www.swissline.org
Open in
urlscan Pro
34.249.200.254
Public Scan
Submitted URL: https://swissline.org/
Effective URL: https://www.swissline.org/
Submission: On July 11 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://www.swissline.org/
Submission: On July 11 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMName: wf-form-Contact-us-form — GET
<form method="get" name="wf-form-Contact-us-form" data-name="Contact us form" id="email-form" class="form" data-wf-page-id="6034d0aeca5706698ddd26bb" data-wf-element-id="34872f57-0fbb-ddca-1f47-590eb950b752">
<div data-w-id="e93bc5e1-51f2-a458-9d1c-7d85a69efce5" style="opacity: 0;" class="form-box"><label for="name" class="field-name">Your Name*</label><input class="input w-input" maxlength="256" name="name" data-name="Name"
placeholder="Enter your name" type="text" id="name" required=""></div>
<div data-w-id="78dde417-64e9-5db8-454d-ecc5969b05d6" style="opacity: 0;" class="form-box-container">
<div class="form-box half"><label for="name-4" class="field-name">E-mail*</label><input class="input w-input" maxlength="256" name="name-4" data-name="Name 4" pattern="[a-zA-Z0-9.-_]{1,}[@][a-zA-Z.-]{1,}[.]{1}[a-zA-Z]{2,}"
placeholder="Enter your e-mail" type="email" id="name-4" required=""></div>
<div class="form-box half"><label for="name-5" class="field-name">Phone Number</label><input class="input w-input" maxlength="256" name="name-5" data-name="Name 5"
pattern="^[\+]?[0-9]{1,2}?[-\s\.]?[(]?[0-9]{1,3}[)]?[-\s\.]?[0-9]{1,5}[-\s\.]?[0-9]{1,5}[-\s\.]?[0-9]{1,4}$" placeholder="Enter your number" type="tel" id="name-5"></div>
</div>
<div data-w-id="cd4fed01-d945-e35e-8300-76307b7ca640" style="opacity: 0;" class="form-box"><label for="name-4" class="field-name">Your Message*</label><textarea placeholder="Write us a line" maxlength="5000" id="field" name="field" required=""
data-name="field" class="input message w-input"></textarea></div><input type="submit" data-wait="Please wait..." data-w-id="34872f57-0fbb-ddca-1f47-590eb950b759" style="opacity: 0;" class="contact-submit w-button" value="Send Message">
</form>
Text Content
MainAbout UsProtectionSecurity ComparisonSecurity FactsSolution AvailabilityPackages & OrderingContact Us Contact Us GREATER COMMUNICATIONS PRIVACY THAN MILITARY HAS Swissline communicator is probably the most secure communications device designed for use in high profile scenarios where security is paramount Contact UsLearn More Explore I INTRODUCTION The communications solution that allows you to communicate with your peers with an absolute peace of mind. Our communication system is the only one in the market with physical customer isolation at the HW level, as well as multi-level, quantum-resistant encryption. We use no insecure cloud technologies. With us, you are above the clouds. Today's average secure communications equipment and widely popular secure chat apps do not give you this level of security for a variety of reasons – as explained here. Our technology provides the highest level of protection from all possible communication threats. As operators, we have no technical ability to eavesdrop on our customers' communications. With your privacy in mind, we accept anonymous orders. Read below to learn more. If you have any questions, send us an email and we will get back to you. With Swissline, there is a lot of security technology working behind the scenes to protect you. We offer you privacy that others cannot guarantee. Learn More I ABOUT US Swissline Consulting is the company behind the Swissline Communicator. The Swiss company was founded in 2019 after several years of development to provide high-security communications equipment. The company's mission is to develop more security products for today's environment, where security needs are rapidly increasing. In response to the latest technology trends in the communications and cryptocurrency sectors, we have other high-profile security solutions on the roadmap. I PROTECTION FROM Some entities we guard your private communications from Special Forces FSB/Former KGB CIA MI6 NSA Government Dictators Courts Agencies special equipment Intelligence agencies Super computers Quantum computers Exploits spies Surveillance Hackers Contact Us I SECURITY COMPARISON The diagram below gives an overview of how information travels within our solution and how it compares to other privacy solutions and standard smartphones and calls. For security reasons, we do not show the detailed path, and we omitted several processes. Step 1 Swissline Voice and text are captured, digitalised, and encoded. Data is encrypted with a proven and unbroken cipher. Read more Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed. No security issues Competition Read more Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption. Security issues The smartphone might be infected with spyware, which the user never knows. Even if the phone has a secure communications application, it is no longer secure. When using standard calls and sms, anyone with minimal access, like telecom operators and staff, can listen, technically. Step 2 Swissline The packet is transmitted to our fog node, which is responsible for making sure no other information leaves your phone. It is