• Wiretap protection

  • Regulatory compliance

  • Encryption key control

  • Self-destruct timer

  • SDNP protocol

  • Wiretap Identity verification

  • On-device encryption

  • TETRA over IP calls

  • Stealth mode