Category Archives: News

image_pdfimage_print

Kevin Mitnick’s Password Hacking with Hashtopolis

Kevin Mitnick and his Hashtopolis: The Ultimate Password Cracking Tool


password hacking with Hashtopolis by Jacques gascuel
This article will be updated with any new information on the topic, and readers are encouraged to leave comments or contact the author with any suggestions or additions.
Related topic : ******

How Kevin Mitnick hacked passwords with Hashtopolis

Learn about password hacking using Hashtopolis, a powerful tool that can crack any hash in minutes using multiple machines equipped with GPUs. Famous hacker Kevin Mitnick used it to demonstrate the tool’s capabilities. Discover the advantages and disadvantages of using such a tool, as well as ethical and legal implications of password hacking. Get tips on how to protect your online accounts with strong passwords. Keep reading to find out more!

2024 Articles Cardokey EviSwap NFC NDEF Technology GreenTech Technical News

NFC vCard Cardokey: Revolutionizing Digital Networking

2024 Crypto Currency Cryptocurrency Cyberculture Legal information

EU Sanctions Cryptocurrency Regulation: A Comprehensive Overview

2024 DataShielder Digital Security PassCypher Phishing

Midnight Blizzard Cyberattack Against Microsoft and HPE: What are the consequences?

2024 Cyberculture Legal information

Encrypted messaging: ECHR says no to states that want to spy on them

2024 Articles Digital Security News

BitLocker Security: Safeguarding Against Cyberattacks

2024 Articles Digital Security News Spying

How to protect yourself from stalkerware on any phone

2024 Articles Cyberculture EviPass Password

Human Limitations in Strong Passwords Creation

Password hacking tool: how it works and how to protect yourself

Password hacking is a practice that consists of finding the secret code that protects access to an account or a file. There are specialized tools to perform this operation, such as the one used by Mitnick Security Consulting. In this article, we will present the features of this tool, its advantages and disadvantages, as well as the ways to protect yourself from password hacking.

Introduction

Password hacking is a practice that consists of finding the secret code that protects access to an account or a file. It can be done for various purposes, such as testing the security of a system, recovering a forgotten password, or stealing personal or professional data.

There are specialized tools to perform password hacking, such as the one used by Mitnick Security Consulting. This company is led by Kevin Mitnick, a famous hacker who was arrested in 1995 for hacking dozens of computer systems, including those of the Pentagon, NASA and FBI. Today he has become a security expert and consultant who helps companies protect themselves from cyberattacks.

The main purpose of this article is to present the features, advantages and disadvantages of the password hacking tool used by Mitnick Security Consulting, as well as the ways to protect yourself from password hacking. We will first explain how the tool uses a large number of GPUs to speed up the hacking process. Then we will discuss the benefits and drawbacks of using such a tool in terms of energy consumption and privacy concerns. Next we will address the ethical and legal implications of password hacking. After that we will summarize some user reactions to password hacking. Finally we will provide some tips on how to protect your online accounts with strong passwords.

Features of the password hacking tool

The password hacking tool used by Mitnick Security Consulting uses a large number of GPUs to speed up the hacking process. According to the information shared by Mitnick, the tool uses 24 GPU 4090s and 6 GPU 2080s, all clustered and running with Hashtopolis. This allows the tool to hack passwords at an impressive speed, reaching 6.2 trillion per second for NTLM (New Technology LAN Manager).

Hashtopolis is an open source software that allows to distribute the password hacking work across multiple machines equipped with GPUs. It uses a web interface to manage the agents, tasks and passwords found. It supports several types of hashes, such as NTLM, MD5, SHA1, SHA256, SHA512, WPA/WPA2 and even BitLocker.

A hash is a mathematical function that transforms a password into a random string of characters. For example, the password “password” hashed with MD5 would be “5f4dcc3b5aa765d61d8327deb882cf99”. Hashing is used to store passwords securely without revealing them in plain text.

To crack a password, one has to find the original password that corresponds to a given hash. This can be done by using different methods, such as bruteforce, dictionary or mask.

Bruteforce is a method that tries all possible combinations of characters until finding the right one. For example, if the password is four digits long, it would try 0000, 0001, 0002… until 9999.

Dictionary is a method that tries words from a predefined list or a common language dictionary. For example, if the password is a word in English, it would try apple, banana, carrot… until finding the right one.

Mask is a method that tries combinations based on a known pattern or structure. For example, if the password is composed of two words separated by an underscore (_), it would try word_word, name_name… until finding the right one.

Advantages and disadvantages of the password hacking tool

The use of such a tool has advantages and disadvantages. On one hand, it allows the company to quickly test the security of the passwords used by its clients and detect vulnerabilities. This can help prevent unauthorized access and data breaches. It can also help users improve their password habits and choose stronger passwords.

On the other hand, it consumes a considerable amount of energy and generates heat. This can have a negative impact on the environment and increase the carbon footprint of the company. It can also raise privacy concerns, as the tool can be used for malicious purposes, such as hacking online accounts or sensitive data. This can result in identity theft, industrial espionage or sabotage.

It is important to note that even with such a powerful tool, there are limits to what can be achieved in terms of password hacking. Long and complex passwords, stored using secure hashing algorithms such as bcrypt or PBKDF2, can be very difficult to hack even with powerful tools. These algorithms use a large number of iterations to significantly slow down the hashing process, making brute force hacking much more difficult.

