Over The Air

It is as easy as a child’s game to acquire and configure specialized devices that mimic a base station in order to divert all cellular data traffic through it.

Operator tapping

Operators and most VoIP solutions utilize the use of servers to transmit data betweeen users and this data gets logged, catalogued and stored for all intentional purposes. Whether if it is for analytical purposes or illegally providing it to any third parties, this is the most common breach

Malware & Bugs

Though very few successful attempts have been documented, it is possible for a virus to take over a phone turning it into a listening device for even conversations that are happening around it rather than through it.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you.

Read more

Public Hacker Challenge with $500,000 reward
since December 2012.

Including external ethical hacker penetration services, and public hacker challenge there has been NO breaches.

The rule is simple: You must intercept the conversation through two Lockfone applications,
record it, decrypt it and submit the two files to win the hacker challenge.

(No jailbroken or rooted devices allowed)

Try / Buy