inspected, verified, and accepted based on our security criteria. Only our packets travel within our systems. Read more Not even future, more powerful quantum computers will be able to crack this encryption. No security issues Competition Read more The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted. Security issues In infected phones, even encrypted information could be intercepted and leaked. If unknown VPNs are used, this is more likely to happen. Data in standard phone calls are accessible by anyone intercepting the cables at any end of the signal. Step 3 Swissline Our fog node encapsulates the packet and transmits it to the nearest cell tower or satellite. Read more The packet can be transmitted directly to the satellite or through a home, office, or public router. No security issues Competition Other solutions have no equivalent step. Step 4 Swissline Our secured packet is routed via public network until it reaches our data centre and onto our shield device. It gets inspected for security and, only if it is legitimate and is proven to come from our systems, it goes through further processing. Read more Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening. No security issues Competition Read more In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient. Security issues 1. Even if the phone is using a secure chat app, some information can leak at this stage due to notification servers. From this, it is possible to build up a profile about the user, his habits, and other users he communicates with. 2. Information can get intercepted due to bugs in virtualised servers, accessibility from technical administrators, decryption of information for processing, and infected app updates. 3. The data in standard phones are technically accessible by anyone managing telephone exchanges in the path. Step 5 Swissline The packet is received at the caller's core, inspected once more, and directed to the recipient's core. The second core receives the packet, inspects, verifies, and accepts it. Then, it is processed. No security issues Competition Other solutions have no equivalent step. Step 6 Swissline The packet starts its journey back towards the recipient through the same stages, but in reverse. It happens fast, so it feels and works like a regular telephone call. No security issues Competition The packet travels following the same steps above in reverse order until it reaches the other user. Swissline Competition Step 1 Voice and text are captured, digitalised, and encoded. Data is encrypted with a proven and unbroken cipher. Read more Even if someone has the packet with this data, it cannot be decrypted. Not even by us. Decrypting it would take current supercomputers a billion times more years than our universe has existed. No security issues Step 1 Read more Voice and text are captured, digitalised, and encoded. Data is encrypted on the secure smartphone app. On standard cell phones, there is no encryption. Security issues The smartphone might be infected with spyware, which the user never knows. Even if the phone has a secure communications application, it is no longer secure. When using standard calls and sms, anyone with minimal access, like telecom operators and staff, can listen, technically. Step 2 The packet is transmitted to our fog node, which is responsible for making sure no other information leaves your phone. It is inspected, verified, and accepted based on our security criteria. Only our packets travel within our systems. Read more Not even future, more powerful quantum computers will be able to crack this encryption. No security issues Step 2 Read more The packet is transmitted through the internet towards the provider’s servers. In traditional phone calls, the data is sent unencrypted. Security issues In infected phones, even encrypted information could be intercepted and leaked. If unknown VPNs are used, this is more likely to happen. Data in standard phone calls are accessible by anyone intercepting the cables at any end of the signal. Step 3 Our fog node encapsulates the packet and transmits it to the nearest cell tower or satellite. Read more The packet can be transmitted directly to the satellite or through a home, office, or public router. No security issues Step 3 Other solutions have no equivalent step. Step 4 Our secured packet is routed via public network until it reaches our data centre and onto our shield device. It gets inspected for security and, only if it is legitimate and is proven to come from our systems, it goes through further processing. Read more Our swarm computing systems are 100% stealthy. An outsider cannot know what is happening. No security issues Step 4 Read more In other privacy solutions, the packet is routed via public infrastructure towards their servers. We can only assume that there is some degree of inspection and usage of standard firewall software, which provides some security. Data from standard phone calls are routed through multiple exchanges to reach the recipient. Security issues 1. Even if the phone is using a secure chat app, some information can leak at this stage due to notification servers. From this, it is possible to build up a profile about the user, his habits, and other users he communicates with. 2. Information can get intercepted due to bugs in virtualised servers, accessibility from technical administrators, decryption of information for processing, and infected app updates. 