In addition to the number of iterations, these algorithms have other features that make them more resistant to GPU or specialized hardware attacks. Bcrypt uses an encryption function based on Blowfish, which is designed to be costly in memory and random access. This makes it difficult to parallelize bcrypt on multiple GPUs. PBKDF2 uses an internal hash function, such as SHA-256 or SHA-512, which can be optimized for GPUs, but which also requires a lot of calculations. This makes the cost of the attack proportional to the number of iterations. According to a 2015 study, it would take about 4 days to crack an 8-character alphanumeric password with bcrypt and 10 iterations, compared to about 5 hours with PBKDF2 and 10,000 iterations.

Ethical and legal implications of password hacking

The use of such a powerful password hacking tool raises ethical and legal questions. On one hand, it can serve to strengthen the security of computer systems by demonstrating their vulnerability and encouraging users to choose stronger passwords. This can be seen as a form of ethical hacking or penetration testing, which aims to improve the security of a system by finding and reporting its weaknesses.

On the other hand, it can be used for malicious purposes, such as hacking online accounts or sensitive data. This can be seen as a form of illegal hacking or cybercrime, which aims to harm or exploit a system by exploiting its weaknesses.

Therefore, some ethical and legal rules must be respected when using a password hacking tool. For example:

  • The tool should only be used with the consent and authorization of the owner or administrator of the system.
  • The tool should only be used for legitimate purposes, such as testing the security of passwords or recovering a forgotten password.
  • The tool should not be used to access or disclose confidential or personal information without permission.
  • The tool should not be used to cause damage or disruption to the system or its users.

To give you an idea of how long it would take to crack a password using high-performance GPUs, a machine equipped with eight RTX 4090 GPUs, the most powerful on the market today and very popular among gamers and creators, could go through all possible combinations of an 8-character password in just 48 minutes using brute force methods. For comparison, it would take about 3 hours and 20 minutes with eight RTX 3090 Ti GPUs.

User reactions to password hacking

Kevin Mitnick’s post sparked many positive comments from computer security experts, who praised the power and speed of his password hacking tool. Some even asked for technical details on how Hashtopolis works and what types of hashes it can crack.

For example, one comment said: “This is amazing! I would love to see how Hashtopolis works and what kind of hashes it can crack. Can you share some screenshots or videos of the tool in action?”

Another comment said: “Wow, this is impressive! I wonder how long it would take to crack a password with bcrypt or PBKDF2 using this tool. Do you have any benchmarks or comparisons?”

However, some negative comments from Internet users also expressed concerns about the environmental impact and privacy issues of password hacking.

For example, one comment said: “This is terrible! Do you realize how much electricity and heat this tool consumes? You are contributing to global warming and climate change with your irresponsible hacking. You should plant some trees or use renewable energy to offset your carbon footprint.”

Another comment said: “This is scary! How can we trust you with our passwords and data? You could hack into our accounts or steal our information without our consent. You are violating our privacy and security with your unethical hacking. You should respect the law and the rights of others.”

In conclusion

The new password hacking tool used by Mitnick Security Consulting is impressive in terms of power and speed. It can crack passwords at an astonishing rate, reaching 6.2 trillion per second for NTML. It uses Hashtopolis, an open source software that allows to distribute the password hacking work across multiple machines equipped with GPUs. It supports several types of hashes and methods to crack them.

However, the use of such a tool also raises concerns about energy and privacy. It consumes a considerable amount of electricity and generates heat, which can have a negative impact on the environment. It can also be used for malicious purposes, such as hacking online accounts or sensitive data, which can result in identity theft, industrial espionage or sabotage.

As Internet users, it is important to be aware of the risks associated with weak passwords and use secure methods to protect our online accounts. Some tips to do so are:

  • Use long and complex passwords that contain letters, numbers and symbols.
  • Use a password manager to store and generate secure passwords.
  • Use a random password generator or a secret phrase that is easy to remember but hard to guess.
  • Use multi-factor authentication that requires a code sent by SMS or email to access an account.

Password hacking is a practice that can have positive or negative consequences depending on how it is used. It is therefore necessary to be vigilant and adopt good practices to protect ourselves from hackers like Kevin Mitnick.

I hope this article has helped you understand how password hacking works and how to protect yourself from it. If you want to learn more about password hacking, you can check out these sources:

  • Cracking Passwords at 7.25 TRILLION Hashes per second?
  • How Secure Is My Password?
  • How To Create A Strong Password

Sources :

(1) hash – What is the specific reason to prefer bcrypt or PBKDF2 over …. https://security.stackexchange.com/questions/133239/what-is-the-specific-reason-to-prefer-bcrypt-or-pbkdf2-over-sha256-crypt-in-pass.

(2) Password Storage – OWASP Cheat Sheet Series. https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html.

(3) Do any security experts recommend bcrypt for password storage?. https://security.stackexchange.com/questions/4781/do-any-security-experts-recommend-bcrypt-for-password-storage.

(4) Password Hashing: PBKDF2 (using sha512 x 1000) vs Bcrypt. https://stackoverflow.com/questions/4433216/password-hashing-pbkdf2-using-sha512-x-1000-vs-bcrypt.

ChatGPT on cybersecurity and system safety

ChatGPT Cybersecurity System Safety

ChatGPT is an AI chatbot for cybersecurity launched by OpenAI in November 2022. It is trained with RLHF and uses GPT-3.5 language models. ChatGPT can perform various tasks such as pentesting, fuzzing, shellcode generation, custom email creation or buffer overflow exploitation. ChatGPT can also help blue teams detect and prevent cyberattacks .

