total protection of mobile data → your Digital DNA

Zero tracking Mactrix OS

Turn your Android into a crypto phone for an anonymous communication just like the intelligence services with protection against attacks such as Pegasus

Advanced 3-layer encryption.

Deactivated GPS.

Changes 100% of the device IDs.

Order by subscription

100% des-Googled

Premium solution

Convenient team development

Order by subscription

Who is this solution for?

For anyone who has read the Snowden papers and independent security experts. And for individuals who understand that private communication cannot be bought in Apple and Google stores.

Businesses

To create a private connection with military-grade 3-layer encryption without being tied to a company or individual. In your virtual office (portal), it is easy to register new employees and replenish your balance with cryptocurrency. Implemented, by the press of a button, you may remotely wipe the phone.

Public and private individuals

Get a new digital identity. The device changes 100% of identifiers every time it enters the network: IMEI, MAC, IP and others. Even for the most sophisticated observer, you are a new inhabitant of Earth with incomprehensible traffic. All correspondence and files are impossible to decipher even for us.

Special services

Some of you have "secure" phones. But the wiretapping scandal of Angela Merkel and other big figures showed the real picture. If you have a duty to protect yourself and/or the country from Pegasus, Predator and similar software, have your specialists submit an application below for a code verification audit.

Like-minded people

Are you interested in the matter of personal data protection, the right to private correspondence and the preservation of digital DNA? Develop the Mactrix ecosystem with us in your location and receive active or passive income.

IT giants create phones and software that collect as much data about us as possible. After all, data is now the new oil and gold.

How exactly is protection implemented?

Zero-attack surface

All common phone vulnerabilities have been fundamentally fixed: SS7, SMS and GSM services, push notifications, MiTM, DDOS, DGA, WPA, WEP, Bluejacking, Extra Field, fakeid, input serializations and many others

Peer to peer calls

Completely exclude any intermitting or third party people. Implemented directly inside the VPN network, using changing entry points and using our own MDTP protocol. Which excludes the ability to establish a relationship between users

Hide and seek champion

Mix of traffic through servers in different countries. MAC randomization. Changing 100% of identifiers. Android phone will be seen as iOS, Linux or other version

Total end-to-end encryption

100% of outgoing traffic is encrypted based on our own advanced MDTP protocol (including AES256, SHA256, MD5, Base64). End to end encryption keys never leave the device. Each message is encrypted with a new key with salt and message integrity check using hash functions

Zero tracking concept

This concept looks deep into Android/iOS data collection principles to do the opposite. We cut out the ability to collect and send data at the physical and software level. On special sites or software, you can make sure that there are no logs and metadata

Private chat

End-to-end encryption of personal and group messages. The source code is inaccessible to ill-wishers. We provide completely private correspondence and data transfer

Camera and microphone

Disabled at the OS level. Drivers in principle do not fulfill the requests of these modules

Security of hardware elements

Removed: GPS, Bluetooth, Fingerprin. USB connection and Recovery mode not possible

Multi-level integrity control

Only verification of the authenticity and integrity of the system, applications and data provides confidence in the authenticity of the software. Excluding the ability to use the application as an access to data. If changes are made to the operating system, the hash sum does not match and the system is completely erased during boot

Disabled third party services

All intermediaries, third-party services and connections with the solutions of IT giants, in particular Google, are excluded. What nullifies the potential for data leakage

Multi-Container Storage

Super-isolated storage and launch of each application in a separate container, which eliminates unauthorized interaction between them

VPN/SSL

We use custom VPN and SSL certificates that are not available to any services. The location and entry points also change

Trusted update

Updates are required to maintain security and improve user experience. Multi-level digital signature system guarantees your security

Cunning password protection

We complicate your password by adding a random number generator to it. When you enter a special password, an empty OS is loaded. And when you repeatedly enter the wrong one, a complete wipe of the system occurs

Blockchain technology

Payments. Custody wallet. Earn.

Watch the online presentation of the scheme of working with a consultant




    You will receive a link to an interactive map via the specified contact method, and we will arrange a consultation time.

