Hardware-Rooted · Fully Self-Hosted · No Cloud Dependency

Sovereign communications.
Outside the OS.
Under your control.

ConCom delivers cryptographic security entirely in hardware — beyond the reach of compromised operating systems, third-party jurisdictions, and cloud providers. Compatible with existing iPhones and Windows systems.

ConCom Key – USB crypto module

ConCom Key

USB crypto module for Windows workstations. Plug-and-play. Full key management in hardware. No installation required.

Windows · USB-A
ConCom Case – iPhone crypto case

ConCom Case

Secure case with integrated crypto chip for iPhone (iOS 14+). USB-C pass-through. The iOS interface remains fully intact.

iPhone · iOS 14+
Hardware
Encryption outside the OS
< 30 min
Server setup time
Air-gap
Compatible — no internet required
Zero
Third-party cloud dependency

Structural dependency on
third-party platforms

WhatsApp and Signal encrypt within iOS or Windows. That means your security is only as strong as your operating system — and the vendor behind it.

The OS is the weakest link

WhatsApp and Signal encrypt within iOS or Windows. A compromised OS gives an attacker direct access to keys and plaintext — regardless of encryption strength.

Third-party jurisdiction & data control

Cloud-based platforms are subject to their host provider's legal jurisdiction. Access to communication data can be compelled by external authorities — potentially without notification to end users or their organisations.

Metadata exposure

Platforms log who communicates with whom, when, and how frequently. For defence and intelligence operations, this pattern data has direct operational value to adversaries.

Two form factors. One platform.

ConCom moves cryptographic control out of the operating system and into dedicated hardware — while keeping the familiar devices your staff already use.

ConCom Key For Windows

ConCom Key

Physical crypto module for Windows workstations. Plug-and-play, no installation required.

  • Full key management in hardware
  • Compatible with all Windows systems
  • No new device or retraining required
  • Keys never leave the hardware module
  • OS acts only as a transport layer
ConCom Case For iPhone

ConCom Case

Secure case with integrated crypto chip for iPhone (iOS 14+). No OS modifications required.

  • Crypto chip via USB-C pass-through
  • Familiar iOS interface remains fully intact
  • No new device ecosystem required
  • No migration, no adoption barrier
  • Supports iOS 14 and later

ConCom vs. software-based solutions

Most secure messaging tools still rely on the operating system. ConCom does not.

Feature WhatsApp / Signal ConCom
Encryption location Within the OS — vulnerable if OS is compromised Dedicated hardware, fully outside the OS
Key management By app vendor or operating system Fully under organisational control
Legal jurisdiction Subject to platform provider's jurisdiction Under full organisational control
Metadata Accessible to platform provider Minimised — no external exposure
Server infrastructure Cloud-hosted by vendor — no control Self-hosted on your own hardware
Existing devices Yes Yes — no device migration required
Adoption barrier Low Low — unchanged iOS/Windows experience

Built on three uncompromising principles

Every design decision in ConCom flows from the same goal: keep cryptographic control inside your perimeter.

Hardware isolation

Key management and encryption occur exclusively within the ConCom module. The OS acts only as a transport layer with no access to plaintext or keys.

End-to-end in hardware

Servers process only encrypted data. There is no point in the infrastructure where a third party can intercept readable messages.

Metadata minimisation

Communication flows through the physical crypto module. No usable metadata is available to external platforms or infrastructure operators.

On-premise. Any scale.

ConCom's server component runs entirely within your own perimeter — on air-gapped networks, classified environments, or forward operating positions.

Minimal footprint

The ConCom server runs on any ARM or x86 hardware. A Raspberry Pi 4 (4 GB) is sufficient for up to 50 concurrent users. A standard NUC or rack unit scales to enterprise deployments.

Air-gap compatible

The server operates fully offline. Crypto keys never leave your perimeter. Suitable for classified networks, SCIFs, and forward-deployed environments with no internet connectivity.

Simple administration

Docker-based deployment with a single configuration file. No specialised IT infrastructure required. Setup time under 30 minutes on supported hardware.

Minimum hardwareRaspberry Pi 4 · 4 GB RAM · 32 GB storage
RecommendedIntel NUC / any x86-64 server · 8 GB RAM · SSD
Operating systemLinux (Debian / Ubuntu) — ARM64 or x86-64
DeploymentDocker Compose — single command install
NetworkLAN / VLAN / air-gapped — no internet required
Concurrent usersUp to 50 on Raspberry Pi 4 · 500+ on NUC-class hardware

The iPhone stays the iPhone.
The security becomes sovereign.

A common barrier to secure communication adoption is resistance to change. Staff who switch to unfamiliar systems reduce operational effectiveness in practice — and bypass secure tools when ease of use is lacking.

ConCom is designed to remove this barrier entirely. Staff retain the familiar iOS interface and Windows environment they already use.

"Digital sovereignty is not optional — it is an operational requirement."

No new device ecosystem

Staff continue using their existing iPhones and Windows workstations. No migration. No unfamiliar hardware to learn.

No retraining required

The iOS and Windows interfaces are completely unchanged. Security is added invisibly at the hardware level.

No third-party dependency

Fully self-hosted. No cloud vendor. No external back-end. No jurisdiction risk. Fully yours.

Ready to take control of your communications?

Request a demo or reach out to discuss your organisation's requirements. We work with government bodies, defence organisations, and critical infrastructure operators.

info@concom.eu
concom.eu