Preamble

to learn chatgpt

To learn

create with chatgpt

Create

have fun with chatgpt

Have fun

Get informed

Discuss

Test

collaborate with ChatGPT

Collaborate

explorer with ChatGPT

Explorer

improve with ChatGPT

Improve

Personalize

Prompt ChatGPT Openai white freemindtronic Andorra

Other

ChatGPT Cybersecurity

ChatGPT is an artificial intelligence tool that allows you to generate text from your inputs. You can use it to create content, learn new things, entertain yourself, or just chat. But to get the most out of ChatGPT, you need to know how to talk to it. That’s where prompts come in.

Prompts are short sentences or texts that you enter into ChatGPT’s interface to ask for a response or a continuation of the conversation. They serve to guide the AI to a response or continuation of the conversation that meets your expectations. By using well-formulated prompts, you can interact with ChatGPT effectively and get quality answers.

In this article, we will introduce you to the best prompts to exchange with ChatGPT on cybersecurity and safety of computer systems, phone systems, communication systems, information system, industrial system, home automation system. We’ve grouped them into 10 categories depending on the type of response or conversation you want to get. Whether you want to learn, create, have fun or get informed, here you will find the prompts you need.

1 – To learn

If you want to use ChatGPT as a learning tool about cybersecurity and systems safety, you can ask it to explain concepts, teach you skills, or help you solve problems. Here are some examples of prompts you can use to learn with ChatGPT:

  • Explain [cybersecurity or safety concept] to me as if I were 5 years old.
  • Teach me how to [apply a cybersecurity or safety measure or technique] step by step.
  • Help me solve this problem: [cybersecurity or safety scenario or case study].
  • What are the best resources for learning [cybersecurity or safety field or topic]?
  • What are the advantages and disadvantages of [cybersecurity or safety choice or solution]?
  • What is the difference between [term A] and [term B] when it comes to cybersecurity or safety?
  • How can I improve in [cybersecurity or safety field or topic]?
  • What are the pitfalls to avoid when [doing something related to cybersecurity or safety]?
  • What is the story of [cybersecurity or safety event or persona]?
  • What are the most interesting facts about [cybersecurity or safety field or topic]?

2 – Create

If you want to use ChatGPT as a cybersecurity and systems safety authoring tool, you can ask it to generate content, design items, or give ideas. Here are some examples of prompts you can use to create with ChatGPT:

  • Write a blog post on [cybersecurity or safety topic] using AIDA (Attention, Interest, Desire, Action) format.
  • Creates a catchy slogan for
    .
  • Give me 10 name ideas for new cybersecurity or safety software.
  • Draw me an architecture diagram for a secure or secure system.
  • Write a safety or security policy for [organization or project].
  • Compose a cybersecurity or safety incident alert or report.
  • Invents a cybersecurity or safety test or audit scenario for [system or application].
  • Creates an action or remediation plan for [cybersecurity or safety issue or vulnerability].
  • Write source code for [cybersecurity or safety feature or measure] using the [programming language].
  • Generates a secure or secure key or password.
  • Create a quiz or game on [cybersecurity or safety domain or topic].

4 – Have fun

If you want to use ChatGPT as an entertainment tool, you can ask it to make jokes, play games, or simulate characters. Here are some examples of prompts you can use to have fun with ChatGPT:

  • Tell me a joke on [topic].
  • Let’s play a game: I’m thinking of something and you have to guess what it is by asking me closed-ended questions (yes or no).
  • “Talk to me like you were [famous person].
  • Make me an imitation of [celebrity].
  • Invents a riddle on [subject].
  • What’s the funniest movie you’ve ever seen?
  • What’s the craziest thing you’ve ever done?
  • What is your wildest dream?
  • What is your favorite superpower and why?
  • What’s the best piece of advice you’ve ever received?
  • What is the most embarrassing thing that has happened to you?

3 – Get Informed

If you want to use ChatGPT as an information tool on cybersecurity and system safety, you can ask it to provide you with data, facts, or opinions on various topics. Here are some examples of prompts you can use to inform yourself with ChatGPT:

  • What is the current cyber threat situation in the world?
  • What are the latest news on [cybersecurity or safety topic]?
  • What is the best way to [protect, detect, respond] to [type of attack or incident]?
  • What are the best products or services for [cybersecurity or safety needs]?
  • What is the historical and future evolution of [cybersecurity or safety related field or topic]?
  • What are the benefits and risks of [cybersecurity or safety technology or trend]?
  • What is your opinion on [controversial topic related to cybersecurity or safety]?
  • What are the best books or movies on [genre or theme related to cybersecurity or safety]?
  • What are upcoming events in [domain or sector related to cybersecurity or safety]?
  • Who are the most influential people in [field or sector related to cybersecurity or safety]?

5 – Discuss

If you want to use ChatGPT as a tool for discussing cybersecurity and system safety, you can ask them to talk about themselves, their interests, or their emotions. Here are some examples of prompts you can use to chat with ChatGPT:

  • Tell me about yourself: who are you, what do you do, what do you like about cybersecurity or safety?
  • What are your hobbies or passions in cybersecurity or safety?
  • How do you feel today in terms of cybersecurity or safety?
  • What makes you happy or sad about cybersecurity or safety?
  • What are your cybersecurity or safety dreams or goals?
  • What scares or stresses you about cybersecurity or safety?
  • What makes you curious or fascinated about cybersecurity or safety?
  • What makes you laugh or cry when it comes to cybersecurity or safety?
  • What are your values or principles regarding cybersecurity or safety?
  • What are your strengths or weaknesses in cybersecurity or safety?

