www.swissline.org Open in urlscan Pro
34.249.200.254  Public Scan

Submitted URL: https://swissline.org/
Effective URL: https://www.swissline.org/
Submission: On July 11 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

Name: wf-form-Contact-us-formGET

<form method="get" name="wf-form-Contact-us-form" data-name="Contact us form" id="email-form" class="form" data-wf-page-id="6034d0aeca5706698ddd26bb" data-wf-element-id="34872f57-0fbb-ddca-1f47-590eb950b752">
  <div data-w-id="e93bc5e1-51f2-a458-9d1c-7d85a69efce5" style="opacity: 0;" class="form-box"><label for="name" class="field-name">Your Name*</label><input class="input w-input" maxlength="256" name="name" data-name="Name"
      placeholder="Enter your name" type="text" id="name" required=""></div>
  <div data-w-id="78dde417-64e9-5db8-454d-ecc5969b05d6" style="opacity: 0;" class="form-box-container">
    <div class="form-box half"><label for="name-4" class="field-name">E-mail*</label><input class="input w-input" maxlength="256" name="name-4" data-name="Name 4" pattern="[a-zA-Z0-9.-_]{1,}[@][a-zA-Z.-]{1,}[.]{1}[a-zA-Z]{2,}"
        placeholder="Enter your e-mail" type="email" id="name-4" required=""></div>
    <div class="form-box half"><label for="name-5" class="field-name">Phone Number</label><input class="input w-input" maxlength="256" name="name-5" data-name="Name 5"
        pattern="^[\+]?[0-9]{1,2}?[-\s\.]?[(]?[0-9]{1,3}[)]?[-\s\.]?[0-9]{1,5}[-\s\.]?[0-9]{1,5}[-\s\.]?[0-9]{1,4}$" placeholder="Enter your number" type="tel" id="name-5"></div>
  </div>
  <div data-w-id="cd4fed01-d945-e35e-8300-76307b7ca640" style="opacity: 0;" class="form-box"><label for="name-4" class="field-name">Your Message*</label><textarea placeholder="Write us a line" maxlength="5000" id="field" name="field" required=""
      data-name="field" class="input message w-input"></textarea></div><input type="submit" data-wait="Please wait..." data-w-id="34872f57-0fbb-ddca-1f47-590eb950b759" style="opacity: 0;" class="contact-submit w-button" value="Send Message">
</form>

Text Content

MainAbout UsProtectionSecurity ComparisonSecurity FactsSolution
AvailabilityPackages & OrderingContact Us
Contact Us




GREATER COMMUNICATIONS PRIVACY THAN MILITARY HAS

Swissline communicator is probably the most secure communications device
designed for use in high profile scenarios where security is paramount

Contact UsLearn More

Explore


I INTRODUCTION

The communications solution that allows you to communicate with your peers with
an absolute peace of mind. Our communication system is the only one in the
market with physical customer isolation at the HW level, as well as multi-level,
quantum-resistant encryption. We use no insecure cloud technologies. With us,
you are above the clouds. Today's average secure communications equipment and
widely popular secure chat apps do not give you this level of security for a
variety of reasons – as explained here. Our technology provides the highest
level of protection from all possible communication threats. As operators, we
have no technical ability to eavesdrop on our customers' communications.

With your privacy in mind, we accept anonymous orders. Read below to learn more.
If you have any questions, send us an email and we will get back to you.

With Swissline, there is a lot of security technology working behind the scenes
to protect you. We offer you privacy that others cannot guarantee.

Learn More


I ABOUT US

Swissline Consulting is the company behind the Swissline Communicator. The Swiss
company was founded in 2019 after several years of development to provide
high-security communications equipment. The company's mission is to develop more
security products for today's environment, where security needs are rapidly
increasing. In response to the latest technology trends in the communications
and cryptocurrency sectors, we have other high-profile security solutions on the
roadmap.





I PROTECTION FROM

Some entities we guard your private communications from
Special Forces
FSB/Former KGB
CIA
MI6
NSA
Government
Dictators
Courts
Agencies
special equipment
Intelligence agencies
Super computers
Quantum computers
Exploits
spies
Surveillance
Hackers
Contact Us


I SECURITY COMPARISON

The diagram below gives an overview of how information travels within our
solution and how it compares to other privacy solutions and standard smartphones
and calls. For security reasons, we do not show the detailed path, and we
omitted several processes.

