7 Monitored Signals
Cellular network, GPS, Wi-Fi, SIM, real internet connectivity, location age, accuracy. Checked every 2 seconds, 24 hours a day.
Your phone protects itself. When it detects theft, it destroys the master key in the security chip — making your data unrecoverable.
Photos, messages, passwords, banking apps. In case of theft, a 4-digit PIN is all that stands between the criminal and your data. Most smartphones offer no active protection — they passively wait for you to take action.
Zeroize monitors 7 risk signals in real time. When multiple signals point to a theft scenario, it acts on its own: it destroys the master cryptographic key stored in the security chip (TEE/StrongBox). Without the key, the data cannot be recovered — not even by forensic tools like Cellebrite.
No button to press. No remote command to send. The device protects itself, the instant it needs to.
Zeroize does not depend on human action. Each step happens autonomously, with multiple verification layers to prevent false positives.
7 signals monitored every 2 seconds. Cellular network, GPS, Wi-Fi, SIM, real internet, location age, accuracy.
30-second debounce with 3 confirmations. Hysteresis: restored signal cancels suspicion. Anti-false-positive engine eliminates benign scenarios.
Countdown timer. The owner has time to authenticate with PIN (PBKDF2-SHA256, 310k iterations) or Class 3 biometrics. Failure triggers next step.
Master key destroyed in TEE/StrongBox. 3 random passes + 1 zeros. Database, SharedPreferences, cache, clipboard — all overwritten.
Each feature was designed for a real-world threat scenario. No marketing gimmicks — verifiable cryptography, irreversible destruction, zero dependency on remote servers.
Cellular network, GPS, Wi-Fi, SIM, real internet connectivity, location age, accuracy. Checked every 2 seconds, 24 hours a day.
30-second debounce with 3 consecutive confirmations. Hysteresis: a restored signal cancels the suspicion. The subway does not trigger a wipe.
AES-256-GCM keys stored in TEE/StrongBox. Instant, unrecoverable destruction — not even Cellebrite can extract data without the key.
3 random passes + 1 zeros. Database, SharedPreferences, cache, clipboard. Nothing survives.
A fake dashboard displayed to the attacker while the wipe executes in the background. Visually identical to the real app. Undetectable.
PBKDF2-SHA256 with 310,000 iterations. Class 3 biometrics. Constant-time comparison against timing attacks.
Normal, Suspicion, Countdown, Authentication, Protection, Panic, and recovery states. Deterministic transitions, zero ambiguity.
14 Brazilian banks pre-configured. Concealment and restoration reversible with authentication. The criminal does not know they exist.
23 event types recorded. Logs encrypted with AES-256-GCM. Exportable for forensic analysis by the owner.