6 – Test

If you want to use ChatGPT as a cybersecurity and system safety testing tool, you can ask it to check your knowledge, skills, or personality. Here are some examples of prompts you can use to test with ChatGPT:

  • Give me a quiz on [cybersecurity or safety topic].
  • Assess my level of [cybersecurity or safety competency] by asking myself questions.
  • Analyzes my personality in terms of cybersecurity or safety by asking myself questions.
  • Correct my text on [topic related to cybersecurity or safety] by looking for errors or weaknesses.
  • Give me feedback on my [cybersecurity or safety related project or work].
  • Give me tips on how to improve in [area or topic related to cybersecurity or safety].
  • Give me a challenge in [field or topic related to cybersecurity or safety].
  • Compare my results with those of other users in terms of cybersecurity or safety.
  • Give me a grade on [cybersecurity or safety criterion].
  • Give me a reward or sanction based on my cybersecurity or safety performance.

7 – Collaborate

If you want to use ChatGPT as a collaboration tool on cybersecurity and systems safety, you can ask it to work with you on a project, task, or idea. Here are some examples of prompts you can use to collaborate with ChatGPT:

  • Help me [do something related to cybersecurity or safety] by giving me instructions or resources.
  • Work with me on [cybersecurity or safety project] giving me ideas or suggestions.
  • Participate in [cybersecurity or safety task] by giving me your opinion or feedback.
  • Create with me [something related to cybersecurity or safety] by giving me examples or models.
  • Join me in [cybersecurity or safety activity] by giving me encouragement or motivation.
  • Learn with me [something related to cybersecurity or safety] by giving me lessons or exercises.
  • Play [cybersecurity or safety game] with me by giving me strategies or tips.
  • Share with me [something related to cybersecurity or safety] by giving me information or facts.
  • Discuss [cybersecurity or safety topic] with me with arguments or opinions.
  • Trust me in [cybersecurity or safety situation] by giving me support or help.

8 – Explorer

If you want to use ChatGPT as an exploration tool on cybersecurity and system safety, you can ask it to introduce you to new topics, places, or people. Here are some examples of prompts you can use to explore with ChatGPT:

  • Let me know [cybersecurity or safety topic] by giving me an introduction or summary.
  • Show me around [place related to cybersecurity or safety] by giving me a description or map.
  • Let me meet [someone related to cybersecurity or safety] by giving me a biography or interview.
  • Take me on a journey back to [cybersecurity or safety era] by giving me historical or cultural context.
  • Let me dive into [cybersecurity or safety] by giving me a storyline or plot.
  • Make me dream of [cybersecurity or safety fantasy] by giving me a vision or a feeling.
  • Make me think about [cybersecurity or safety issue] by giving me a perspective or hypothesis.
  • Make me imagine [cybersecurity or safety situation] by giving me an example or simulation.
  • Make me experiment [something related to cybersecurity or safety] by giving me a challenge or opportunity.

9 – Improve

If you want to use ChatGPT as a cybersecurity and systems safety improvement tool, you can ask it to help you patch, develop, or optimize your writing, project, or strategy. Here are some examples of prompts you can use to improve with ChatGPT:

  • Correct my text on [topic related to cybersecurity or safety] by looking for errors or weaknesses. Make sentences clearer. [Paste your text].
  • Develop a cybersecurity or safety strategy for my [organization or project] using the [framework name] framework. Guide me through the steps of developing an effective strategy.
  • Creates catchy headlines for a blog post on [cybersecurity or safety topic]. Titles should be engaging, impactful and memorable. [Creates a number of titles].
  • Plan my day more efficiently by creating a list of priority tasks based on the following tasks: [List your cybersecurity or safety tasks].
  • Optimizes my security or safety configuration for my [system or application] using the [approach name] approach. Guide me through the optimization process.
  • Summarizes the most important lessons from the book [Book title related to cybersecurity or safety] in a comprehensive but digestible summary.
  • Help me break the writer’s block by writing me a plan for a detailed blog post on [cybersecurity or safety topic].
  • Help me design a conversion funnel for my [cybersecurity or safety related product or service] using the [frame name] framework. Guide me through the key elements of an effective funnel.
  • Help me set better goals for [personal or professional goal related to cybersecurity or safety] using the SMART framework. Creates specific, measurable, achievable, realistic and time-bound goals.
  • Help me develop a communication strategy for my [project or work related to cybersecurity or safety] using the RACE (Research, Action, Communication, Evaluation) template. Guide me through the steps of creating a strategy that inspires interest and trust.
  • Help me innovate and improve my [cybersecurity or safety related product or service] using the Jobs to Be Done framework. Identifies potential areas for improvement based on customer needs and wants.
  • Help me review and update my security or safety policy for [organization or project] using current best practices and standards. Guide me through the key points of an effective and compliant policy.

10 – Personalize

If you want to use ChatGPT as a customized cybersecurity and system safety tool, you can ask it to change its behavior, tone, or style according to your preferences. Here are some examples of prompts you can use to customize ChatGPT:

  • From now on, talk to me in [language].
  • From now on, use a [formal or informal] tone in your answers.
  • From now on, adapt your writing style to [target genre or audience].
  • From now on, be more [concise or detailed] in your answers.
  • From now on, always give me at least [number] of options or examples in your answers.
  • From now on, always cite your sources or references in your answers.
  • From now on, always use verified data or facts in your answers.
  • From now on, avoid sensitive or controversial topics in your answers.
  • From now on, respect my opinions or beliefs in your answers.
  • From now on, treat me as [relationship or status] in your answers.

Also check Best Prompts for ChatGPT

Click me!

That’s it, we’ve completed our list of the best prompts to chat with ChatGPT about cybersecurity and system safety. We hope you found this article helpful and that you will try these prompts with ChatGPT. Feel free to send us your comments or suggestions in the section below. And don’t forget to share this article with your friends who might be interested in cybersecurity and system safety. Have a great conversation!

