{"id":1791,"date":"2015-05-25T10:44:58","date_gmt":"2015-05-25T10:44:58","guid":{"rendered":"http:\/\/3-t.ch\/?page_id=1791"},"modified":"2022-09-28T15:12:15","modified_gmt":"2022-09-28T15:12:15","slug":"home-no-children","status":"publish","type":"page","link":"https:\/\/www.3-t.ch\/","title":{"rendered":"Home &#8211; White"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][rev_slider_vc alias=&#8221;slider1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pdecor=&#8221;Top&#8221; pdecor_reverse=&#8221;reverse&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663762080381{padding-top: 75px !important;padding-bottom: 100px !important;background-color: #f7f7f7 !important;}&#8221; el_id=&#8221;platform-features&#8221;][vc_column][titlesimple title=&#8221;Platform Features&#8221;][\/titlesimple][vc_column_text el_class=&#8221;sectionSubHead customBgColor padded whiteColor&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">3T is an uncompromising platform in terms of security and privacy. It is also very flexible, so different layers and settings can be selected and configured on demand. This makes it possible to meet the individual security needs of different organizations, further enhancing the private network usability.<\/span><\/p>\n<p>[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1446662708588{background-color: #f7f7f7 !important;}&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][boxfeature title=&#8221;DUAL BOOT&#8221; icon=&#8221;dual-boot-icon&#8221; link=&#8221;|title:Home%20-%20Red|target:%20_blank|&#8221;]<\/p>\n<p class=\"p1\">Two autonomous environments living in one device &#8211; a normal one and a secure one.<\/p>\n<p>[\/boxfeature][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][boxfeature title=&#8221;PRIVATE INFRASTRUCTURE&#8221; icon=&#8221;private-infrastructure-icon&#8221;]An advanced privately built infrastructure dedicated to ensure the secure connections within the community.[\/boxfeature][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][boxfeature title=&#8221;HARDWARE&#8221; icon=&#8221;fa-cog&#8221;]3T-P1 comes in a secure shelter with extended privacy controls.[\/boxfeature][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][boxfeature title=&#8221;BUILT-IN SECURE APPLICATIONS&#8221; icon=&#8221;built-in-secure-applications-icon&#8221;]The device comes with customized applications, that produce a secure environment with extended privacy features.[\/boxfeature][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;2848&#8243; ptextcolor=&#8221;White&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663827794541{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #05c3f9 !important;}&#8221; el_id=&#8221;dual-boot&#8221; el_class=&#8221;sectionDesc&#8221;][vc_column el_class=&#8221;z-index999 scrollme&#8221;][titlesimple title=&#8221;Dual boot&#8221; color=&#8221;white&#8221;][\/titlesimple][vc_column_text]<span style=\"font-weight: 400;\">The solution provides two completely autonomous operating systems. They run on alternate and fully independent environments with separate data storages &#8211; a normal one and a secure one. Switching between environments is possible only through a specialized secure application. The dual boot application design disallows remote switches leaving the option entirely on the user\u2019s will.<\/span>[\/vc_column_text][vc_text_separator title=&#8221;Secure OS&#8221;][vc_column_text]<span style=\"font-weight: 400;\">The Secure OS is customized with the most advanced safety features:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Latest Android distribution with the highest performance privacy-by-design principles implemented. This ensures a highly secure environment that still provides a smooth Android experience.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Automatic VPN protected over the air updates bring the latest advanced data protection and privacy features.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Firewall against tracking, surveillance, spying, penetrating and data thefts.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Only whitelisted secure applications. Both built-in and optional ones.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Full control over installed applications<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Secure encrypted communications &#8211; voice calls and text messaging.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Secure browsing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Prevention of\u00a0 metadata collection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Geolocation tracking resistance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Secure data exchange within the community.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Always-on VPN for anonymous presence across the internet.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Integrated firewall.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">No external traffic and corresponding content can come through outside the tunnel.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">No data leaks outside the tunnel.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">All the internal traffic is encrypted and inaccessible by third parties.