    Let's Compare Mobile OS Security

    Using a common version of the OS – your data is guaranteed to be vulnerable. The more unique the OS, the more difficult and expensive it is to attack

    Malicious apps in the store

    Android

    Lots of

    Apple

    A lot of

    Mactrix

    No

    Vulnerability of old software versions

    Android

    Critical

    Apple

    Minor

    Mactrix

    No

    Vulnerability of GSM attacks

    Android

    High

    Apple

    High

    Mactrix

    No

    Hacking when connected by cable

    Android

    Yes

    Apple

    Yes

    Mactrix

    No

    Remote access to data

    Android

    50/50

    Apple

    Yes

    Mactrix

    No

    Infection of Pegasus, Celebrate or else

    Android

    Yes

    Apple

    Yes

    Mactrix

    No

    Phishing threat

    Android

    Yes

    Apple

    Yes

    Mactrix

    No

    Malicious apps in the store

    Vulnerability of old software versions

    Vulnerability of GSM attacks

    Hacking when connected by cable

    Remote access to data

    Infection of Pegasus, Celebrate or else

    Phishing threat

    Android

    Lots of

    Critical

    High

    Yes

    50/50

    Yes

    Yes

    Apple

    A lot of

    Minor

    High

    Yes

    Yes

    Yes

    Yes

    Mactrix

    No

    No

    No

    No

    No

    No

    No

    Only 6 required components without
    backdoors in software and hardware
    will ensure your anonymity on the network

    VPN, TOR, and feature phone solutions for teens

    Prepared de-googled phone

    Dozens of independent investigations confirm that there are no devices on the mass market without tracking and backdoors at the level of hardware and software. Therefore, we neutralise models: OnePlus, Bkav and others

    Mactrix OS

    Crypto-resistant, zero tracking Mactrix OS was created to protect the user from IT giants, government agencies and himself. A real headache even for an experienced cybercriminal or forensic scientist.

    Set of native applications

    For teamwork within Mactrix OS: MChat, Notepad, MCall (VoIP), Contacts, Support 24/7, VPN, SSL, Translator, Coporate portal, MactrixWallet, Gallery, PGP mail, Booknotes, PDFviewer, Browser, Updater, Bitcoin Wallet.

    Disarmed popular apps

    Telegram, Wickr, Signal and others with deep modification of the source code. After each significant update of the application, we take the source and cut off the tracking and transmission of user data as much as possible. Even phishing via the link is impossible because built-in browsers are cut out

    Phone encrypted storage

    With the possibility of complete removal: by button, by time, by impact or remotely

    Subscription and support 24/7

    Update of Zero tracking OS Mactrix itself, native and popular applications.

    Order a turnkey solution
    To ensure your correspondence, calls and files never reach Google,
    Apple, hackers and states








      -+
      Yes No

      Total:573$

      Online Presentation

      Contact me

      Global
      SIM/eSIM

      Add anonymous and encrypted communication in 183 countries to your order. It's not tied to your personally!

      Our SIM/eSIM's do not have GSM connection for security reasons, which eliminates a wide range of attacks. And all traffic, including calls to landlines, is encrypted and goes through the Internet.

      Branded MChat and MCall (VoIP) are designed not only for security, but also for minimizing Internet traffic so that you always stay in touch.

      Add

      How to start using?

      Add your partners
      This will create an encrypted tunnel of closed communication between you

      Order a device with a subscription

      Select screen size, number of phones neutralise and subscription period.

      Pay

      We accept payment by cards, cryptocurrency and do not ask unnecessary questions.

      Delivery

      The average delivery time is 2-3 days. Particularly Europe, Mexico, Brazil, America

      Activate your device

      And be sure to come up with a complex password. Now you and your data are safe!

      Add your partners

      To create an encrypted p2p tunnel between you

      What jurisdiction are you under?

      We are decentralized product development, but we are legally located in United Kingdom. And the servers are distributed in different locations to better ensure the most stable connection. No information remains on the servers – they are used as communication nodes.

      Why is Matrix better than TOR or VPN?

      TOR, VPN and SLL are just Mactrix OS components included in the security solution. Only a specially prepared (neutralised) phone and a security-focused OS can guarantee the privacy and security of data.

      Can Mactrix OS be installed on iphone?

      At the moment, we can guarantee to neutralise Android phones and only install our OS on them. iOS phones are just jailbreak phones that don’t get privacy.

      Do you keep backups?

      You can create an isolated and encrypted backup of your device data. To which we do not have access and there is no technical possibility to provide it to anyone.

      https://mactrix.tech/wp-content/uploads/2023/03/icons8-телеграмма-app.svg