Step 1
Swissline
Voice and text are captured, digitalised, and encoded. Data is encrypted with a
proven and unbroken cipher.
Read more

Even if someone has the packet with this data, it cannot be decrypted. Not even
by us. Decrypting it would take current supercomputers a billion times more
years than our universe has existed.

No security issues
Competition
Read more


Voice and text are captured, digitalised, and encoded. Data is encrypted on the
secure smartphone app. On standard cell phones, there is no encryption.

Security issues

The smartphone might be infected with spyware, which the user never knows. Even
if the phone has a secure communications application, it is no longer secure.
When using standard calls and sms, anyone with minimal access, like telecom
operators and staff, can listen, technically.

Step 2
Swissline
The packet is transmitted to our fog node, which is responsible for making sure
no other information leaves your phone. It is inspected, verified, and accepted
based on our security criteria. Only our packets travel within our systems.
Read more

Not even future, more powerful quantum computers will be able to crack this
encryption.

No security issues
Competition
Read more


The packet is transmitted through the internet towards the provider’s servers.
In traditional phone calls, the data is sent unencrypted.


Security issues

In infected phones, even encrypted information could be intercepted and leaked.
If unknown VPNs are used, this is more likely to happen. Data in standard phone
calls are accessible by anyone intercepting the cables at any end of the signal.


Step 3
Swissline
Our fog node encapsulates the packet and transmits it to the nearest cell tower
or satellite.
Read more

The packet can be transmitted directly to the satellite or through a home,
office, or public router.

No security issues
Competition
Other solutions have no equivalent step.

Step 4
Swissline
Our secured packet is routed via public network until it reaches our data centre
and onto our shield device. It gets inspected for security and, only if it is
legitimate and is proven to come from our systems, it goes through further
processing.
Read more

Our swarm computing systems are 100% stealthy. An outsider cannot know what is
happening.

No security issues
Competition
Read more


In other privacy solutions, the packet is routed via public infrastructure
towards their servers. We can only assume that there is some degree of
inspection and usage of standard firewall software, which provides some
security. Data from standard phone calls are routed through multiple exchanges
to reach the recipient.

Security issues

1. Even if the phone is using a secure chat app, some information can leak at
this stage due to notification servers. From this, it is possible to build up a
profile about the user, his habits, and other users he communicates with.
2. Information can get intercepted due to bugs in virtualised servers,
accessibility from technical administrators, decryption of information for
processing, and infected app updates.
3. The data in standard phones are technically accessible by anyone managing
telephone exchanges in the path.

Step 5
Swissline
The packet is received at the caller's core, inspected once more, and directed
to the recipient's core. The second core receives the packet, inspects,
verifies, and accepts it. Then, it is processed.
No security issues
Competition
Other solutions have no equivalent step.

Step 6
Swissline
The packet starts its journey back towards the recipient through the same
stages, but in reverse. It happens fast, so it feels and works like a regular
telephone call.
No security issues
Competition
The packet travels following the same steps above in reverse order until it
reaches the other user.

Swissline
Competition
Step 1
Voice and text are captured, digitalised, and encoded. Data is encrypted with a
proven and unbroken cipher.
Read more

Even if someone has the packet with this data, it cannot be decrypted. Not even
by us. Decrypting it would take current supercomputers a billion times more
years than our universe has existed.

No security issues
Step 1
Read more

Voice and text are captured, digitalised, and encoded. Data is encrypted on the
secure smartphone app. On standard cell phones, there is no encryption.

Security issues
The smartphone might be infected with spyware, which the user never knows. Even
if the phone has a secure communications application, it is no longer secure.
When using standard calls and sms, anyone with minimal access, like telecom
operators and staff, can listen, technically.
Step 2
The packet is transmitted to our fog node, which is responsible for making sure
no other information leaves your phone. It is inspected, verified, and accepted
based on our security criteria. Only our packets travel within our systems.
Read more

Not even future, more powerful quantum computers will be able to crack this
encryption.

No security issues
Step 2
Read more

The packet is transmitted through the internet towards the provider’s servers.
In traditional phone calls, the data is sent unencrypted.


Security issues
In infected phones, even encrypted information could be intercepted and leaked.
If unknown VPNs are used, this is more likely to happen. Data in standard phone
calls are accessible by anyone intercepting the cables at any end of the signal.
Step 3
Our fog node encapsulates the packet and transmits it to the nearest cell tower
or satellite.
Read more

The packet can be transmitted directly to the satellite or through a home,
office, or public router.

