Title: SpeakInPrivate Phones - Introduction
1SpeakInPrivate Your Confidential Communication
Device. Simple and affordable privacy. Secure
voice, video, text, file transfers and lot more.
2Index
3SpeakInPrivateSecurity-oriented intelligence
device version of customized Android software
that uses a virtual private network (VPN) to make
users phone activity anonymous. It allows users
to untraceably and privately make calls, send
texts, send and receive files, and video chat.It
is an interesting and undoubtedly useful device,
it has valuable specs that any person would want
to have on his handset.
4Key Features
5Security Features
6Other Features (Basic Model)
Particulars Features
Body Dimension - 142 x 71.9 x 9.2 mm Weight - 150 g Sim - Dual Sim
Display Size - 5.0 inches
Platform OS - Android OS, v4.2.2
Memory Card Slop - Up to 32 GB Internal - 4 GB , 1 GB RAM
Camera Primary - 8 MP Secondary - 2 MP
7Other Features (Superior Model)
Particulars Features
Body Dimension - 76.6 x 153.5 x 8.5 mm Weight - 176 g Sim - Single Sim
Display Size - 5.7 inches
Platform OS - Android OS, v4.4 (KitKat)
Memory Card Slop - Up to 128 GB Internal - 32 GB , 3 GB RAM
Camera Primary - 16 MP Secondary - 3.7 MP
8Technology Used
9Process of Encryption Communication
10Index
11Benefits of Speak in Private
12Index
13Target Market
- Target markets include India and
- India friendly nations-
- India
- South East Asia except China
- Central Asia
- Middle East
- Africa
- Caribbean
14Target Customers
15Market Penetration Strategy - INDIA
- Direct Sales in India through agents.
- Public Private Partnerships.
- Leveraging on Existing Clientele.
- Leveraging a network of IPS and army officers for
client reference. - Seek empanelment's in various bodies to get
authorized access to opportunities.
16Market Penetration Strategy - International
- Developed Sales partners in Saudi Arabia , UAE,
Mongolia, Malaysia, Zimbabwe etc. - Developing more Sales Partners in target market
globally. - Seeking opportunities in International defense
sectors across developing economies.
17Index
18Business Threats
19Index
20Service Speak in private Cell Crypt Black Phone Secure Star
Anti Forensics Yes No No No
Anti Recording Yes No No No
Anti Snap shot Yes No No No
Biometric lock Yes No No No
Calling outside network Yes Yes Yes Yes
Device specific Yes Yes Yes No
Encrypted calling Yes Yes Yes Yes
Encrypted file system Yes No Yes No
Encrypted File Transfer Yes No Yes No
Encrypted Text Yes No Yes No
Encrypted Video Calling Yes No No No
Firewall Yes No No No
Key Exchange Yes Yes Yes Yes
Personalised Key Yes No No No
Private OS Yes No Yes No
Remote Wipeout Yes No Yes No
Signalling Encryption Yes Yes Yes Yes
VPN Yes No Yes No
Comparison
21Summary
- With the rapid growth of mobile phone usage in
recent years, it is often observed that it has
also become a part of many illegal and criminal
activities. So, in most cases tracing the mobile
number becomes a vital part of the investigation
process. - Also, sometimes we just want to trace a mobile
number back to the caller for reasons like
annoying prank calls, blackmails, unknown number
in a missed call list and so on. - Advent of smart phones and 4G connections give
this opportunity a unique timing advantage.
22Thank You