Encrypted communications, enhanced security

Xtrem offers encrypted smartphones that facilitate secure communications and guarantee the integrity of data at rest.

strong knox
unrivalled protection
Unrivalled protection

Our devices boast multi-layer encryption that keeps hacking and other malicious activities at bay.

user-friendly devices
User-friendly devices

In addition to protecting your privacy, our easy-to-use phones give you unmatched comfort.

guaranteed privacy
Guaranteed privacy

We simply facilitate the communication process, with no data and messages stored on our servers.

global data coverage
Global data coverage

Our devices come with a multi-IMSI SIM card offering unlimited data coverage across the globe.

Xtrem Phone

A complete solution for your mobile security that combines unbreakable encryption with a proprietary, hacking-resistant OS.

Device and storage encryption

Xtrem Phone has both full disc encryption and apps that store data in encrypted databases.

Protected communications

All communications from and to the handset use end-to-end encryption based on vetted protocols.

Vulnerability-free OS

The device runs on a highly customized version of Android that limits potential vulnerabilities.

htc-dashboard htc-email htc-chat htc-vault
BACK

Dashboard

The dashboard enables you to enjoy the unconditional security provided by Xtrem Phone while having quick and easy access to the apps you use the most. Writing an email, sending a chat message, making a call, and saving files in our encrypted container are all one click away.

Xtrem PGP Email

Our Xtrem Email app has all the functionalities of regular mail clients (message filtering, support for multiple accounts, etc.), but with added PGP encryption. It uses AES-256 with 4096-bit RSA keys, which are created and stored only on the user’s device. Decrypting messages is mission impossible even for supercomputers.

Xtrem Peer-to-Peer Chat

Xtrem Chat uses OTR and OMEMO encryption for 1:1 and group chats, respectively, and ZRTP encryption for voice calls. Messages are transmitted only when both the sender and the recipient are online, with no copies kept on our servers. Cryptographic algorithms allow for reliable authentication of the person you are talking to, preventing man-in-the-middle attacks.

Xtrem Vault

Xtrem Vault is a PIN- or password-protected encrypted file container with a built-in note editor. Fully integrated with Xtrem Chat and Xtrem Email, it allows you to create and edit encrypted notes, save Xtrem Chat text messages as encrypted notes, and keep media files transferred through Xtrem Chat in an encrypted format.

Dashboard

htc-dashboard

The dashboard enables you to enjoy the unconditional security provided by Xtrem Phone while having quick and easy access to the apps you use the most. Writing an email, sending a chat message, making a call, and saving files in our encrypted container are all one click away.

Xtrem PGP Email

htc-email

Our Xtrem Email app has all the functionalities of regular mail clients (message filtering, support for multiple accounts, etc.), but with added PGP encryption. It uses AES-256 with 4096-bit RSA keys, which are created and stored only on the user’s device. Decrypting messages is mission impossible even for supercomputers.

Xtrem Peer-to-Peer Chat

htc-chat

Xtrem Chat uses OTR and OMEMO encryption for 1:1 and group chats, respectively, and ZRTP encryption for voice calls. Messages are transmitted only when both the sender and the recipient are online, with no copies kept on our servers. Cryptographic algorithms allow for reliable authentication of the person you are talking to, preventing man-in-the-middle attacks.

Xtrem Vault

htc-vault

Xtrem Vault is a PIN- or password-protected encrypted file container with a built-in note editor. Fully integrated with Xtrem Chat and Xtrem Email, it allows you to create and edit encrypted notes, save Xtrem Chat text messages as encrypted notes, and keep media files transferred through Xtrem Chat in an encrypted format.

MORE DETAILS

Xtrem Knox

An enhanced version of the original Knox platform that brings together enterprise-grade mobile security practices and end-to-end encryption in an easy-to-use device.

Enhanced security

Xtrem Knox relies on multi-layer protection that guarantees the security of your messages, calls and data at rest.

End-to-end encryption

Our chat and email apps allow for pure peer-to-peer messaging through PGP, OMEMO, OTR and ZRTP encryption.

Secure storage

Our communication apps store everything in encrypted databases, with shared media files kept in an encrypted container.

Malware resistance

With the app store disabled and strict policies enforced on the device, Xtrem Knox is a no-entry zone for malware.

knox-x samsung-knox
MORE DETAILS

FAQ

How does Xtrem guarantee the privacy of my communications?

We guarantee your privacy in three ways.

First, our communication apps use encryption based on peer-reviewed cryptographic protocols that have proved their reliability over time. All messages travel in encrypted form from the sender to the recipient.

Second, users are in charge of their privacy. The encryption keys used by our PGP email client are generated and stored only on the users’ devices and, therefore, never touch our servers. No matter what happens to us and our infrastructure, your emails remain unreadable to third parties.

And third, we simply facilitate the communication between you and your contacts via Xtrem Chat. No messages ever stay on our servers; they just pass through there and get instantly deleted. Messages get transmitted only when both the sender and the recipient are online.

What encryption do your apps use?

Xtrem Email uses PGP encryption with 4096-bit RSA keys and digital signatures. For one-on-one conversations, Xtrem Chat uses OTR encryption with 4096-bit Diffie-Hellman, AES-256, and SHA-2 hashing. The same app uses OMEMO encryption for group conversations, relying on the Double Ratchet protocol, with AES-256 and SHA-2 hashing. For voice over IP (VoIP) calls, Xtrem Chat uses the ZRTP protocol.

Are there any security backdoors in your products?

No, there aren’t. We reject the very idea of backdoors because they undermine the initial purpose of our devices – that is, to serve as reliable tools for secure communications. A backdoor is an intentional product defect that gives access to the information stored on a device. While backdoors can be useful for maintenance purposes, they can be exploited by parties with malicious intent. Since we put our end-users’ privacy first, we cannot afford that kind of risk.

Can I erase the information on my phone if it gets lost or stolen?

Yes, you can. We offer several remote-wipe options, depending on the device you use.

Both Xtrem Phone and Xtrem Knox can be wiped remotely by sending a message with a specific command to the device via email or chat.

Xtrem Phone can further be wiped by you through a self-wipe you set up in advance or via the special app installed on the device. It can also be wiped remotely by us at your request.

Can I use my phone when traveling around the world? What data plan do you offer?

Yes, you can use your phone when traveling. Xtrem’s devices come with a multi-IMSI SIM card that enables you to stay connected regardless of your location, with no extra fees for roaming or data usage. As long as you are within the coverage of a cell network, you can use our products to communicate securely.

How does Xtrem respond to government information requests?

When approached by law enforcement agencies with legitimate and lawful requests for information, we cooperate within the confines of the law. That being said, we have tried to make such requests redundant by taking ourselves out of the communication process as much as possible.

We keep no copies of user communications. Messages only touch our servers – and do so in encrypted form – and get erased the moment they leave the servers. The encryption keys needed to decrypt the communications and access their content are generated and stored only on the users’ devices. This feature ensures that neither we nor anyone else could ever read your messages.

Contact Us

In case you have any questions about our products or want to explore our partnership options, feel free to get in touch with us. Just fill in the form below and we will get back to you shortly.