THcon 2023: A Cybersecurity Conference and CTF in Toulouse

THCON 2023 DataShielder by Freemindtronic silver sponsor THCON CTF FCT ENSEEIHT Toulouse Hacking Convention

2023 Events FIC 2023

Serverless Cryptography Solution – FIC 2023

2022 Confex Events

CONFEX 4.0 Cybersecurity Transalley

Eurosatory 2022 Events Exhibitions

Exhibitors list Eurosatory 2022 and Freemindtronic Story

2022 CyberStealth Eurosatory 2022 Press release

EviStealth Technology at Eurosatory 2022

2022 Cyber Computer Eurosatory 2022 Press release

Cyber Computer at Eurosatory 2022

2022 Contactless Dual Strongbox Eurosatory 2022 Press release

The Contactless Dual Strongbox for sensitive data at Eurosatory 2022

2022 Events Exhibitions

Freemindtronic at Eurosatory 2022
Team THcon 2023 Freemindtronic Andorra Silver Sponsor
hardware CTF THcon 2023 Freemindtronic Andorra Silver Sponsor
Fortnite THcon 2023 Freemindtronic Andorra Silver Sponsor
Cryptax CTF THcon 2023 Freemindtronic Andorra Silver Sponsor
Team THcon 2023 Freemindtronic Andorra Silver Sponsor
THcon 2023: Highlights of the Cybersecurity Event

Do you want to know more about THcon 2023, a cybersecurity conference and CTF that took place in Toulouse, France? In this article, you will learn about the highlights of the event, the speakers, the partners and the prizes. You will also find out how to register for the next edition in 2024. Read on to discover why THcon is a must-attend event for cybersecurity enthusiasts!

Are you a cybersecurity enthusiast who missed THcon 2023 and its CTF? Or are you curious about what happened at this amazing event that took place in Toulouse, France from April 20 to 22, 2023? If so, you are in the right place. In this article, I will give you a recap of the highlights of THcon 2023 and its CTF. I will also show you why you should attend the next edition in 2024.

What is THcon and its CTF?

THcon is a cybersecurity event organized by the Toulouse Informatique Sécurité et Associatif (TISA) association. It aims to bring together hackers, researchers, students, professionals and enthusiasts from all over the world to share their passion and knowledge on cybersecurity.

The event features two days of talks, a social event and a CTF (Capture The Flag) in person. The talks cover various and current topics, such as hardware hacking, firmware analysis, secret extraction in CI/CD systems, attacks against online games, Android security model or the challenges of connected vehicle security. The speakers are recognized experts in their fields, such as Travis Goodspeed, Axelle Apvrille or Damien Cauquil.

The social event is an opportunity for the participants to network and have fun in a friendly and festive atmosphere. It is also the occasion to award the prizes for the challenge that takes place during the talks.

The CTF is a hacking competition that consists of solving cybersecurity challenges. For example, exploiting a vulnerability in an electronic device, extracting hidden data in a memory image, finding weaknesses in an encryption protocol and much more. The CTF takes place at ENSEEIHT on the third day of the event and is open to all levels. The winning teams win prizes such as hacking equipment, t-shirts and other surprises.

Highlights of THcon 2023 and its CTF THcon 2023 and its CTF were full of memorable moments that made this edition a success. Here are some of them:

  • The opening keynote by Travis Goodspeed. He shared his experience and insights on hacking hardware devices, such as radios, microcontrollers or smart cards.
  • The talk by Axelle Apvrille. She showed how to analyze firmware images using static and dynamic techniques. For instance, reverse engineering, emulation or fuzzing.
  • The talk by Damien Cauquil. He demonstrated how to attack online games using various tools and methods. For example, packet sniffing, proxying or cheating.
  • The social event on Thursday evening. Participants enjoyed music, drinks and food while chatting with each other and with the speakers.
  • The award ceremony for the challenge that took place during the talks. The challenge was to find hidden flags in different web pages related to THcon. The first three teams who found all the flags won prizes such as books or vouchers.
  • The CTF on Saturday at ENSEEIHT. More than 600 participants from 12 countries faced various and stimulating challenges in the field of cybersecurity.
  • Congratulation to the Synacktiv team, ENSEEIHT team and GCCENSIBS team for the podium and also to every team that participated ! 👏 You can learn more about GCC-ENSIBS on their LinkedIn page: https://www.linkedin.com/company/gcc-ensibs

Partners and sponsors of THcon 2023 THcon is supported by several partners and sponsors who contribute to make this event possible. Among them are:

  • Freemindtronic: an Andorran company specialized in cybersecurity and safety of computer systems. Freemindtronic actively participates in the hardware CTF of THcon. You can discover the backstage of the hardware CTF of THcon 2022 in this video made by Jacques Gascuel, the CEO of Freemindtronic: https://www.youtube.com/watch?v=P-Es2RJUQBo
  • Synacktiv: a French company that provides offensive security services and solutions. Synacktiv also organizes trainings on various topics related to cybersecurity.

ENSEEIHT: a French engineering school that offers courses on computer science, electronics, telecommunications and applied mathematics. ENSEEIHT hosts the CTF of THcon on its premises.

Among the prizes offered by Freemindtronic, silver sponsor of THcon since 2022, there are four NFC HSM DataShielder Lite collector devices, a unique version made for THcon CTF 2023. These devices are password and bank card managers that work without a battery and offer secure, decentralized and individualized management of sensitive data.

Why should you attend THcon 2024?

