G1 Secure Communicator

No compromises for your confidential communications

ARMA designed the total opposite of a smartphone, the ARMA G1

By design, the ARMA G1 facilitates message communications only. We designed a closed system for person to person and group messaging that lead to a very small attack surface and superior security. ARMA G1 operates globally on above TOP SECRET level security, using the public cellular network. ARMA developed the entire system from the ground up, from the message application and the ARMA Linux operating system to the entire electronics board.  Our neutrality and transparency can be continuously monitored through our Control System for Transparency.

ARMA Instruments established the ARRI research consortium that currently includes several major research institutes and universities and the initiative is expanding internationally. ARRI contributes to ARMA’s long term commitment to remain the state of the art for secure communications technology. ARRI validates ARMA’s technology and shows transparency as we provide our academic partners with total insight in both organization and technology.

ARMA G1 Secure Communicator
Direct benefits
Industry-First Technology
All Features
G1 Specifications
Our Services

Developed for TOP SECRET level security
Our secure communications technology is designed to provide the highest safety achievable in secure communications.

No infrastructure
The ARMA G1 communications system relies on Tor network, which is public infrastructure. Therefore, the purchase and maintenance of infrastructure is not needed.

Seemless integration
Setting up a closed secure communications network based on the ARMA G1 requires no significant actions. Users activate the device and are able to add their contacts through our rendezvous protocol. ARMA can provide with its clients with additional custom services.

Dynamic Identity
Is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number
16/433,768.

Serverless Infrastructure
The first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

Dynamic Identity
Is a mayor improvement in the field of secure communications. Where currently users are easily trackable and identifiable, our ARMA G1 communicator continuously changes its identity, both on the device as well as on the mobile network level. We are the first company introducing this technology and Dynamic Identity is filed for patent under US patent number
16/433,768.

Serverless Infrastructure
The first commercially available solution using onion routing for mobile communication that anonymises the user’s routing, metadata, identity, location and makes storing user communication data technically impossible, for anyone. It provides an immensely resilient infrastructure against any form of attack. Bringing our communications down would in effect be bringing down the internet that was built to survive nuclear war.

Controlled ecosystem
ARMA is both developer and manufacturer of its products, excluding supply chain attacks.

Non-extractable keys

Isolated cellular modem
Modem is isolated from the device’s main computing core and has no direct memory access.

Controlled execution environment
Trusted boot and firmware updates and cryptographic verification of the boot image integrity.

Microservice architecture
Individual software components are isolated using operating system containers and are run on a “need to know basis”.

Passports
Multiple identities are possible on a single device being totally independent.

Zero inbox
We promote a zero inbox principle to be able to conveniently use the device. 
By default all communicated information is set to expire soon and typically there is no message archive on the device.

Self destruct
All critical hardware components are protected in a tamper resistant enclosure. If the integrity of the device is compromised, all encryption keys are irrecoverably erased.

TEMPEST resistant
Both passive and active measures are in place to ensure the blocking of electromagnetic emissions that otherwise would leak sensitive information.

General specifications

Operating system 
Linux based ARMA OS

Dimensions 
length x width x height (mm) – 115 x 72 x 9

Weight (g)
200 grams

Battery capacity (mAh)
4000

Tactical rotary encoder
Isolated from the main case using magnetics

Composition
Stainless steel and advanced ceramics

Wireless charging

Dust and water resistant
Rated IP67 (maximum depth of 1 meter up to 30 minutes) under IEC standard 60529

Hardware specifications

Main circuit board
ARMA Instruments proprietary

Processor 
Arm iMX7

Baseband processor
Quectel Qualcomm BG96 / U-blox SARA-N4

RAM
1 GB

Internal storage
8 GB

Display
AMOLED 3.81 (inches) 1020×1200 pixels

Connectivity

Cellular

SIM-less operation

Unlimited global roaming
ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

Threat Intelligence Center
As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

Transparency Center
Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

Customer & after sales support
Our customer service center is available 24/7 by phone and email through our contact center.
We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

Copyright © 2018 – 2023 ARMA Instruments AG | All Rights Reserved
cross