The Solarin

The Solarin2 Star Rating out of 5. ★ Israel-based company called Sirin Labs provides the Android-based smartphone that is promoted for its highly secure software for $14,000 USD. One of its main features is the ability to switch the phone into a secure mode, where only outgoing voice calls and encrypted messaging is allowed. It is... Read More »


RedPhone1.5 Star Rating out of 5. ★ RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in. RedPhone uses your normal phone number to make and receive calls, so you don’t need yet another identifier. Use the default system dialer and contacts apps to make calls as you normally... Read More »

Silent Circle

Silent Circle1.5 Star Rating out of 5. ★ Silent Phone will work on mobile smartphones and tablets (iPhone and iPad as well as Android devices such as Galaxy and Nexus). Download and install the Silent Phone app from the Apple iTunes App store or the Google Play store. Silent Phone requires data connectivity. Our VoIP technology... Read More »


CellcryptTwo star rating out of five. ★★ Cellcrypt encrypts voice calls on leading smartphones Cellcrypt encrypts voice calls on smartphones such as Android™, BlackBerry®, iPhone® and Nokia®, providing government-grade security in an easy-to-use application that makes secure calling as simple as making a normal call on the same device. Cellcrypt’s software solutions allow many types... Read More »


KryptallFive Star Rating out of five. ★★★★★ You can be certain your cellular phone is not a target of eavesdropping when using the KryptAll™ K iPhone and service. The KryptAll™ secure communication solution is designed to be employed when the calling party may be the target of eavesdropping. Both parties of the conversation no longer... Read More »

GSMK CryptoPhone

GSMK CryptoPhoneGSMK CryptoPhone secure mobile, landline and satellite products offer trustworthy 360-degree protection for encrypted communications across network borders: Voice Encryption GSMK CryptoPhones are the only secure telephones on the market that come with full source code published for independent security assessments. They feature the strongest and most secure encryption algorithms available today as well as... Read More »


OstelTwo Star rating out of five. ★★ Ostel is a tool for having end-to-end encrypted phone calls. Our goal is to promote the use of free, open protocols, standards and software, to power end-to-end secure voice communications on mobile devices, as well as with desktop computers. It’s a paid app and for $6.99 you’ll be... Read More »

Motorola AME 2000

Motorola AME 2000This phone can not be evaluated because it is for use in law enforcement and US Government only. It is safe to assume that the US government would be able to listen in on the calls to ensure security. Therefore this encrypted phone would not be desirable for anyone seeking total... Read More »

Sectera Edge

Sectera EdgeThis phone can not be evaluated because it only works on the government network. It is safe to assume the government has the ability to listen in on all the... Read More »

Boeing Black smartphone

Boeing Black smartphoneThis encrypted phone by Boeing can not be evaluated because we could not buy one. It is available for government employees or contractors only. However, it would be our assumption that the government would have a way of listening to it’s employes for security reasons. This would make the phone very undesirable to those wanting... Read More »


BlackphoneTwo Star Rating out of 5. ★★ Blackphone is basically Silent Circle. See the Silent Circle review for more information on this company so that you can be informed on exactly who is selling the Blackphone. Blackphone is the world’s first smartphone to put privacy and control ahead of everything else. Ahead of carriers. Ahead... Read More »


HooxThree Star Rating out of 5. ★★★ The first integrally secured European smartphone The Hoox range of secure mobiles and smartphones ensures confidentiality of voice, SMS, e-mail and data communication. The Hoox range phones are designed to provide a very high level of security.  Controlled communication ports, strong authentication, hardware encryption: the whole smartphone is... Read More »


KoolSpan1.5 Star rating out of 5. ★ Voice Encryption Security TrustCall® voice encryption provides:     Secure voice communication via TrustChip® – KoolSpan’s hardware-anchored microSD encryption engine     FIPS 140-2 Level 1 validation for enterprise and government customers     Voice encryption for iPhone, Android, and Blackberry, and other connected devices     GSM and WiFi-enabled security with... Read More »


WickrTwo Star rating out of 5. ★★ The Internet is forever. Your private communications don´t need to be. Wickr is a free app that provides: ·military-grade encryption of text, picture, audio and video messages ·sender-based control over who can read messages, where and for how long ·best available privacy, anonymity and secure file shredding features... Read More »

RedPhone -potential security questions exist

RedPhone -potential security questions existIn this article, from, we see the concerns due to both the, …”that the operating system or even the hardware itself could be compromised”. The article goes on to state concerns regarding the source code, as quoted, …”there is no means of direct verification of the code”. Read the article and source information below.... Read More »

Cellcrypt collaborates with Verison and Govt

Cellcrypt collaborates with Verison and GovtThis article from the suggests a closeness with the government that may make some people nervous. The question in the back of buyers minds after reading this article could actually drive people away. Are buyers supposed to believe that the military is going let this be, …”marketed to military, intelligence, and civilian agencies”, without... Read More »