ARMA G1
ARMA G1: The secure phone with serverless messaging and voice
The ARMA G1 is a breakthrough in secure communications, built for those who cannot afford compromises. Unlike traditional encrypted phones, the ARMA G1 is entirely serverless, meaning no messaging servers, no call servers. Instead, small, trusted groups of users act as decentralized relays, eliminating the risk of centralized points of failure or interception.
To further enhance security, ARMA G1 leverages a decentralized obfuscation network for its data transport layer, making it significantly harder for adversaries to analyze communication patterns or track users. This ensures anonymity at a level unmatched by conventional secure communication methods.
Another key innovation is Dynamic Identity, a fundamental protection for high-risk individuals. In today’s world, phone numbers are a security liability, making it easy for adversaries to track, target, and compromise individuals, whether they use a regular phone or even a “secure” one. ARMA G1 removes this threat entirely, providing a system where network identities shift dynamically, preventing users from becoming easy targets or being located through standard telecom tracking methods.
Now, with the ARMA G1 Mark III, secure voice calling is introduced, operating under the same security principles: serverless, decentralized, and engineered to resist interception. Unlike traditional VoIP or encrypted call solutions that rely on call servers, ARMA G1’s voice calls function without any central infrastructure, ensuring that no metadata, call records, or relay points can be compromised.
To physically enforce security, the ARMA G1’s dedicated hardware includes multiple tamper detection mechanisms. If unauthorized access or manipulation is detected, the device can initiate a self-destruct sequence, ensuring that sensitive information is never compromised, even under extreme threat scenarios.
As part of our zero-trust design, the ARMA G1 also features a mechanical microphone killswitch, giving users physical control over their privacy, removing uncertainty and providing peace of mind.
With post-quantum cryptography and a zero-trust architecture, the ARMA G1 is the only device built for true privacy, helping ensure your communications remain secure, even against the most advanced threats.
ARMA G1 – Because Staying Invisible is the Ultimate Security.

The direct benefits of the ARMA G1 for your organization
True Serverless Security & Anonymous Transport
No messaging or call servers—eliminating centralized vulnerabilities. Small user groups handle relay functions, while decentralized obfuscation networking ensures data moves anonymously, preventing interception and metadata analysis.Untraceable Communications
Dynamic Identity prevents tracking via static phone numbers, protecting high-risk individuals from targeting, surveillance, or location tracking.Post-Quantum Cryptography
Post-quantum cryptography secures messages and calls against future threats, ensuring long-term protection for sensitive communications.
OS ARMA Linux
Chipset ARMA
CPU Arm i.MX8M
RAM 1 GB
Internal storage 16 GB
SIM
ARMA virtual SIM OS
ARMA Dynamic IdentityModem U-Blox Global Use
LTE FDD
Bands: 1, 2, 3, 4, 5, 7, 8, 18, 19, 20, 3, 4, 5, 7, 8, 18, 19, 20, 26, 283G UMTS/HSDPA/HSUPA
Bands: 1, 2, 5, 82G GSM/GPRS/EDGE
GSM 850 Mhz
E-GSM 900 Mhz
DCS 1800 Mhz
PCS 1900 MhzType AMOLED 5.44”
Resolution 1920×1080
Input Capacitive, multi-touch
Dimensions length x width x height (mm) 114 x 85 x 15
Weight (g) 244 grams
Battery capacity (mAh) 7000
Charging Wireless
Input Touch
Material Stainless steel and Kevlar Aramid composite
Dust and water resistance IP65 and IP67
Shock resistance MIL STD 810G standard
Platform
Network
Display
Body
Dynamic Identity
ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.Serverless Infrastructure
End to end encrypted data is sent directly to its intended recipient through TOR, a public network, that anonymously routes user data through several random and encrypted relay servers across the globe. Messaging servers are not used at all. This leaves no infrastructure or persistent data to attack.Controlled ecosystem
Secure ecosystem through zero-trust policy, from hardware and operating system to software and organisation.Non-extractable keys
Encryption and decryption with non-extractable keys that are generated and stay on the device, unknown to ARMA or any third party.Isolated cellular modem
Modem is isolated from the device’s main computing core and has no direct memory access.Controlled execution environment
Trusted boot and firmware updates and cryptographic verification of the boot image integrity.Microservice architecture
Individual software components are isolated using operating system containers.Single application
Dedicated messaging, no third party applications.Passports
Multiple aliases are possible on a single device. Certain contact groups may be handled isolated and independently.Self destruct
All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.Closed network
No interoperability with other communications systems.Anti-tamper
Tamper resistant enclosure, if compromised, all encryption keys are irrecoverably erased.TEMPEST resistant
Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.Minimal attack surface
No connectors, NFC, Bluetooth, WIFI, GPS, speaker, microphone or sensorsGovernance
Control System for Transparency provides transparency in root of trust, manufacturing, system and organisation
Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.
Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.