3. The data in standard phones are technically accessible by anyone managing telephone exchanges in the path. Step 5 The packet is received at the caller's core, inspected once more, and directed to the recipient's core. The second core receives the packet, inspects, verifies, and accepts it. Then, it is processed. No security issues Step 5 Other solutions have no equivalent step. Step 6 The packet starts its journey back towards the recipient through the same stages, but in reverse. It happens fast, so it feels and works like a regular telephone call. No security issues Step 6 The packet travels following the same steps above in reverse order until it reaches the other user. I SECURITY FACTS Our solution uses innovative technologies that make it resistant to various attack vectors. No standard computer systems are involved in the solution The processing architecture in some of the components is also used in modern satellites and spacecraft. This means no usage of conventional Intel or AMD systems that may have back doors and security flaws. Contact Us Resistance against spectre, meltdown, and similar vulnerabilities All the components of our solution are resistant against current and future security vulnerabilities of this kind, mainly due to its design. These security issues affected major data centre systems in 2018. The personal information of millions was at risk of being stolen from the platforms of the world’s biggest companies. Contact Us Privacy at the foundation We surpass GDPR compliance guidelines. Additionally, we offer anonymous ordering and operation for the clients who require top privacy. Only the shipping address is required when making an order, which gets immediately deleted after successful delivery is confirmed. Contact Us Resistance against exploitation programs It is believed that conventional consumers’ smartphones are being infected with highly engineered spyware tools without the end-user noticing it. If an average user’s phone is compromised – no matter what app is used inside it – it is not secure anymore. Wikileaks has numerous documents on governments’ activities on exploitation and spyware program development on a massive scale. It showed the development of more than ten such programs over the last decade just in one major government. Contact Us The handset It has a direct channel to a little box that comes with it. The box is engineered to ensure it provides a communication channel for the phone, through which it communicates directly with the separate, physical silicon core sitting in our data centre. Upon purchase, only the customer can access it. Even if the phone is handed for spyware infection and then goes back to the customer, the box itself ensures that any further communication will remain private and secure. Let’s put it this way: any spyware or virus needs internet connectivity to leak your data – and our smartphone has none. Contact Us No internet No need to worry about attacks, leaks, or any other security issues. In a call between two users, the information flows through different devices in our infrastructure. None of them has internet connectivity. Some have a custom configured channel where the internet is used only as a medium to exchange secured packets. Each one of them is thoroughly inspected to ensure no false positives travel through these channels. Further, there are no standard notifications as those required by Google’s FCM or Apple’s PNS servers to work, which, in our view, are very insecure. We use different methods with our infrastructure. For instance, on any app on today’s phones, 99.99% of the notifications are going through these servers every time the phone users make calls send texts over apps like Telegram™, Line™, WhatsApp™, and others. Moreover, if a typical smartphone user’s phone is compromised, it can send out private information without the user knowing it. Even from the most secure apps on that phone. In our solution, this is not possible. Contact Us No DNS Since we need no internet, we do not use DNS. This greatly enhances security, as DNS is prone to data leaks and security breaches. Contact Us Data Centre Our nodes are located in Switzerland’s data centre and are protected by Swiss law. This means that nobody has access to it. We also do not use conventional and hacking prone data centre and cloud technologies for enhanced security reasons. Contact Us Satellites Customers from remote areas like deserts, seas, and jungles are able to connect via satellite plugins. Our solution will also work with Starlink’s constellation. Contact Us Encryption Instead of single encryption algorithms deployed on conventional secure chat apps, we use a combination of algorithms which have higher standards than those used by governments, ensuring that no supercomputer or quantum computer can breach it. Our algorithms are taken from different parts of the world to ensure that no single territory/government can have access even if they have engineered a backdoor in