ARA COMMS/AG
A device built from scratch for secure communication. Messaging, email, voice and video calls, plus a password manager and calendar. All end-to-end encrypted/decrypted on device. No Android, no off-the-shelf OS: every layer, from PCB to firmware to UI, was designed and built in-house for one purpose.
Attached are the revised clauses, finalised this morning. The tribunal has confirmed the 17:00 deadline today.
Please review sections 4 and 7 before signing. Dr. Vogel is briefed and available for a sealed call if needed.
— J. Perret
Cabinet Perret · Geneva
A hardware feature in the CPU that splits the chip into two isolated worlds. The OS and apps live in one; keys, biometrics, and message handling live in the other. The boundary is enforced in silicon: the open side can ask the secure side for work, never see inside it.
Encryption and decryption happen exclusively on the device. Our relays move encrypted packets between devices. We never hold plaintext, session keys, or identifiers we could be compelled to hand over.
ML‑KEM (Kyber‑1024) for key encapsulation and ML‑DSA (Dilithium‑5) for signatures, paired with X25519 and AES‑256‑GCM. Hybrid by design. If either primitive is broken, the other still protects you.
A panic PIN entered at the lock screen triggers an immediate secure erase. A remote kill command, or an expired dead‑man timer, goes further: the battery discharges into the SoC and RAM, destroying both physically. What no longer exists cannot be recovered.
A second PIN unlocks a panic profile, indistinguishable from the real one. Hand the device over under coercion, enter that PIN, and the alternate profile opens with its own contacts, messages, and keys. From the outside, there is no way to tell which one is live.
Press, investor, government and enterprise enquiries. We respond to qualified inbound within 48 hours.