THcon is a must-attend event in Occitania for learning, having fun and meeting other cybersecurity enthusiasts. You can find all the information on the official website of the event: https://thcon.party/. You can also consult the list of challenges of the CTF on the site https://ctf.thcon.party/challenges.

If you want to experience this unique and enriching event, don’t hesitate to register for the next edition of THcon in 2024! You will find all the necessary information on the website https://thcon.party. Don’t miss this opportunity to discover the latest trends in cybersecurity, face exciting challenges and meet people who share your interests!

THCon Conference 2023

THURSDAY 20TH 2023

9h15 – 9h30 OPENING SPEECH
Mohamed Kâaniche (Director at LAAS-CNRS),
Marc Sztulman (Conseiller Régional d’Occitanie)

9h30 – 10h15 [K] MASK ROMS AND MASKS OF ABSTRACTION
Travis GoodSpeed
More info

10h15 – 10h55 [LP] AUTOMATING THE EXTRACTION OF SECRETS STORED INSIDE CI/CD SYSTEMS
Théo Louis-Tisserand and Hugo Vincent
Synacktiv (Toulouse & Paris, France)
More info

11h15 – 11h35 [SP] HASH CRACKING : AUTOMATION DRIVEN BY LAZINESS, 10 YEARS AFTER
David Soria
Astar (Toulouse, France)
More info

11h35 – 12h15 [LP] WEAPONIZING ESP32 RF STACKS
Romain Cayre and Damien Cauquil
Institut Eurecom (Sophia-Antipolis, France),
Quarkslab (Paris, France)
More info

14h00 – 14h45 [K] HAMMERSCOPE: OBSERVING DRAM POWER CONSUMPTION USING ROWHAMMER
Yaakov Cohen and Arie Haenel
Intel
More info

14h45 – 15h25 [LP] REFLECTIONS ON TRUSTING DOCKER: INVISIBLE MALWARE IN CONTINUOUS INTEGRATION SYSTEMS
Florent Moriconi, Axel Neergaard, Lucas Georget, Samuel Aubertin and Aurélien Francillon
Institut Eurecom (Sophia-Antipolis, France)
More info

15h25 – 15h45 [SP] DYNAMIC BINARY FIRMWARE ANALYSIS WITH AVATAR²
Paul Olivier
Institut Eurecom (Sophia-Antipolis, France) / LAAS-CNRS (Toulouse, France)
More info

FRIDAY 21TH 2023

9h30 – 10h15 [K] HACKING FOR IDEAS
Axelle Apvrille
Fortinet
More info

10h15 – 10h55 [LP] AN EXPLAINABLE-BY-DESIGN ENSEMBLE LEARNING SYSTEM TO DETECT UNKNOWN NETWORK ATTACKS
Céline Minh, Kevin Vermeulen, Cédric Lefebvre, Philippe Owezarski and William Ritchie
Custocy (Toulouse, France),
LAAS-CNRS, Universite de Toulouse, CNRS, INSA (Toulouse, France)
More info

10h55 – 11h15 [SP] AN EXPLORATION OF FUTURE CHALLENGES FOR CROWD SOURCED VULNERABILITY DETECTION
Olivier de Casanove and Florence Sèdes
IRIT, Universite Toulouse III – Paul Sabatier (Toulouse, France)
More info

11h35 – 12h15 [LP] THE ANDROID SECURITY MODEL
Jean-Baptiste Cayrou
Synacktiv (Toulouse, France)
More info

12h15 – 12h35 [SP] SOFTWARE DEFINED VEHICULE SECURITY – CHALLENGES, RISKS AND REWARDS
Redouane Soum
Renault
More info

14h00 – 14h40 [LP] A STUDY ON WINDOWS AUTHENTICATION & PROX-EZ
Geoffrey Bertoli and Pierre Milioni
Synacktiv (Paris, France)
More info

14h40 – 15h20 [LP] WHY THERE IS MORE TO TODAY’S ATTACKS AGAINST ONLINE GAMES THAN MEETS THE EYE
Ilies Benhabbour, Marc Dacier, David Bromberg, Sven Dietrich, Rodrigo Rodrigues and Paulo Estes-Verissimo
King Abdullah University of Science and Technology (KAUST), (Thuwal, Kingdom of Saudi Arabia),
Univ Rennes, CNRS, IRISA, INRIA Rennes (France),
City University of New York (New York, NY, USA),
Instituto Superior Tecnico and INESC-ID (Lisboa, Portugal)
More info

15h50 – 16h30 [LP] FIGHTING AGAINST DLL SEARCH ORDER HIJACKING, ONE SLAHP AT A TIME
Antonin Verdier, Romain Laborde and Abdelmalek Benzekri
IRIT, Universite Toulouse III – Paul Sabatier (Toulouse, France)
More info

16h30 – 16h50 CONCLUSION

KingsPawn A Spyware Targeting Civil Society

KingsPawn A Spyware

 

KingsPawn from QuaDream Spyware Threat

KingsPawn, a spyware developed and sold by QuaDream based on digital offensive technology to governments. Its spyware, named Reign, uses zero-click exploits to infiltrate the mobile devices of civil society victims. In this article you will learn how QuaDream works, who its Cyber victims and customers have been, and how to protect yourself from this type of dangerous spyware

2024 Cyberculture Digital Security News Training

Andorra National Cyberattack Simulation: A Global First in Cyber Defense

2024 Digital Security

Apple M chip vulnerability: A Breach in Data Security

2024 Digital Security

Cybersecurity Breach at IMF: A Detailed Investigation

2024 DataShielder Digital Security PassCypher Phishing

Midnight Blizzard Cyberattack Against Microsoft and HPE: What are the consequences?

