RUon runs on a StealthCrypto® phone.

The first phone with security in mind to guarantee the total privacy of communications and ensure no data breaches are possible.

RUon App on mobile device

A StealthCrypto® Phone encrypts your communication with cryptographic protocols to send and receive emails, chat, and make calls without ever worrying about your privacy.

The StealthCrypto® Phone encrypts your communication with cryptographic protocols to send and receive emails, chat, and make calls without ever worrying about your privacy.

The full disk split encryption, securing your data, files, operating system, and software programs, ensures that even if the StealthCrypto® Phone gets in the wrong hands, no information can be extracted.

The StealthCrypto® OS have developed for our mobile solutions, has a location tracking feature rooted out making it impossible to localize the device.

Our mobile solutions have an IMSI catcher detector that detects suspicious cellular activity and stingray devices and alerts you right away to ensure no wiretapping attempt can succeed.

StealthCrypto® OS is designed with a state of the art, multi-layered military-grade protection and end to end encryption, to make data breaches practically impossible.

StealthCrypto®

The First Secure - Safe - Healthy Phone
Phone Live Streaming
The StealthCrypto® phone’s hardware is specially selected with security in mind to guarantee the total privacy of communications and ensure no data breaches are possible, whilst preserving the core functionalities users expect from a smartphone.
This device comes with high performance hardware you can enable or disable through its administration system. Furthermore, it has a locked bootloader that makes any attempt to adjust the phone to automatically wipe all information from it, This ensures an additional security level protecting users from any attempts to manually extract information.
RUon Phone App

Self-Forming Quantum Mesh Networks

Ad-hoc wireless mesh networks with multi hop functionality. This is one of the key network technologies that solve the "last mile" problem, bridging the gap between nodes that are just out of range (Node B acts as an incentivized 'bridging channel' for Nodes A and C to communicate and transfer data with each other).

Token Incentives.

When someone connects and transmits data through the mesh network, established via StealthCrypto® technology, the contributor of the node that the data passes through will be rewarded with a proportionate amount of QMN.

RUon Phone App

EMF Protection - protect yourself from mobile device radiation

The StealthCrypto® phone builds in every phone EMF protections for a safe, secure and healthy phone. Backed by FCC certified lab testing, and becoming a leader in EMF radiation protection for mobile devices.

RUon Phone App

Electromagnetic (EM) fields from cellular phones were shown to have a statistically significant detrimental effect on the recovery of human DNA after heat shock. This effect was observed with cellular phones (CP) placed on standby mode when they are emitting relatively weak EM fields and after only minutes of EM field exposure. The detrimental effect of EM energy from cellular phones are completely neutralized on a StealthCrypto® phone with its EMF technology. The first in the world.

RUon Phone App

Mechanics

StealthCrypto® can establish a distributed network connectivity worldwide, regardless of existing internet access or infrastructure by serving as primary nodes in local Mesh networks.

Quantum Mesh networks , users communicate with each other via P2P and P2P multi hop modes, making the networks more robust, stable and private than standard internet network experiences.

Mobile phones and IoT devices become terminal nodes in Quantum mesh networks and rely on the networks for information exchanges.

Device Characteristics

Vulnerability-free OS

Modified Kernel

The Secure OS kernel has been modified to allow users to disable hardware (USB, Bluetooth, camera, etc.) by removing its drivers from the device.

Blockchain Features

Built-in cold storage Qubit wallet which supports major cryptocurrencies, tokens, Qubit Exchange, P2P and decentralized.

Locked Bootloader

In a mesh networking Quantum mesh network, each node acts as a router/repeater for other nodes in the network. Connecting to Wi-Fi, Bluetooth or optional connections. Decentralized communications.

Mesh Networking

In a Quantum mesh network , each node acts as a router/repeater for other nodes in the network. Connecting to Wi-Fi, Bluetooth or optional connections. Decentralized communications.