ARMA G1

ARMA G1: The secure phone with serverless messaging and voice

The ARMA G1 is a breakthrough in secure communications, built for those who cannot afford compromises. Unlike traditional encrypted phones, the ARMA G1 is entirely serverless, meaning no messaging servers, no call servers. Instead, small, trusted groups of users act as decentralized relays, eliminating the risk of centralized points of failure or interception.

To further enhance security, ARMA G1 leverages a decentralized obfuscation network for its data transport layer, making it significantly harder for adversaries to analyze communication patterns or track users. This ensures anonymity at a level unmatched by conventional secure communication methods. 

Another key innovation is Dynamic Identity, a fundamental protection for high-risk individuals. In today’s world, phone numbers are a security liability, making it easy for adversaries to track, target, and compromise individuals, whether they use a regular phone or even a “secure” one. ARMA G1 removes this threat entirely, providing a system where network identities shift dynamically, preventing users from becoming easy targets or being located through standard telecom tracking methods.

Now, with the ARMA G1 Mark III, secure voice calling is introduced, operating under the same security principles: serverless, decentralized, and engineered to resist interception. Unlike traditional VoIP or encrypted call solutions that rely on call servers, ARMA G1’s voice calls function without any central infrastructure, ensuring that no metadata, call records, or relay points can be compromised.

To physically enforce security, the ARMA G1’s dedicated hardware includes multiple tamper detection mechanisms. If unauthorized access or manipulation is detected, the device can initiate a self-destruct sequence, ensuring that sensitive information is never compromised, even under extreme threat scenarios.

As part of our zero-trust design, the ARMA G1 also features a mechanical microphone killswitch, giving users physical control over their privacy, removing uncertainty and providing peace of mind.

With post-quantum cryptography and a zero-trust architecture, the ARMA G1 is the only device built for true privacy, helping ensure your communications remain secure, even against the most advanced threats.

 ARMA G1 – Because Staying Invisible is the Ultimate Security.

Захищений комунікатор ARMA G1
Захищений комунікатор ARMA G1

The direct benefits of the ARMA G1 for your organization

  • True Serverless Security & Anonymous Transport
    No messaging or call servers—eliminating centralized vulnerabilities. Small user groups handle relay functions, while decentralized obfuscation networking ensures data moves anonymously, preventing interception and metadata analysis.

  • Untraceable Communications
    Dynamic Identity prevents tracking via static phone numbers, protecting high-risk individuals from targeting, surveillance, or location tracking.

  • Post-Quantum Cryptography
    Post-quantum cryptography secures messages and calls against future threats, ensuring long-term protection for sensitive communications.

    Платформа

  • OS ARMA Linux

  • Chipset ARMA

  • CPU Arm i.MX8M

  • RAM 1 GB

  • Bнутрішня пам'ять 16 GB

  • SIM
    ARMA virtual SIM OS
    ARMA Dynamic Identity

  • Modem U-Blox Global Use

  • Мережа

  • LTE FDD
    Bands: 1, 2, 3, 4, 5, 7, 8, 18, 19, 20, 3, 4, 5, 7, 8, 18, 19, 20, 26, 28

  • 3G UMTS/HSDPA/HSUPA
    Bands: 1, 2, 5, 8

  • 2G GSM/GPRS/EDGE
    GSM 850 Mhz
    E-GSM 900 Mhz
    DCS 1800 Mhz
    PCS 1900 Mhz

  • Дисплей

  • Тип AMOLED 5.44”

  • Розширення 1920×1080

  • Вхід ємкісний , multi-touch

  • Тіло

  • Д*Ш*В (мм) 114 x 85 x 15

  • Вага (г) 244

  • Ємність акумулятора (mAh) 7000

  • Зарядка Безпровідна

  • Вхід Touch

  • Матеріал Stainless steel and Kevlar Aramid composite

  • Пило- та водонепроникнiсть IP65 and IP67

  • Ударостiйкiсть MIL STD 810G standard

  • Динамічна ідентичність
    ARMA’s patented Dynamic Identity feature prevents you from becoming a target by regularly interchanging the International Mobile Subscriber Identifier (IMSI) number, with at the heart of it ARMA’s virtual SIM that replaces a conventional physical SIM card.

  • Безсерверна інфраструктура
    Наскрізні зашифровані дані надсилаються безпосередньо до адресата через TOR - загальнодоступну мережу, яка анонімно маршрутизує дані користувача через кілька випадкових і зашифрованих серверів ретрансляції по всьому світу. Сервери обміну повідомленнями не використовуються взагалі. Це не залишає жодної інфраструктури чи постійних даних для атаки.

  • Контрольована екосистема
    Безпечна екосистема завдяки політиці нульової довіри, від апаратного забезпечення та операційної системи до програмного забезпечення та організації.

  • Клавіші, що не витягуються
    Шифрування та дешифрування за допомогою неекстрагованих ключів, які генеруються та залишаються на пристрої, невідомі AРMA чи будь-якій третій стороні.

  • Ізольований стільниковий модем
    Modem is isolated from the device’s main computing core and has no direct memory access.

  • Контрольоване середовище виконання
    Надійні оновлення завантажувача та прошивки, а також криптографічна перевірка цілісності завантажувального образу.

  • Мікросервісна архітектура
    Окремі програмні компоненти ізолюються за допомогою контейнерів операційної системи.

  • Одноразова заявка
    Виділений обмін повідомленнями, без сторонніх додатків.

  • Паспорти
    На одному пристрої можна використовувати кілька псевдонімів. Певні групи контактів можуть оброблятися ізольовано та незалежно.

  • Самознищення
    Усі важливі апаратні компоненти захищені в захищеному від несанкціонованого доступу корпусі. Якщо цілісність пристрою порушується, всі ключі шифрування безповоротно стираються.

  • Закрита мережа
    Відсутня функціональна сумісність з іншими системами зв'язку.

  • Захист від несанкціонованого доступу
    Захищений від несанкціонованого доступу корпус, якщо його зламати, всі ключі шифрування безповоротно стираються.

  • Стійкість до негоди
    Вживаються як пасивні, так і активні заходи для забезпечення блокування електромагнітних випромінювань, які в іншому випадку можуть призвести до витоку конфіденційної інформації.

  • Мінімальна поверхня атаки
    Немає роз'ємів, NFC, Bluetooth, WIFI, GPS, динаміка, мікрофона або датчиків

  • Governance
    Control System for Transparency provides transparency in root of trust, manufacturing, system and organisation

  • Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

  • Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

    Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

    Необмежений глобальний роумінг
    ARMA Instruments specifically has no insight into the ARMA G1’s geographical location nor the amount of data that it uses. Therefor billing  per device is not possible. Subscriptions are based on a 1 year flat fee allowing for a full year of worldwide unlimited and unrestricted use of our service.

  • Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

    Threat Intelligence Center
    As part of our Secure Operations Center the ARMA Threat Intelligence Center is based on the collection of intelligence using open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. It’s key mission is to research and analyse trends and technical developments in the areas of cybercrime, hacktivism and cyber espionage.
    This enables us to anticipate, respond to and remediate threats on all levels, whether user operational, legislative, distribution or otherwise.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

  • Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

    Transparency Center
    Our transparency center is open to all our customers. It provides on premises tour of our facilities and has staff available to enable customers to investigate our source code, updates, operations- and threat intelligence center.

  • Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.

    Customer & after sales support
    Our customer service center is available 24/7 by phone and email through our contact center.
    We have advanced support standby and an R&D department which handles confirmed bugs or feature requests from customers.
    Depending on the customers service contract, device guarantee issues are processed under 48 hours from notification.