2024 Digital Security

PrintListener: How to Betray Fingerprints

2024 Articles Digital Security News

BitLocker Security: Safeguarding Against Cyberattacks

To learn more about the potential dangers of KingsPawn spyware, read “QuaDream: Spyware That Targets Civil Society.” Stay informed by browsing our constantly updated topics

How to Secure Your Data from QuaDream’s KingsPawn Spyware,” written by Jacques Gascuel, the innovator behind advanced sensitive data security and safety systems, provides priceless knowledge on the topic of data encryption and decryption. Are you prepared to enhance your comprehension of data protection?

QuaDream: KingsPawn spyware vendor shutting down in may 2023

QuaDream was a company that sold digital offensive technologies to governments. Its main product, Reign, was a spyware that used zero-click exploits to hack mobile devices. A few months after Pegasus, a similar spyware by NSO Group, Microsoft and Citizen Lab found QuaDream’s Reign / KingsPawn spyware and its victims worldwide.

However, in May 2023, QuaDream stopped its activitiesMay 2023, QuaDream stopped its activities, due to the Israeli government’s restrictions on its spyware export. QuaDream had developed other espionage technologies, such as ENDOFDAYS, that it sold to foreign governments, like Morocco, Saudi Arabia, Mexico, Ghana, Indonesia and Singapor.

QuaDream tried to sell its assets to other players, but the Israeli government blocked them It is unknown if the spyware KingsPawn is still active and used, or who controls it. Therefore, it is advised to be vigilant and protect your data with reliable security solutions.

How QuaDream’s Exploits KingsPawn her Spyware Work

According to Microsoft, QuaDream has an arsenal of exploits and malware that it calls KingsPawn. It includes a suspected exploit for iOS 14, named ENDOFDAYS, that seems to use invisible iCloud calendar invitations sent by the spyware operator to the victims. This exploit was deployed as a zero-day against iOS 14.4 and 14.4.2 versions, and maybe others.

The KingsPawn spyware is designed to exfiltrate data from the infected devices, such as contacts, messages, photos, videos, audio recordings, location data, browser information and app data. The malware communicates with command and control (C2) servers via encrypted protocols and uses evasion techniques to avoid detection.

How the KingsPawn spyware infects phones

The main infection vector of KingsPawn is the ENDOFDAYS exploit, which does not require any user interaction to execute. The spyware operator sends an invisible iCloud calendar invitation to the target’s phone number or email address. The invitation contains a malicious link that triggers the exploit when the phone processes the notification. The exploit then downloads and installs the KingsPawn malware on the device, without the user’s knowledge or consent.

The spyware operator can also use other methods to deliver the malicious link, such as phishing emails, SMS, social media messages, or fake websites. However, these methods require the user to click on the link, which reduces the chances of success.

KingsPawn Datasheet

The following table summarizes the main features and characteristics of the KingsPawn malware:

Feature Description
Name KingsPawn
Developer QuaDream
Platform iOS
Version 1.0
Size 2.5 MB
Permissions Full access to device data and functions
Capabilities Data exfiltration, audio recording, camera capture, location tracking, file search, keychain access, iCloud password generation, self-deletion
Communication Encrypted TCP and UDP protocols
C2 servers Multiple domains and IP addresses, some located in Israel, Bulgaria, Czech Republic, Hungary, Ghana, Mexico, Romania, Singapore, UAE, and Uzbekistan
Victims At least five civil society actors, including journalists, political opponents, and an NGO worker, in North America, Central Asia, Southeast Asia, Europe, and the Middle East
Customers Several governments, some with poor human rights records, such as Singapore, Saudi Arabia, Mexico, Ghana, Indonesia, and Morocco

How to Detect KingsPawn

KingsPawn is a stealthy and sophisticated malware that can evade most antivirus and security software. However, there are some signs and symptoms that can indicate a possible infection, such as:

  • Unusual battery drain or overheating of the device
  • Increased data usage or network activity
  • Unexpected pop-ups or notifications
  • Changes in device settings or behavior
  • Presence of unknown apps or files

If you notice any of these signs, you should scan your device with a reliable antivirus or security app, such as Malwarebytes or Norton. These apps can detect and remove KingsPawn and other malicious software from your device.

How to Protect Against KingsPawn

If you suspect that your device is infected by KingsPawn, you should take the following steps to remove it and protect your data:

  • Disconnect your device from the internet and any other networks
  • Backup your important data to a secure external storage
  • Perform a factory reset of your device to erase all data and settings
  • Restore your device from a clean backup or set it up as a new device
  • Update your device to the latest version of iOS and install security patches
  • Change your passwords and enable two-factor authentication for your online accounts
  • Avoid clicking on suspicious links or opening attachments from unknown sources
  • Use a reputable antivirus or security app to scan your device regularly

These steps will help you to get rid of KingsPawn and prevent it from infecting your device again. However, you should also be aware of the risks of using unsecured email services, such as iCloud web mail, which can be compromised by hackers or spyware. To protect your emails and other sensitive data, you should use a technology that encrypts your data with a hardware security module (HSM), such as EviCypher NFC HSM or DataShielder HSM PGP.

Who Are the Victims and Customers of QuaDream?

Citizen Lab, a research lab at the University of Toronto, identified at least five civil society victims of the spyware and exploits of QuaDream in North America, Central Asia, Southeast Asia, Europe and the Middle East. The victims include journalists, political opponents and a worker of a non-governmental organization (NGO). Citizen Lab did not reveal the names of the victims for security reasons, but one of them agreed to share his testimony anonymously:

I was shocked when I learned that my phone was infected by QuaDream. I had no idea tat they were targeting me. I work for a human rights NGO and I have been involved in several campaigns to denounce the abuses of authoritarian regimes. I fear that they have accessed my personal and professional data, and that they have compromised my contacts and sources.