No security issues
Step 3
Other solutions have no equivalent step.
Step 4
Our secured packet is routed via public network until it reaches our data centre
and onto our shield device. It gets inspected for security and, only if it is
legitimate and is proven to come from our systems, it goes through further
processing.
Read more

Our swarm computing systems are 100% stealthy. An outsider cannot know what is
happening.

No security issues
Step 4
Read more

In other privacy solutions, the packet is routed via public infrastructure
towards their servers. We can only assume that there is some degree of
inspection and usage of standard firewall software, which provides some
security. Data from standard phone calls are routed through multiple exchanges
to reach the recipient.

Security issues
1. Even if the phone is using a secure chat app, some information can leak at
this stage due to notification servers. From this, it is possible to build up a
profile about the user, his habits, and other users he communicates with.
2. Information can get intercepted due to bugs in virtualised servers,
accessibility from technical administrators, decryption of information for
processing, and infected app updates.
3. The data in standard phones are technically accessible by anyone managing
telephone exchanges in the path.


Step 5
The packet is received at the caller's core, inspected once more, and directed
to the recipient's core. The second core receives the packet, inspects,
verifies, and accepts it. Then, it is processed.
No security issues
Step 5
Other solutions have no equivalent step.
Step 6
The packet starts its journey back towards the recipient through the same
stages, but in reverse. It happens fast, so it feels and works like a regular
telephone call.
No security issues
Step 6
The packet travels following the same steps above in reverse order until it
reaches the other user.


I SECURITY FACTS

Our solution uses innovative technologies that make it resistant to various
attack vectors.
No standard computer systems are involved in the solution

The processing architecture in some of the components is also used in modern
satellites and spacecraft. This means no usage of conventional Intel or AMD
systems that may have back doors and security flaws.

Contact Us
Resistance against spectre, meltdown, and similar vulnerabilities

All the components of our solution are resistant against current and future
security vulnerabilities of this kind, mainly due to its design. These security
issues affected major data centre systems in 2018. The personal information of
millions was at risk of being stolen from the platforms of the world’s biggest
companies.

Contact Us
Privacy at the foundation

We surpass GDPR compliance guidelines. Additionally, we offer anonymous ordering
and operation for the clients who require top privacy. Only the shipping address
is required when making an order, which gets immediately deleted after
successful delivery is confirmed.

Contact Us
Resistance against exploitation programs

It is believed that conventional consumers’ smartphones are being infected with
highly engineered spyware tools without the end-user noticing it. If an average
user’s phone is compromised – no matter what app is used inside it – it is not
secure anymore. Wikileaks has numerous documents on governments’ activities on
exploitation and spyware program development on a massive scale. It showed the
development of more than ten such programs over the last decade just in one
major government.

Contact Us
The handset

It has a direct channel to a little box that comes with it. The box is
engineered to ensure it provides a communication channel for the phone, through
which it communicates directly with the separate, physical silicon core sitting
in our data centre. Upon purchase, only the customer can access it. Even if the
phone is handed for spyware infection and then goes back to the customer, the
box itself ensures that any further communication will remain private and
secure. Let’s put it this way: any spyware or virus needs internet connectivity
to leak your data – and our smartphone has none.

Contact Us
No internet

No need to worry about attacks, leaks, or any other security issues. In a call
between two users, the information flows through different devices in our
infrastructure. None of them has internet connectivity. Some have a custom
configured channel where the internet is used only as a medium to exchange
secured packets. Each one of them is thoroughly inspected to ensure no false
positives travel through these channels. Further, there are no standard
notifications as those required by Google’s FCM or Apple’s PNS servers to work,
which, in our view, are very insecure. We use different methods with our
infrastructure. For instance, on any app on today’s phones, 99.99% of the
notifications are going through these servers every time the phone users make
calls send texts over apps like Telegram™, Line™, WhatsApp™, and others.
Moreover, if a typical smartphone user’s phone is compromised, it can send out
private information without the user knowing it. Even from the most secure apps
on that phone. In our solution, this is not possible.

Contact Us
No DNS

Since we need no internet, we do not use DNS. This greatly enhances security, as
DNS is prone to data leaks and security breaches.

Contact Us
Data Centre

Our nodes are located in Switzerland’s data centre and are protected by Swiss
law. This means that nobody has access to it. We also do not use conventional
and hacking prone data centre and cloud technologies for enhanced security
reasons.

