ACE Ultra Secure Phone provides full anonymity to protect the identification of your device, complete geolocation protection, no Metadata recording and rock-solid protection against advanced Zero-day exploits that can turn your mobile phone into a listening device.

Full Anonymity MAC addresses, and hostnames are commonly used to uniquely identify a mobile device. ACE phones randomize their MAC address, and hostname with no Meta-Data to provide complete ANONYMITY.

Anti-Location Tracking The ACE phone has built-in protection against both GSM-based and mobile data location tracking as location tracking is a serious concern.

Complete Transparency ACE provides its clients with peace of mind through a complete transparency policy. All customers can perform a full source code audit of the ACE phone OS and applications.

Protection Against Zero-day ACE application containers technology provides an additional layer of protection to prevent from taking over the advanced malware and protection against zero-day. ACE platform detects advanced malware and Zero-day exploits.

Anti-Interception The ACE phone provides comprehensive protection against both Wi-Fi and GSM interceptions, ensuring the privacy and security of all of your communications.

OS & Apps Customisation Every customer has their specific mobile security needs and ACE is committed to meeting these needs. The ACE operating system and applications are fully customisable to meet customer requirements.

ACE Secure phone is completely anonymous. It protects your geolocation and has anti-interception feature that prevents hacking, blocking of Wi-Fi and GSM interception both over-the-air and baseband attacks. It is highly sophisticated with anti-hacking properties. ACE Secure Phone comes with customised secure harden operating system.

Full Anonymity

Military-Grade Encrypted Calls & Messages

Full Transparency – No Backdoor Policy


Layer 1: Application level

ACE security scan with multi- layer application protection analysis. Its interface acts as foolproof protection to ACE phone against vulnerabilities.

  • Sandbox application containers provide an additional layer of protection to prevent from taking over the malware
  • Protection against zero-day and advanced malware
  • Provides encrypted communication

Layer 2: OS level

  • Special & Secure Harden OS
  • Jail break detection and prevention
  • Encrypted filesystem
  • GSM firewall and IP firewall

Layer 3: Full Anonymity

  • Randomization of Hostname, and Mac address, on every boot time
  • Meta Data protection with no EXIF data and no location tags associated with any file
  • Wi-Fi probes request protection by removing all the saved passwords on every boot time
  • GSM/WIFI data interception protection via private persistence VPN & Tor. VPN encrypts your entire Web traffic to secure against IP data interception and injection


CRYPTO-X CALL Anti-interception ZRTP protocol using uncrackable Diffie-Hellman Key Exchange at 3K and military-grade AES-256 encryption.

SECURE GSM FIREWALL Users can make secure GSM calls on the ACE phone using the ACE VPN and VOIP app with portable ACE hardware, this feature is optional.

SECURE BROWSER ACE uses secure browser for completely anonymous web surfing, allowing access even to blocked and monitored sites including the Deep or Dark Web.

ACE CHAT ACE uses the OMEMO end-to-end encryption protocol, ensuring security and privacy for all received and sent messages.

SECURE VPN Own custom 3-layer VPN uses military-grade encryption and tunneling over port 443 to ensure data privacy, security and availability, and protect against DPI or VPN- blocking solutions.

SECURE MAIL Send and receive end-to-end PGP encrypted emails. Encryption keys are generated and securely stored only on your ACE phone.