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Fully forced &#8211; can never be avoided or stopped by programs and users neither remotely, nor locally. <\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Only authentic access is guaranteed by:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">complex pin codes at entering the environment<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">separate pin codes when running the different applications<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Disabling Wi-Fi and Bluetooth when not in use<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Banned access for unauthorized third party usb devices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Secure push notifications<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Internal-Operations-Only protocol applied. The OS does not have to use cloud services or to trust third parties. It is maintained entirely internally within the private infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Disk encryption protected by secure element authentication and security design<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Secure element provides a strong access protocol based on credentials that are stored and processed inside the chip.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_text_separator title=&#8221;Normal OS&#8221;][vc_column_text]<span style=\"font-weight: 400;\">The Normal OS represents a hardened Android for casual use. Although normal it is still provided with an encrypted file system, thus no security compromises are left in it. Android 11 comes with some additional security changes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Improvements to the BiometricPrompt API<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Mobile Driver\u2019s License support<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Secure Storage to make it easier for apps to share data blobs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Expanded use of sanitizers to several security-centric components<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Improved Call Screening<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Introduction of the GnssAntennaInfo class for improved GPS privacy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Secure audio capture from USB device<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; ptextcolor=&#8221;White&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663762379858{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #252525 !important;}&#8221; el_id=&#8221;hardware&#8221;][vc_column el_class=&#8221;z-index999 scrollme&#8221;][videobox title=&#8221;Hardware&#8221; image=&#8221;2863&#8243; text=&#8221;&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">3-T P1 has a secure hardware shelter with extended privacy controls<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Privacy Mode with no possibility for remote or software interventions. Physical button disables the camera, location services, microphone, Bluetooth, screen recording, screenshots and activates airplane mode. The Privacy Mode sets up an efficient shield against malicious acts like:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Hostile surveying by disabling cams\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Wiretapping by disabling mic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Unasked connecting to the device remotely via Bluetooth<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/videobox][vc_column_text el_class=&#8221;sectionDesc&#8221;]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Qualcomm\u00ae Snapdragon\u2122 662\u00a0 &#8211;\u00a0 a secure, robust and power efficient chipset that is designed to provide high performance and high level of user comfort.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Snapdragon 662 comes with multiple advanced properties in terms of security:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Biometric Authentication: Fingerprint, Iris, Voice, Face<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">On-Device: Qualcomm\u00ae Mobile Security, Key Provisioning Security, Qualcomm\u00ae Processor Security, Qualcomm\u00ae Content Protection, Qualcomm\u00ae Trusted Execution Environment, Camera Security, Peripheral Security, Crypto Engine, Qualcomm\u00ae Malware Protection, Secure Boot, Secure Token<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Qualcomm\u00ae Hexagon\u2122 Vector eXtensions significantly increases the processing efficiency<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Qualcomm\u00ae Sensing Hub enables voice assistant to be always-on immediately catching any command.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Authentication and integrity checks at each reboot of the system to intercept any malicious attempts for modifications, replacements and unauthorized executions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Widened performance and security of executed operations thanks to the built in Cryptographic accelerators.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Remarkable AI-driven engine for\u00a0 fast and powerful performance, vast multitasking capabilities and smart intuitive on-device interactions. All running on a major-league fortified and sustainable platform.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The integrated Qualcomm\u00ae FastConnect\u2122 6100 Mobile Connectivity System makes the Snapdragon 662 to be Wi-Fi 6-ready for powerful connections that include battery-saving benefits and enhanced Bluetooth 5.1 capabilities. Wi-Fi 6 ensures confident connections with the supported\u00a0 cutting-edge WPA-3 security protocol.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The supported elements of the WPA-3 Wi-Fi Security protocol give robust security across a wide range of environments and applications.