and our products.  Please do browse around and see why Enigma products are the best in their class.    

June 2017

Research showing how accelerometers can be hacked has recently come to attention. Accelerometers which are present in most smartphones of today are used to detect motion of a phone. Recent studies have shown how they can be manipulated using sound waves. This combined with previously reported issues with accelerometers such as using them as a basic microphone or as a method to decipher words from a nearby computer keyboard highlights an important challenge for cyber security.

Read more source: New York Times

January 2017

Loophole found in the implementation of the signal encryption protocol used by popular messaging service WhatsApp. In April 2016 the messaging giant implemented end to end encryption into its service for added security of its users. It has now come to light that the signal encryption protocol has not been implemented correctly and could potentially be used as a backdoor that could create new encryption keys. Whilst this cannot be used for mass surveillance of users it does leave individuals who are being targeted open to exploitation.

Read more source, The Guardian

November 2016

The regulation of investigatory powers act has now been passed in the UK which provides more power to security services and sets boundaries on their ability to gain information on citizens without a warrant. Internet companies will now have to retain browser history for up to a year and in a world where the reliance on technology and the web is ever increasing the true potential invasiveness of this act cannot be adequately measured

Read more source, The Telegraph

Ask us about Enigma

Image CAPTCHA
Enter the characters shown in the image.