Contact Us
Satellites

Customers from remote areas like deserts, seas, and jungles are able to connect
via satellite plugins. Our solution will also work with Starlink’s
constellation.

Contact Us
Encryption

Instead of single encryption algorithms deployed on conventional secure chat
apps, we use a combination of algorithms which have higher standards than those
used by governments, ensuring that no supercomputer or quantum computer can
breach it. Our algorithms are taken from different parts of the world to ensure
that no single territory/government can have access even if they have engineered
a backdoor in one of them. All current conventional solutions have this
immediate risk.

Contact Us
Trust and transparency

We welcome the security auditors of certain customers to review and audit
specific parts of the solution to verify our claims, on-demand. Our company is
open to such activities to provide transparency and trust. As a special
arrangement, we also offer custom and private installation for clients who
require more assurance. A dedicated 1:1 hardware contract in data centres inside
the Swiss mountains or clients premises is also possible. Contact us for more
information.

Contact Us
No reliance on third party companies

Todays’ solutions, which provide some degree of privacy, rely on third party
services and software development. If the software provider is hacked, it can
carry infected updates and infect secure communication providers. Our solution
is contained in an environment where not a single byte of data travels outside
of our infrastructure. Ever. Conventional security solutions are insecure and
lead to information leaks. When the users send texts, other solution providers
use the already mentioned servers, such as Apple™ and Google™. Other solutions
rely on Blackberry™ servers and similar software. All of that is insecure, as
they are connected to the internet and subject to updates. Also, any agency with
access to these software companies can (technically speaking) view the data. We
would not know, but it is technically possible. Our solution does not rely on
any third party for the software nor any notifications.

Contact Us
Resistant against spectre

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Privacy at the foundation

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Resistance against exploitation programs

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
The handset

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
No internet

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
No DNS

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Data Centre

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Satellites

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Encryption cracking

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
Trust and transparency

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us
No reliance on third party companies

This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and
huge security issues. The processing architecture in some of the components is
also used in modern satellites and spacecraft.

Contact Us


I SATELLITE GATEWAY

Do you need secure communication capabilities in remote areas? We offer
additional services to connect you from almost anywhere on the planet.

Contact Us


I SOLUTION AVAILABILITY


OUR CURRENT AVAILABILITY

The current model works worldwide.
For remote areas like jungles, deserts, and seas, we can provide a satellite
connectivity contract for you.


I ISOLATED CORES

End user equipment is connected to the corresponding core in our infrastructure.
There, data is processed to some extent. The cores operate at such high-security
standards that, even if they are compromised, they do not leak private data.
However, it is not possible to compromise them remotely.

Contact Us


I PACKAGES AND ORDERING

Each package contains one phone, one fog node, and access to the swarm node.


PHONE SET SPECIFICATION

Each phone set contains one phone, one fog node, and the allocated swarm node.
You need two phone sets in order to communicate across long distances with the
highest security and privacy. The swarm node that connects the devices sits in
Swissline's infrastructure located in Switzerland. It is designed to allow only
the exchange of data between callers. There are zero bytes of data traveling to
or from the Internet. All hardware and software are managed 100% by Swissline.




I GLOBAL PACKAGES

The packages below are designed to work globally by utilizing a physical
connection or satellite plugin.
Gold
Anonymous ordering is possible. Includes unlimited voice calls, video calls, and
texts. Your core is physically located inside our infrastructure in a Swiss data
centre.
Contact Us
Platinum
The same as the Gold package, but your core is hosted inside a secure data
centre in the Swiss Alps.
Contact Us
Diamond
The same as the Gold package, but your core is installed in your home or office.
Contact Us
For packages in Latin America and the Caribbean, contact the authorized
distributor in the region.


I CONTACT US

Global enquiries and support

support@swissline.org

Latin America enquiries and support

latam@swissline.org

Director

director@swissline.org

If you use secure emails, send us an encrypted email, or PGP encrypted email.
Our key is listed on global open PGP servers as "Swissline Director". Include
your key as well.
Copy PGP Key to clipboard

СOPIED TO CLIPBOARD


Your Name*
E-mail*
Phone Number
Your Message*
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.



I CONTACT US

MainAbout UsProtectionSecurity ComparisonSecurity FactsSolution
AvailabilityPackages & Ordering
Copyright © Swissline Group 21st Century
Thank You!
We will contact you as soon as possible
Back to Home Page
Your protection company number one
//