|Ideas are bulletproof! - Fighting for freedom since 1996
CB3ROB Tactical Systems offers the following services:
- Hardware and software development
We go forward to defend freedom and all that is good and just in our world.
The final solution provider in a hostile world!
CB3ROB/CYBERBUNKER IN THE NEWS
Firmware Development boards for the CB3ROB TACTICAL SYSTEMS rugged dataprocessing and control environment.
Estimated Sales price per unit: BTC 0.5
- 65C02 CPU, A reliable platform, proven for over 40 years, with by far the most developers of any CPU family.
- 4 RS232 65C51 ACIA controllers with voltage level conversion and PC compatible pin headers,
- 2, 4 or 8 MHZ system clock (depending on speed rating of the ACIAs primarily).
- 3 VIA TIMER/GPIO/shift register controllers,
- 32 KB SRAM (256 bytes zero page and 256 bytes stack),
- 32 KB EEPROM (64 bytes of which overlapped by IO, 6 bytes by CPU vectors, no on-board reprogramming for security),
- Edition with 4 additional CS8900A compatible 10Base ethernet controllers coming soon.
- Custom board layouts, lightweight, SPACE/MIL/automotive rating available on request (Ask quote).
- RoHS optional for non industrial/military applications within totalitarian regimes demanding inferior constuction methods (EU).
- All components selected for durability (multiple decades) and stability in extreme environments on production models.
- Due to CMOS technology, low energy use.
- Brown out reset and voltage regulation with any polarity for battery use (5-28V AC/DC) on production models.
- Reset upon code execution from RAM (bufffer overflow protection) optional.
- Not in-circuit reprogrammable for security reasons. no 'reconfigurable' components (FPGA, MCU etc).
- All capacitors are metal-foil with MTBF of 40 years+ to prevent failure during operation and fire-hazards.
- All components are easily security checked for 'undesired hidden extras' with tools as simple as a microscope.
- Low heat dissipation enables cooling without moving parts and prevents detection in the field by FLIR imaging.
- Production models available in (optionally lead plated) metal cases for full RFI/EMP and radiation shielding.
- Editions for all usual and unusual power configurations available.
Tactical encrypted communications apps for android field units.
Price per activation key per 6 months: BTC 0.15
- Supports (group)chat, real time voice comms, photo and file transfer.
- Configurable message expiry time upon either send or receive after which it is guaranteed to be gone (unlike with some competitors).
- Self-destruct options built in (safety passwords etc) for emergency situations. (with optional pre-set notification to your contacts)
- Keeps your communications safe from enemy interception in hostile environments.
- Advised to be used in combination with locally obtained 3rd party (hardened) Android/arm hardware and OS.
- Various (inter-compatible) brandings available
- Portable to other (custom) architectures/operating systems on demand.
- Can run on any recent Android implementation. anything from car radios to handheld phones if desired.
- Custom solutions (closed networks, customer owned and operated servers to be located in territory under your control available).
- iOS and Blackberry 10 versions (compatible) available on request.
- Multiple encryption layers, both on the network (end to end) as well as locally.
- Encrypted file vault.
- Built in own keyboard program, to prevent keylogging by the one provided by the OS.
- Supports most languages and keyboard layouts used in the world.
- Faster than several competing products.
- PGP and GPG backwards compatibiltiy for communications with older (e-Mail based) systems supplied by third parties.
- In as far as it goes and not taking into account the hardware and OS it is installed upon: uncrackable by any adversary.
- 6 month pre-paid world data-only SIMs or Iridium satellite comm links available optionally.
- Note that when installing this on 'normie' retail phones, the program by itself does not provide protection against enemies spying upon it with tools like FinFisher.
(or Google happily pulling backups of everything, or pushing 'COVID-19' spyware for that matter)
It is advised to destroy and replace a unit when it has been in foreign hands.
The program itself uses passwords as the login method. for the primary reason that passwords can be 'forgotten' and finger prints or irisscans 'cannot' in case of abductions.
Obtaining and maintaining secured and hardened units, preferably with IMEI and WiFi MAC randomisation to run it on is up to the client.
- No third party services (e-Mail, telephone) required for activation, just username, password, activation key. entered directly into the device itself and you're good to go.
Price for custom setups, custom reseller branding, or large scale rollouts: ask quote
CB3ROB Tactical Systems, a corporation by Royal decree. Republic CyberBunker Company Register #004
BITCOIN ADDRESS: 1LHaLtEcuPUjDGFK5KPZLcKYFsM6YTsRV8
Republic CyberBunker export restrictions apply to certain potential customers.