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;2848&#8243; ptextcolor=&#8221;White&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663765182490{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #05c3f9 !important;}&#8221; el_id=&#8221;infrastructure&#8221;][vc_column el_class=&#8221;z-index999 scrollme&#8221;][titlesimple title=&#8221;Infrastructure&#8221; color=&#8221;white&#8221;][\/titlesimple][vc_row_inner el_class=&#8221;sectionDesc&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><span style=\"font-weight: 400;\">Secure Linux-based backend<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Linux is a secure OS by design.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Linux systems are hardly infected by viruses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Linux does not grant full access by default.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Linux incorporates a sequence of built-in security defenses (UEFI Secure Boot, Linux Kernel Lockdown, SELinux, AppArmor MAC)<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Private VPN server<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Privately hosted VPN eliminates the risks on public VPN servers (especially that you do not need to trust them)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Provides encrypted traffic tunnels even through open public networks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Single sign-on authentication<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Less latency compared to a traditional VPN.<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">DNS-over-HTTPS server<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">DNS queries over HTTPS protect you from leaking information to your internet provider<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Encrypts the DNS traffic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Prevents from man-in-the-middle infiltrations<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Private app repository server<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Runs a private built-in app repository with a curated selection of apps.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Lineup management<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Arranged list of pre-approved trusted applications.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Applications installation executions<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Attestation Server<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Provides the relevant backend infrastructure for the auditor app.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Substantial authentication of the remote device and its software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">Remote wipe-out integration supported &#8211; can be executed automatically at attestation failure.<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Audit Server &#8211; a secure and powerful multitasking server with multiple activities in recording and active monitoring.<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Automatic audit logs &#8211; continuously structuring and recording all events across the infrastructure and on devices. Reporting log data &#8211; automatic and on demand.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Automatic executions of testing sessions on schedule. Internal testing system developed in order to frequently perform security checks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Monitoring and analytics &#8211; statistical data over the infrastructure activity is collected, monitored for patterned biases\u00a0 and summarized. Summarizations are automatically sent to responsible administrator users within the community.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><span style=\"font-weight: 400;\">MDM (Mobile Device Management) &#8211; a<\/span><span style=\"font-weight: 400;\">\u00a0secure device management platform for closed private networks that brings multiple safety features:<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">A security-oriented and customizable device management platform for closed private networks that brings multiple safety features.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Keeping apps up-to-date remotely (push)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Collecting log files on the server<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Data passes only through HTTPS protocol, thus cannot be accessed by third parties<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Integration with the attestation service<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Remote wipe-out &#8211; a security feature that provides the ability to remotely erase data. It can generally be used if a device has been stolen or lost, ensuring that the information on it can never be accessed by others.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Remote password change<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">VPN management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Continuous device audit logging<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Trusted CA certificates management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Wi-Fi management:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">SSID<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Security Policy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Credentials<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Application Library frequent updates<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"4\"><span style=\"font-weight: 400;\">Password expiration time.