Technical Specifications
QuantorPhone is engineered for the most critical missions, providing a multi-layered security stack that exceeds the requirements of NIST FIPS and NATO for classified and defense-grade communications. Every architectural choice resists state-level adversaries, advanced persistent threats, and quantum-enabled attacks.
Cryptographic Stack
| Layer | Protocol | Cipher / Algorithm | Purpose |
|---|---|---|---|
| Signaling | TLS 1.3 + mTLS | P-384/P-521 ECDHE, SHA-384, AES-256-GCM | SIP/SIPS control plane (CNSA 2.0) |
| Media key exchange | ZRTP PQC | ML-KEM-1024 (FIPS 203) | Post-quantum media key agreement |
| Media encryption | SRTP | AES-256-GCM | Voice and video payload encryption |
| NAT traversal | TURNS over TLS 1.3 | CNSA 2.0 profile | Relay for hostile / censored networks |
| SmartScan tunnel | Encrypted VPN | ChaCha20-Poly1305, Curve25519 | Full-tunnel PCAP capture |
| CA pinning | X.509 | secp384r1 (NIST P-384) or secp521r1 (NIST P-521, FIPS 186-5) | Proprietary trust anchor |
| Authentication | OAuth 2.0 Device Grant | RS256 JWT | SmartScan + API auth |
| Storage at rest | AES-256-GCM | — | PCAPs, reports, local data |
TLS 1.3 / mTLS stack: mbedTLS (tracking current stable release)
CA pinning: Proprietary, self-signed CA on secp384r1 (NIST P-384) or secp521r1 (NIST P-521, FIPS 186-5), pinned across clients/proxies/relays.
Security Architecture
Mutual TLS (mTLS)
CNSA 2.0 profile for all SIP/SIPS signaling. Certificate-based endpoint authentication with automated CRL/OCSP revocation. Unauthorized UAs dropped before SIP parsing.
ZRTP PQC Media
ML-KEM-1024 for media key agreement with ephemeral key material. SAS voice verification optional for human-in-the-loop integrity. No long-term media keys — capture-and-decrypt neutralized.
TURNS over TLS
CNSA 2.0 relay path with same revocation controls. Media still negotiates PQC keys via ZRTP even through relay. P2P preferred when ICE finds direct path.
Zero Retention
No metadata logging on signaling or media paths. Ephemeral-only keys — no long-term signaling or media secrets. Aligns with NATO emission control and OPSEC guidance.
Tenant & Role Isolation
Certificate profiles encode roles and realms. Unauthorized devices blocked before protocol parsing. Prevents auth bypass and toll fraud at transport layer.
Crypto Hygiene
TLS 1.3 only with PFS ciphers. No RSA/DH legacy fallback. Automated certificate rotation. Failed revocation checks block session by policy.
High-Level Security Stack
Secure Communication Suite
QuantorPhone provides a complete multi-channel communication platform designed to replace consumer-grade messaging apps with an operationally secure, NATO-compliant alternative.
Encrypted Chat
One-to-one messaging with end-to-end encryption (ML-KEM-1024 hybrid). Text, voice memos, images, and documents — all encrypted at rest and in transit. No message ever stored on server infrastructure.
Secure Group Chat
Multi-party encrypted group communication for operational coordination. Conference-grade key distribution with per-message encryption. Group administration via certificate-based role profiles.
Ephemeral Messaging
Auto-burn messages with configurable retention timers (seconds to hours). Zero server persistence — messages exist only on endpoints for the designated window. Cryptographic deletion confirmation.
Voice & Video Calling
HD voice and video with ZRTP PQC (ML-KEM-1024). SAS code for human-in-the-loop MITM detection. Multi-party conference calling with per-stream encryption. Seamless handover between P2P and relay paths.
Encrypted File Transfer
Share files and documents of any size over encrypted channels. Automatic fragmentation and reassembly. Files encrypted at rest on both endpoints with no server-side retention.
Multi-Platform
Android, iOS, Linux, Windows. Consistent security posture across all platforms with shared cryptographic stack. Managed deployment via MDM or manual provisioning.
Hostility Management — 5 Operational Modes
QuantorPhone employs an articulated hostility management framework with five distinct modes, designed for high-risk operational environments where network surveillance, censorship, and active adversary interference are expected.
Mode 1 — Anti-Surveillance
Detects and evades passive network monitoring. Traffic pattern obfuscation, randomized packet sizing, and encrypted DNS (DoH/DoT). Prevents protocol fingerprinting and DPI-based classification of VoIP traffic.
Mode 2 — Anti-Censorship
Circumvents state-level protocol blocking and IP blacklisting. Domain-fronting capable TURNS relays, obfuscated TLS handshakes, and fallback transport chains ensure connectivity even in restricted Internet environments.
Mode 3 — Dynamic Path Selection
Real-time evaluation of multiple network paths (direct P2P, TURNS relay, VPN tunnel). Automatic failover based on latency, packet loss, and detected interference. Ensures continuous call quality under degraded conditions.
Mode 4 — Traffic Obfuscation
Morphs VoIP traffic to resemble standard HTTPS browsing. Protocol steganography prevents adversary identification of QuantorPhone sessions. Effective against advanced DPI systems deployed by state actors.
Mode 5 — Network Hostility Detection
Active probing and passive analysis of local network environment. Detects MITM proxies, SSL stripping, rogue APs, DNS poisoning, and IMSI catchers. Alerts operator and automatically escalates encryption posture.
C2 Integration & Full OS Duress
QuantorPhone is designed as a deployable module within Command & Control (C2) architectures. Five customizable structures allow seamless integration into existing defense communication ecosystems.
C2 Integration
QuantorPhone deploys as a modular component within Command & Control architectures. Five customizable integration structures enable policy management, fleet control, secure channel binding, telemetry, and remote incident response — all via authenticated, encrypted C2 channels. Details available under NDA.
Full OS Duress Mode
Comprehensive device-level duress capabilities including cryptographic emergency wipe, plausibly deniable storage, decoy profiles, dead man’s switch, and operator alert mechanisms. Designed for personnel operating in denied or hostile environments. Full capability briefing available under NDA (TLP:AMBER).
NATO C2 INTEROPERABILITY
- REST/gRPC API for integration with NATO FMN (Federated Mission Networking) architectures
- STANAG 4774/4778 confidence metadata on all exported intelligence products
- STIX 2.1 / TAXII 2.1 for threat intelligence sharing with NATO CCDCOE platforms
- Certificate-based authentication compatible with NATO PKI / national CA hierarchies
- Deployable as mission module — no dependency on external cloud services
NATO & Standards Alignment
NATO STANAG COMPATIBLE
- STANAG 4774/4778 — confidence metadata and intelligence product interoperability
- CNSA 2.0 — NSA-approved cryptographic profile for classified VoIP environments
- NIST SP 800-86 — forensic chain of custody with cryptographic provenance
- EU NIS2 Directive — sovereign deployment, GDPR Art. 32 encryption
- NATO CCDCOE — aligned with Tallinn cyber defence best practices