Order a device with a subscription
Select screen size, number of phones neutralise and subscription period.
en
Turn your Android into a crypto phone for an anonymous communication just like the intelligence services with protection against attacks such as Pegasus
Advanced 3-layer encryption.
Deactivated GPS.
Changes 100% of the device IDs.
100% des-Googled
Premium solution
Convenient team development
Who is this solution for?
For anyone who has read the Snowden papers and independent security experts. And for individuals who understand that private communication cannot be bought in Apple and Google stores.
Businesses
To create a private connection with military-grade 3-layer encryption without being tied to a company or individual. In your virtual office (portal), it is easy to register new employees and replenish your balance with cryptocurrency. Implemented, by the press of a button, you may remotely wipe the phone.
Public and private individuals
Get a new digital identity. The device changes 100% of identifiers every time it enters the network: IMEI, MAC, IP and others. Even for the most sophisticated observer, you are a new inhabitant of Earth with incomprehensible traffic. All correspondence and files are impossible to decipher even for us.
Special services
Some of you have "secure" phones. But the wiretapping scandal of Angela Merkel and other big figures showed the real picture. If you have a duty to protect yourself and/or the country from Pegasus, Predator and similar software, have your specialists submit an application below for a code verification audit.
Like-minded people
Are you interested in the matter of personal data protection, the right to private correspondence and the preservation of digital DNA? Develop the Mactrix ecosystem with us in your location and receive active or passive income.
IT giants create phones and software that collect as much data about us as possible. After all, data is now the new oil and gold.
Zero-attack surface
All common phone vulnerabilities have been fundamentally fixed: SS7, SMS and GSM services, push notifications, MiTM, DDOS, DGA, WPA, WEP, Bluejacking, Extra Field, fakeid, input serializations and many others
Peer to peer calls
Completely exclude any intermitting or third party people. Implemented directly inside the VPN network, using changing entry points and using our own MDTP protocol. Which excludes the ability to establish a relationship between users
Hide and seek champion
Mix of traffic through servers in different countries. MAC randomization. Changing 100% of identifiers. Android phone will be seen as iOS, Linux or other version
Total end-to-end encryption
100% of outgoing traffic is encrypted based on our own advanced MDTP protocol (including AES256, SHA256, MD5, Base64). End to end encryption keys never leave the device. Each message is encrypted with a new key with salt and message integrity check using hash functions
Zero tracking concept
This concept looks deep into Android/iOS data collection principles to do the opposite. We cut out the ability to collect and send data at the physical and software level. On special sites or software, you can make sure that there are no logs and metadata
Private chat
End-to-end encryption of personal and group messages. The source code is inaccessible to ill-wishers. We provide completely private correspondence and data transfer
Camera and microphone
Disabled at the OS level. Drivers in principle do not fulfill the requests of these modules
Security of hardware elements
Removed: GPS, Bluetooth, Fingerprin. USB connection and Recovery mode not possible
Multi-level integrity control
Only verification of the authenticity and integrity of the system, applications and data provides confidence in the authenticity of the software. Excluding the ability to use the application as an access to data. If changes are made to the operating system, the hash sum does not match and the system is completely erased during boot
Disabled third party services
All intermediaries, third-party services and connections with the solutions of IT giants, in particular Google, are excluded. What nullifies the potential for data leakage
Multi-Container Storage
Super-isolated storage and launch of each application in a separate container, which eliminates unauthorized interaction between them
VPN/SSL
We use custom VPN and SSL certificates that are not available to any services. The location and entry points also change
Trusted update
Updates are required to maintain security and improve user experience. Multi-level digital signature system guarantees your security
Cunning password protection
We complicate your password by adding a random number generator to it. When you enter a special password, an empty OS is loaded. And when you repeatedly enter the wrong one, a complete wipe of the system occurs
Blockchain technology
Payments. Custody wallet. Earn.
Watch the online presentation of the scheme of working with a consultant
Using a common version of the OS – your data is guaranteed to be vulnerable. The more unique the OS, the more difficult and expensive it is to attack
Android
Lots of
Apple
A lot of
Mactrix
No
Android
Critical
Apple
Minor
Mactrix
No
Android
High
Apple
High
Mactrix
No
Android
Yes
Apple
Yes
Mactrix
No
Android
50/50
Apple
Yes
Mactrix
No
Android
Yes
Apple
Yes
Mactrix
No
Android
Yes
Apple
Yes
Mactrix
No
Malicious apps in the store
Vulnerability of old software versions
Vulnerability of GSM attacks
Hacking when connected by cable
Remote access to data
Infection of Pegasus, Celebrate or else
Phishing threat
Android
Lots of
Critical
High
Yes
50/50
Yes
Yes
Apple
A lot of
Minor
High
Yes
Yes
Yes
Yes
Mactrix
No
No
No
No
No
No
No
Only 6 required components without
backdoors in software and hardware
will ensure your anonymity on the network
VPN, TOR, and feature phone solutions for teens
Prepared de-googled phone
Dozens of independent investigations confirm that there are no devices on the mass market without tracking and backdoors at the level of hardware and software. Therefore, we neutralise models: OnePlus, Bkav and others
Mactrix OS
Crypto-resistant, zero tracking Mactrix OS was created to protect the user from IT giants, government agencies and himself. A real headache even for an experienced cybercriminal or forensic scientist.
Set of native applications
For teamwork within Mactrix OS: MChat, Notepad, MCall (VoIP), Contacts, Support 24/7, VPN, SSL, Translator, Coporate portal, MactrixWallet, Gallery, PGP mail, Booknotes, PDFviewer, Browser, Updater, Bitcoin Wallet.
Disarmed popular apps
Telegram, Wickr, Signal and others with deep modification of the source code. After each significant update of the application, we take the source and cut off the tracking and transmission of user data as much as possible. Even phishing via the link is impossible because built-in browsers are cut out
Phone encrypted storage
With the possibility of complete removal: by button, by time, by impact or remotely
Subscription and support 24/7
Update of Zero tracking OS Mactrix itself, native and popular applications.
Total:573$
Global
SIM/eSIM
Add anonymous and encrypted communication in 183 countries to your order. It's not tied to your personally!
Our SIM/eSIM's do not have GSM connection for security reasons, which eliminates a wide range of attacks. And all traffic, including calls to landlines, is encrypted and goes through the Internet.
Branded MChat and MCall (VoIP) are designed not only for security, but also for minimizing Internet traffic so that you always stay in touch.
How to start using?
Add your partners
This will create an encrypted tunnel of closed communication between you
Order a device with a subscription
Select screen size, number of phones neutralise and subscription period.
Pay
We accept payment by cards, cryptocurrency and do not ask unnecessary questions.
Delivery
The average delivery time is 2-3 days. Particularly Europe, Mexico, Brazil, America
Activate your device
And be sure to come up with a complex password. Now you and your data are safe!
Add your partners
To create an encrypted p2p tunnel between you
We are decentralized product development, but we are legally located in United Kingdom. And the servers are distributed in different locations to better ensure the most stable connection. No information remains on the servers – they are used as communication nodes.
TOR, VPN and SLL are just Mactrix OS components included in the security solution. Only a specially prepared (neutralised) phone and a security-focused OS can guarantee the privacy and security of data.
We buy in bulk from major providers.
At the moment, we can guarantee to neutralise Android phones and only install our OS on them. iOS phones are just jailbreak phones that don’t get privacy.
You can create an isolated and encrypted backup of your device data. To which we do not have access and there is no technical possibility to provide it to anyone.
21 languages