Dynamic Identity: The Future of Secure Communication 

Eliminating Tracking Through Innovation

 Phone numbers and static identifiers are security liabilities. Adversaries, whether state actors, cybercriminals, or commercial spyware vendors, exploit these fixed anchors to track, target, and compromise individuals. Even secure communication devices often fail to address this fundamental vulnerability, leaving users exposed to surveillance, metadata exploitation, and targeted attacks. 

ARMA Instruments’ Dynamic Identity redefines secure communication by eliminating the risks of static identifiers. Our patented technology continuously rotates cellular network IDs (IMSI/IMEI), ensuring that users cannot be tracked, profiled, or located through traditional telecom methods. 

  

How Dynamic Identity Works 

  1. No Fixed Anchors

Dynamic Identity shifts network identifiers in real time, preventing long-term correlation or tracking. Unlike traditional devices that rely on static IMSI numbers or phone numbers, the ARMA G1 ensures that users remain invisible to adversarial surveillance. 

  1. Reduced Traceability

By dynamically changing identifiers, communication patterns become significantly harder to profile, even under legal or adversarial pressure. This makes it nearly impossible for attackers to map user behavior, locations, or associations through metadata. 

  1. Architectural Priority

At ARMA, identity isn’t an afterthought, it’s a security boundary. Our zero-trust architecture ensures that static identifiers, the primary vectors for tracking and exploitation, are eliminated by design. 

  

The Threat of Static Identifiers 

Static identifiers, such as IMSI numbers or phone numbers, create predictable patterns that make users easy to locate, monitor, and target. Common exploits include: 

  • Spyware attacks (e.g., Pegasus, Predator) 
  • IMSI-catchers (fake cell towers used for interception) 
  • SS7-based attacks (exploiting telecom network vulnerabilities) 

These methods rely on the persistence of identifiers. Dynamic Identity disrupts this model entirely. 

  

ARMA’s Solution: True Operational Freedom 

With Dynamic Identity, the ARMA G1 provides more than just encryption, it delivers personal safety and operational freedom. By removing static anchors and obfuscating metadata, users can communicate without fear of surveillance, tracking, or compromise. 

Security isn’t just about protecting data, it’s about ensuring that no one can find you in the first place. 

 

 

The ARMA G1 Secure Communicator

The direct benefits of the ARMA G1 for your organization

  • True Serverless Security & Anonymous Transport
    No messaging or call servers—eliminating centralized vulnerabilities. Small user groups handle relay functions, while decentralized obfuscation networking ensures data moves anonymously, preventing interception and metadata analysis.

  • Untraceable Communications
    Dynamic Identity prevents tracking via static phone numbers, protecting high-risk individuals from targeting, surveillance, or location tracking.

  • Post-Quantum Cryptography
    Post-quantum cryptography secures messages and calls against future threats, ensuring long-term protection for sensitive communications.

    Platform

  • OS ARMA Linux

  • Chipset ARMA

  • CPU Arm i.MX8M

  • RAM 1 GB

  • Internal storage 16 GB

  • SIM
    ARMA virtual SIM OS
    ARMA Dynamic Identity

  • Modem U-Blox Global Use

  • Network

  • LTE FDD
    Bands: 1, 2, 3, 4, 5, 7, 8, 18, 19, 20, 3, 4, 5, 7, 8, 18, 19, 20, 26, 28

  • 3G UMTS/HSDPA/HSUPA
    Bands: 1, 2, 5, 8

  • 2G GSM/GPRS/EDGE
    GSM 850 Mhz
    E-GSM 900 Mhz
    DCS 1800 Mhz
    PCS 1900 Mhz

  • Display

  • Type AMOLED 5.44”

  • Resolution 1920×1080

  • Input Capacitive, multi-touch

  • Body

  • Dimensions length x width x height (mm) 114 x 85 x 15

  • Weight (g) 244 grams

  • Battery capacity (mAh) 7000

  • Charging Wireless

  • Input Touch

  • Material Stainless steel and Kevlar Aramid composite

  • Dust and water resistance IP65 and IP67

  • Shock resistance MIL STD 810G standard

  • Dynamic Identity
    ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.

  • Serverless Infrastructure
    End to end encrypted data is sent directly to its intended recipient through TOR, a public network, that anonymously routes user data through several random and encrypted relay servers across the globe. Messaging servers are not used at all. This leaves no infrastructure or persistent data to attack.

  • Controlled ecosystem
    Secure ecosystem through zero-trust policy, from hardware and operating system to software and organisation.

  • Non-extractable keys
    Encryption and decryption with non-extractable keys that are generated and stay on the device, unknown to ARMA or any third party.

  • Isolated cellular modem
    Modem is isolated from the device’s main computing core and has no direct memory access.

  • Controlled execution environment
    Trusted boot and firmware updates and cryptographic verification of the boot image integrity.

  • Microservice architecture
    Individual software components are isolated using operating system containers.

  • Single application
    Dedicated messaging, no third party applications.

  • Passports
    Multiple aliases are possible on a single device. Certain contact groups may be handled isolated and independently.

  • Self destruct
    All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.

  • Closed network
    No interoperability with other communications systems.

  • Anti-tamper
    Tamper resistant enclosure, if compromised, all encryption keys are irrecoverably erased.

  • TEMPEST resistant
    Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.

  • Minimal attack surface
    No connectors, NFC, Bluetooth, WIFI, GPS, speaker, microphone or sensors

  • Governance
    Control System for Transparency provides transparency in root of trust, manufacturing, system and organisation

  • Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

  • Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

    Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Unlimited global roaming
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

  • Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

    Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.