Now Hiring: Red Team Specialist - Technical Project Manager - Red Team Specialist (Level 2) - App...

Ghost - Military Grade Encrypted Secure Phone

Ghost is an end-to-end encrypted mobile device - equipped by high-tech onDevice and OnAir security precautions - providing untrackable, unaccessible, unhackable and the most secure communication

onAir Security

The security of theincoming/outgoing databetween the users is providedin 5 different layers on the GHOST:

Layer 1 - Security on Transport Layer

*All data transports over an encrypted WG VPN Tunnel service which is provided by REPEL servers or your servers

Layer 2 - Security on Certificates

*SSL Pinning and self signed certificates are used in order to ensure blocking MitM attacks
*Both client and server certificates are used for 2-way authentication in order to ensureblocking unauthorized client access

Layer 3 - Security on P2P Messaging Layer and Signaling

*All data transfers are encrypted by an unique key(generated only between 2 peers)*Public and Private keys algorithm is elliptic curve - SECP256r1
*Secret keys are derived from ECDH key exchange mechanism
*Encryption algorithms ChaCha20-Poly1305

Layer 4 - Security on P2P Calling

*All calls are end-to-end encrypted ( enabled dtls and SRTP )
*For each call new keys are generated ( ECDSA )
*Totally P2P connection is secured with no touch points on any servers.

Layer 5 - APN Support

*Completely Closed Network
*Private domains
Zero log policy *DNS over TLS *Custom priv DNS server

onDevice Security

Ghost ensures security and privacy trough unique solutions and adjustments with Full Disc Encryption on:

Linux Kernel
Android Framework Layer
Little Kernel Layer
Device Policy Manager
All ports are disabled(including manufacturer port)
Fully protected against JTAG & Chip-Out

*Ghost sales are not available to B2B - B2C users. Only B2G* Please contact us for detailed information.*


Do you provide a one-fits-for-all solution as GHOST?

NO! GHOST can be customized based on user needs and expectations

Is there any user reference who has experienced GHOST?

Is there any after-sales support?

Is there any possibility that any Repel Cyber Security employee may access communication data?

Why should I choose GHOST?

We have different types of teams working independent from another. Is it possible to customize for different user types?

If any of the devices is stolen, how can I ensure my security?

Does Ghost has group messaging feature?

Is Ghost support MDM?

Can we host the servers ?

Is it possible to make design changes on the Ghost application?

Can we send PDF?

Does Ghost has voice group chat feature?

Can anyone wipe each otherʼs device?

Can We install another application on the device?