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row pdecor=&#8221;Both&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663762515957{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;scrollme&#8221; el_id=&#8221;applications-simple&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;scrollme&#8221;][titlesimple title=&#8221;Built-in Applications&#8221;][\/titlesimple][\/vc_column_inner][\/vc_row_inner]\n\t\t\t\t<div class=\"optionsBox col-lg-12 col-md-12 col-sm-12 col-xs-12 clearfix\">\n\t\t\t\t\t<div class=\"centerPhone col-lg-4 col-md-4 col-sm-4 col-xs-12 text-center\">\n\t\t\t\t\t\n  <div class=\"effect_box \n\t\t\t  effect_box_translate \n\t\t\t  animateme\"\n\t\t\t   data-when=\"view\" \n\t\t\t   data-from=\"0.65\"\n\t\t\t    data-to=\"0.15\" \n\t\t\t\tdata-translatey=\"400\" >\n  \n\t\t<img class=\"wow bounceIn\" src=\"https:\/\/www.3-t.ch\/wp-content\/uploads\/2022\/09\/phone-1-514x1024.png\" alt=\"Itemoptions\" data-wow-delay=\"0.3s\" >\n\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<ul class=\"optionsList pageRow\">\n\t\t\t\t\t\t\n\t\t\t<li class=\"pull-left col-lg-4 col-md-4 col-sm-4 col-xs-12 clear\">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.45\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"-400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeIn\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa ttt-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-left blueTxtColor\">3T<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-left\"><span style=\"font-weight: 400;\">The ultimate security communication channel for voice calls and text messaging<\/span><\/span>\n\t\t\t\t\t<span class=\"option-dots\"><\/span>\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\n\t\t\t<li class=\"pull-right col-lg-4 col-md-4 col-sm-4 col-xs-12 \">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.45\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeInRight\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa auditor-app-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-right blueTxtColor\">Auditor app<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-right\"><span style=\"font-weight: 400;\">A remote validating service that ensures the integrity and the authenticity of firmware and the entire Operating System<\/span><\/span>\n\t\t\t\t\t<span class=\"option-dots\"><\/span>\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\n\t\t\t<li class=\"pull-left col-lg-4 col-md-4 col-sm-4 col-xs-12 clear\">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.65\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"-400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeIn\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa vanadium-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-left blueTxtColor\">Privacy-oriented browser<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-left\"><span style=\"font-weight: 400;\">\u00a0The security focused web browsing<\/span><\/span>\n\t\t\t\t\t<span class=\"option-dots\"><\/span>\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\n\t\t\t<li class=\"pull-right col-lg-4 col-md-4 col-sm-4 col-xs-12 \">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.65\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeInRight\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa fair-mail-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-right blueTxtColor\">Email client<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-right\"><span style=\"font-weight: 400;\">Fully featured, recognized to be especially focused on the security and the privacy in communications<\/span><\/span>\n\t\t\t\t\t<span class=\"option-dots\"><\/span>\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\n\t\t\t<li class=\"pull-left col-lg-4 col-md-4 col-sm-4 col-xs-12 clear\">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.85\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"-400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeIn\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa app-marketplace-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-left blueTxtColor\">App repository<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-left\"><span style=\"font-weight: 400;\">A custom tailored and reliable source of applications<\/span><\/span>\n\t\t\t\t\t\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\n\t\t\t<li class=\"pull-right col-lg-4 col-md-4 col-sm-4 col-xs-12 \">\n\t\t\t\n\t\t\t\t <div class=\"effect_box \n\t\t\t  effect_box_opacity\n\t\t\t  animateme\"\n\t\t\t   data-when=\"span\"\n\t\t\t   data-opacity=\"0\"\n\t\t\t   data-from=\"0.85\"\n\t\t\t    data-to=\"0.10\"\n\t\t\t\tdata-translatex=\"400\" >\n\t\t\t\t\n\t\t\t\t<div class=\"options-item wow fadeInRight\" data-wow-delay=\"0.3s\">\n\t\t\t\t\t<div class=\"circle smallCircle\">\n\t\t\t\t\t\t<span><i class=\"fa app-locker-icon customColor\"><\/i><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<h4 class=\"options-name ralewayBolder text-uppercase text-right blueTxtColor\">App locker<\/h4>\n\t\t\t\t\t<span class=\"options-desc robotoMedium text-right\"><span style=\"font-weight: 400;\">Powerful and easy to use app locker for Android with various options for setting passwords on different apps<\/span><\/span>\n\t\t\t\t\t\n\t\t\t\t<\/div>\t\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/li>\n\t\t\t\n\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;2848&#8243; ptextcolor=&#8221;White&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663765252381{padding-top: 190px !important;padding-bottom: 40px !important;background-color: #05c3f9 !important;}&#8221; pbgslides=&#8221;&#8221; el_id=&#8221;applications-detailed&#8221;][vc_column][titleblock title=&#8221;About the applications&#8221; icon=&#8221;fa-cubes&#8221; color=&#8221;white&#8221;]Learn a little more about our applications[\/titleblock][carousel_reviews controls=&#8221;full-width-slider-controls-right&#8221; disable_carousel=&#8221;1&#8243;][carousel_review image=&#8221;2826&#8243; title=&#8221;3T&#8221; short_desc=&#8221;Invulnerable communication channel&#8221;]<span style=\"font-weight: 400;\">3T is a customized application that provides users with safe communications achieving the highest possible levels of privacy. This is assured by an advanced cryptographic protocol combining two of the most powerful encryption methods &#8211; the <\/span><b>Double Ratchet algorithm<\/b><span style=\"font-weight: 400;\"> and a <\/span><b>triple Elliptic-curve Diffie\u2013Hellman (3-DH) handshake<\/b><span style=\"font-weight: 400;\">. The communication channel is arranged on a closed infrastructure. The logistics of the conversations &#8211; calls and texts,\u00a0 are processed by private servers and the information is only spread within the community and never outside of it.<\/span>[\/carousel_review][carousel_review image=&#8221;2892&#8243; title=&#8221;Auditor app&#8221; short_desc=&#8221;OS integrity validation&#8221;]<span style=\"font-weight: 400;\">Through a specialized Auditor app that monitors the device state and its configurations by performing sanity checks on schedule, the remote attestation service significantly upscales the degree of safety and reliability of the communications and the private data storage.<\/span>[\/carousel_review][carousel_review image=&#8221;2877&#8243; title=&#8221;Privacy-oriented browser&#8221; short_desc=&#8221;Secure web browsing&#8221;]<span style=\"font-weight: 400;\">\u0410 privacy and security hardened variant of Chromium. It adopts and effectively integrates the security feature of GrapheneOS thereby\u00a0 providing users with safe browsing across the internet.<\/span>[\/carousel_review][carousel_review image=&#8221;2895&#8243; title=&#8221;Email client&#8221; short_desc=&#8221;Privacy-focused application&#8221;]The application comes with some advanced features in regards of safety: Encryption and decryption backed (OpenPGP and S\/MIME); Mechanism for recognising and disabling tracking images; Failed authentication warnings; No advertisements , no analytics and no tracking (error reporting is opt-in); No Google backup; No data storage on third party servers; Using open standards (IMAP, SMTP, OpenPGP, S\/MIME, etc); Safe message view (styling, scripting and unsafe HTML removed); No special permissions required; Confirm showing images, opening links and attachments to prevent tracking and phishing; Convert messages to a phishing preventing format.[\/carousel_review][carousel_review image=&#8221;2879&#8243; title=&#8221;App repository&#8221; short_desc=&#8221;Reliable source of applications&#8221;]<span style=\"font-weight: 400;\">A private built-in app store that offers only secure and trusted applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">100% prevention against malicious apps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Continuous support.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Frequent updates.<\/span>[\/carousel_review][carousel_review image=&#8221;2876&#8243; title=&#8221;App locker&#8221; short_desc=&#8221;Keeping your apps intangible&#8221;]<span style=\"font-weight: 400;\">Password protected privacy on any application.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Various options for lock up: PIN, password, pattern, knock code.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prevents unauthorized access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Provides an additional layer of security on your phone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Inability for software uninstallation so the protection cannot be just removed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Integration with the remote wipe-out supported. The service can be performed after predefined number password failures.<\/span>[\/carousel_review][\/carousel_reviews][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][rev_slider_vc alias=&#8221;slider1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pdecor=&#8221;Top&#8221; pdecor_reverse=&#8221;reverse&#8221; scroller=&#8221;scroller&#8221; css=&#8221;.vc_custom_1663762080381{padding-top: 75px !important;padding-bottom: 100px !important;background-color: #f7f7f7 !important;}&#8221; el_id=&#8221;platform-features&#8221;][vc_column][titlesimple title=&#8221;Platform Features&#8221;][\/titlesimple][vc_column_text el_class=&#8221;sectionSubHead customBgColor padded whiteColor&#8221;] 3T is an uncompromising platform in terms of security and privacy. It is also very flexible, so different layers and settings can be selected and configured on demand. This makes it possible to meet [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"fullwidth.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/pages\/1791"}],"collection":[{"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.3-t.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1791"}],"version-history":[{"count":98,"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/pages\/1791\/revisions"}],"predecessor-version":[{"id":2931,"href":"https:\/\/www.3-t.ch\/index.php?rest_route=\/wp\/v2\/pages\/1791\/revisions\/2931"}],"wp:attachment":[{"href":"https:\/\/www.3-t.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}