one of them. All current conventional solutions have this immediate risk. Contact Us Trust and transparency We welcome the security auditors of certain customers to review and audit specific parts of the solution to verify our claims, on-demand. Our company is open to such activities to provide transparency and trust. As a special arrangement, we also offer custom and private installation for clients who require more assurance. A dedicated 1:1 hardware contract in data centres inside the Swiss mountains or clients premises is also possible. Contact us for more information. Contact Us No reliance on third party companies Todays’ solutions, which provide some degree of privacy, rely on third party services and software development. If the software provider is hacked, it can carry infected updates and infect secure communication providers. Our solution is contained in an environment where not a single byte of data travels outside of our infrastructure. Ever. Conventional security solutions are insecure and lead to information leaks. When the users send texts, other solution providers use the already mentioned servers, such as Apple™ and Google™. Other solutions rely on Blackberry™ servers and similar software. All of that is insecure, as they are connected to the internet and subject to updates. Also, any agency with access to these software companies can (technically speaking) view the data. We would not know, but it is technically possible. Our solution does not rely on any third party for the software nor any notifications. Contact Us Resistant against spectre This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Privacy at the foundation This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Resistance against exploitation programs This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us The handset This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us No internet This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us No DNS This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Data Centre This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Satellites This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Encryption cracking This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us Trust and transparency This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us No reliance on third party companies This means, no usage of x86 AMD or Intel CPUs, some of which have backdoors and huge security issues. The processing architecture in some of the components is also used in modern satellites and spacecraft. Contact Us I SATELLITE GATEWAY Do you need secure communication capabilities in remote areas? We offer additional services to connect you from almost anywhere on the planet. Contact Us I SOLUTION AVAILABILITY OUR CURRENT AVAILABILITY The current model works worldwide. For remote areas like jungles, deserts, and seas, we can provide a satellite connectivity contract for you. I ISOLATED CORES End user equipment is connected to the corresponding core in our infrastructure. There, data is processed to some extent. The cores operate at such high-security standards that, even if they are compromised, they do not leak private data. However, it is not possible to compromise them remotely. Contact Us I PACKAGES AND ORDERING Each package contains one phone, one fog node, and access to the swarm node. PHONE SET SPECIFICATION Each phone set contains one phone, one fog node, and the allocated swarm node. You need two phone sets in order to communicate across long distances with the highest security and privacy. The swarm node that connects the devices sits in Swissline's infrastructure located in Switzerland. It is designed to allow only the exchange of data between callers. There are zero bytes of data traveling to or from the Internet. All hardware and software are managed 100% by Swissline. I GLOBAL PACKAGES The packages below are designed to work globally by utilizing a physical connection or satellite plugin. Gold Anonymous ordering is possible. Includes unlimited voice calls, video calls, and texts. Your core is physically located inside our infrastructure in a Swiss data centre. Contact Us Platinum The same as the Gold package, but your core is hosted inside a secure data centre in the Swiss Alps. Contact Us Diamond The same as the Gold package, but your core is installed in your home or office. Contact Us For packages in Latin America and the Caribbean, contact the authorized distributor in the region. I CONTACT US Global enquiries and support support@swissline.org Latin America enquiries and support latam@swissline.org Director director@swissline.org If you use secure emails, send us an encrypted email, or PGP encrypted email. Our key is listed on global open PGP servers as "Swissline Director". Include your key as well. Copy PGP Key to clipboard СOPIED TO CLIPBOARD Your Name* E-mail* Phone Number Your Message* Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. I CONTACT US MainAbout UsProtectionSecurity ComparisonSecurity FactsSolution AvailabilityPackages & Ordering Copyright © Swissline Group 21st Century Thank You! We will contact you as soon as possible Back to Home Page Your protection company number one //