View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 12, 2016updated 04 Sep 2016 10:17pm

5 mobile encryption tools to protect your internet privacy

News: Want to hide your internet traffic from prying eyes? Try these encryption tools for mobile.

By Alexander Sword

Research has revealed that more and more internet traffic is being encrypted, with 70 percent of global traffic set to be encrypted across 2016. However, encryption is lagging slightly on the mobile internet, which currently has around 60 percent encryption.

Usually encryption is carried out at the discretion of the internet company which is providing a given service. For example, WhatsApp notably encrypts all communications carried across the service.

However, for those mobile phone owners that wish to take matters into their own hands, there are a range of tools that are available now.

CBR rounds them up in this list.


1. Gold Lock 3G

Licensed by the Israeli Ministry of Defense, Gold Lock 3G aims to provide military-grade encryption for both voice and data communications.

It does not require VoIP capabilities and will automatically encrypt calls, file transfers and text messages, including internationally. This encryption works across cellular, GPRS and wi-fi.

Content from our partners
Green for go: Transforming trade in the UK
Manufacturers are switching to personalised customer experience amid fierce competition
How many ends in end-to-end service orchestration?

The company boasts that it provides triple-layered security and the solution can be used on iPhone, Android and BlackBerry.

Founded in 2003, the Israel-based company employs over 30 specialists, including security software developers, tactical mathematicians and analysers. As well as providing its mobile encryption products, it also builds custom security solutions for several government and military organisations.


2. Cellcrypt

The company uses double-layer AES-256 and RC4-384 to provide a new key for each call or text message.

Cellcrypt has its own VoIP infrastructure, which allows the caller to use a low data rate. So that the calls don’t hog your bandwidth, the calls use narrow band adaptive voice codec.

It operates over all major types of network, including mobile, satellite and wi-fi, and works on iOS, Android, BB10, Windows 8.1 and PBX. A desktop version is set to be available soon.

Customers will have access to Cellcrypt’s secure PBX Service. This gateway integrates Private Branch Exchnages with the Cellcrypt NG-compatible end-point encryption. Cellcrypt NG-enabled smartphones can connect to landlines and use functionalities such as voicemail and call-forwarding.

The Secure Conferencing solution allows multiple parties to connect securely on a secure conference bridge.
Verizon is working with Cellcrypt to offer the Voice Cypher Ultra product.


3. KoolSpan

KoolSpan has a patented mobile encryption engine which authenticates and secures all communications.

The engine runs on standard smartphones and network-connected devices; the engine is run either in the native secure elements of the phone, or on a TrustChip microSD memory card.

It can also be run in Trustonic’s Trusted Execution Environment, which is a secure area that uses the phone’s application processor.
The solution is compatible with Android, iPhone and BlackBerry phones.


4. PhoneCrypt

PhoneCrypt claims to offer military-grade encryption with RSA 4096 bit & AES 256-bit encryption. This is the same technology used by the FBI and CIA.

The software can run across internet connectivity through 3G, UMTS, HSPA, W-CDMA, EDGE, GPRS and wi-fi, and is compatible with both landline and mobile phones. It works in real-time and does not affect the phone’s functioning.

The calls that you place through the software are free, using only the carrier’s data package. It can therefore also be used for long-distance and international calls.

It works by generating a new encryption key automatically before every call. This single combination is modified every 4 seconds and prevents your communication from being intercepted.

Secure data is never saved on the device and the user isn’t required to do anything. It uses less than 150 Mhz of processing power meaning it won’t drain your battery too much.

In terms of industry the solution mainly targets consulting & engineering, healthcare & insurance, finance & legal, government & law enforcement and manufacturing & suppliers.


5. Orbot

The Tor project has made its name through the desktop browser, which uses a form of onion routing. This is more secure than simple encryption, as it first encrypts then bounces the traffic at random around the world through a volunteer network of routers.

Android users can install the Orbot package, an application designed to allow mobile users to access the web, instant messaging and email without any tracking or blocking.

It contains Tor and libevent, which provides a local HTTP proxy and the standard SOCKS4A/SOCKS5 proxy interfaces into the Tor network.

It can be installed from an F-Droid repository, the Android Market or manually from Guardian’s website.
All of the source code is available in the Orbot git repository, but Tor notes that this might not always give you the latest stable Tor version.


Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.