ConCom delivers cryptographic security entirely in hardware — beyond the reach of compromised operating systems, third-party jurisdictions, and cloud providers. Compatible with existing iPhones and Windows systems.
USB crypto module for Windows workstations. Plug-and-play. Full key management in hardware. No installation required.
Windows · USB-A
Secure case with integrated crypto chip for iPhone (iOS 14+). USB-C pass-through. The iOS interface remains fully intact.
iPhone · iOS 14+The Problem
WhatsApp and Signal encrypt within iOS or Windows. That means your security is only as strong as your operating system — and the vendor behind it.
WhatsApp and Signal encrypt within iOS or Windows. A compromised OS gives an attacker direct access to keys and plaintext — regardless of encryption strength.
Cloud-based platforms are subject to their host provider's legal jurisdiction. Access to communication data can be compelled by external authorities — potentially without notification to end users or their organisations.
Platforms log who communicates with whom, when, and how frequently. For defence and intelligence operations, this pattern data has direct operational value to adversaries.
The Solution
ConCom moves cryptographic control out of the operating system and into dedicated hardware — while keeping the familiar devices your staff already use.
For Windows
Physical crypto module for Windows workstations. Plug-and-play, no installation required.
For iPhone
Secure case with integrated crypto chip for iPhone (iOS 14+). No OS modifications required.
Comparison
Most secure messaging tools still rely on the operating system. ConCom does not.
| Feature | WhatsApp / Signal | ConCom |
|---|---|---|
| Encryption location | Within the OS — vulnerable if OS is compromised | Dedicated hardware, fully outside the OS |
| Key management | By app vendor or operating system | Fully under organisational control |
| Legal jurisdiction | Subject to platform provider's jurisdiction | Under full organisational control |
| Metadata | Accessible to platform provider | Minimised — no external exposure |
| Server infrastructure | Cloud-hosted by vendor — no control | Self-hosted on your own hardware |
| Existing devices | Yes | Yes — no device migration required |
| Adoption barrier | Low | Low — unchanged iOS/Windows experience |
Architecture Principles
Every design decision in ConCom flows from the same goal: keep cryptographic control inside your perimeter.
Key management and encryption occur exclusively within the ConCom module. The OS acts only as a transport layer with no access to plaintext or keys.
Servers process only encrypted data. There is no point in the infrastructure where a third party can intercept readable messages.
Communication flows through the physical crypto module. No usable metadata is available to external platforms or infrastructure operators.
Self-Hosted Deployment
ConCom's server component runs entirely within your own perimeter — on air-gapped networks, classified environments, or forward operating positions.
The ConCom server runs on any ARM or x86 hardware. A Raspberry Pi 4 (4 GB) is sufficient for up to 50 concurrent users. A standard NUC or rack unit scales to enterprise deployments.
The server operates fully offline. Crypto keys never leave your perimeter. Suitable for classified networks, SCIFs, and forward-deployed environments with no internet connectivity.
Docker-based deployment with a single configuration file. No specialised IT infrastructure required. Setup time under 30 minutes on supported hardware.
| Minimum hardware | Raspberry Pi 4 · 4 GB RAM · 32 GB storage |
|---|---|
| Recommended | Intel NUC / any x86-64 server · 8 GB RAM · SSD |
| Operating system | Linux (Debian / Ubuntu) — ARM64 or x86-64 |
| Deployment | Docker Compose — single command install |
| Network | LAN / VLAN / air-gapped — no internet required |
| Concurrent users | Up to 50 on Raspberry Pi 4 · 500+ on NUC-class hardware |
No Disruption
A common barrier to secure communication adoption is resistance to change. Staff who switch to unfamiliar systems reduce operational effectiveness in practice — and bypass secure tools when ease of use is lacking.
ConCom is designed to remove this barrier entirely. Staff retain the familiar iOS interface and Windows environment they already use.
Staff continue using their existing iPhones and Windows workstations. No migration. No unfamiliar hardware to learn.
The iOS and Windows interfaces are completely unchanged. Security is added invisibly at the hardware level.
Fully self-hosted. No cloud vendor. No external back-end. No jurisdiction risk. Fully yours.
Contact
Request a demo or reach out to discuss your organisation's requirements. We work with government bodies, defence organisations, and critical infrastructure operators.