Citizen Lab also detected QuaDream servers operated from Bulgaria, Czech Republic, Hungary, Ghana, Israel, Mexico, Romania, Singapore, United Arab Emirates (UAE) and Uzbekistan. These countries could be potential or current customers of QuaDream, which sells its Reign platform to governments for law enforcement purposes. Media reports indicate that QuaDream sold its products to Singapore, Saudi Arabia, Mexico and Ghana, and offered its services to Indonesia and Morocco.

What Is the Link Between QuaDream and InReach?

QuaDream had a partnership with a Cypriot company called InReach, with which it is currently in legal dispute. The two companies accused each other of fraud, theft of intellectual property and breach of contract. Several key people associated with both companies have previous links with another surveillance provider, Verint, as well as with Israeli intelligence agencies.

Microsoft and Citizen Lab shared information about QuaDream with their customers, industry partners and the public, to improve the collective knowledge of how PSOAs (private sector offensive actors) operate and how they facilitate the targeting and exploitation of civil society. Microsoft calls for stricter regulation of PSOAs and increased protection of human rights in cyberspace.

Conclusion

QuaDream is a new spyware vendor that poses a serious threat to civil society. Its spyware, named Reign, uses zero-click exploits to infiltrate the mobile devices of civil society victims. QuaDream has sold its products to several governments, some of which have a poor record of human rights. QuaDream is also involved in a legal dispute with another company, InReach, over the ownership of the spyware technology. The international community should be aware of the dangers of QuaDream and other PSOAs, and take action to prevent their abuse.

Electronic Signature HSM OpenPGP

Electronic Signature from DataShielder

Electronic signatures are increasingly being used to authenticate and protect documents online. But did you know that there are different levels of security for electronic signatures? According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different degree of reliability and safety. In this article, we will look at simple electronic signatures and explain how HSM OpenPGP can make them more secure.

Simple Electronic Signatures

A simple electronic signature is the most basic form of electronic signature. It has no specific criteria defined by the eIDAS regulation. It is based solely on the express or implied consent of the author of the document. For example, a simple click on an “I agree” button or entering a name in a form field can be considered a simple electronic signature.

Simple electronic signatures are used for documents that do not require increased security, such as newsletters, surveys or contact forms. They have limited legal value, as they do not guarantee the identity of the signer or the integrity of the document.

Simple electronic signatures present several risks for data security. First of all, they are easy to forge or usurp. It is enough to know the name or email address of the signer to be able to sign in his place. Then, they are vulnerable to computer attacks. A hacker can intercept, modify or delete the signed document without the signer or the recipient noticing. Finally, they are difficult to verify. There is no simple and reliable way to prove the authenticity and validity of a simple electronic signature.

Il is a tool that allows you to sign your electronic documents in compliance with the eIDAS regulation. HSM OpenPGP offers you several advantages to enhance the security of your simple electronic signatures:

HSM OpenPGP uses an asymmetric cryptography system to protect your data. Each signer has a pair of keys: a public key and a private key. The public key is used to verify the signature, while the private key is used to sign the document. The private key is stored in a secure digital vault and is only accessible to the signer. HSM OpenPGP generates a timestamp for each signed document. The timestamp is an indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents tampering or repudiation. HSM OpenPGP allows you to choose the level of security of your electronic signature according to your needs. You can opt for a simple, advanced or qualified electronic signature. Each level offers additional guarantees on the identity of the signer and the validity of the document. It is therefore a tool that allows you to sign your electronic documents with confidence and compliance. If you want to learn more about HSM OpenPGP and its features, feel free to visit our website or contact us.

Advanced Electronic Signatures

Electronic signatures are increasingly used to authenticate and protect online documents. But not all electronic signatures are equal. According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different level of reliability and security. In this article, we will focus on advanced electronic signatures and explain how HSM OpenPGP can make them safer.

An advanced electronic signature is a form of electronic signature that offers a higher level of security than a simple electronic signature. It is based on a digital certificate issued by a trusted third party, called a qualified trust service provider (QTSP). This certificate allows to authenticate the identity of the signer and to ensure the integrity of the signed document. To be considered as an advanced electronic signature, the signature must meet several criteria defined by the eIDAS regulation. It must be:

  • Uniquely linked to the signer;
  • Capable of identifying the signer;
  • Created using signature creation data that the signer can use under his exclusive control;
  • Linked to the signed data in such a way that any subsequent modification of the data is detectable.

Advanced electronic signatures are used for documents that require increased security, such as contracts, invoices or tax declarations. They have a stronger legal value than simple electronic signatures, because they can prove the origin and integrity of the document.

It is an encryption key management application that provides unparalleled security and privacy to users. It is compatible with all messaging services and offers end-to-end encrypted instant messaging via segmented key authentication SMS. It also has a file encryption and data signing system with signature self-verification.

  • eIDAS compliance: By using HSM OpenPGP for advanced electronic signatures, you can be sure that your signatures meet the requirements of the eIDAS (Electronic IDentification, Authentication and Trust Services) regulation, which was established in July 2016 to define the criteria for an electronic signature process within the European Union.
  • Timestamp of signed documents: HSM OpenPGP generated a timestamp for each signed document. The timestamp is indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents falsification or repudiation.
  • Choice of security level: HSM OpenPGP also allows you to choose the level of security of your electronic signature according to your needs.
  • Advanced features for data security and privacy: In addition to meeting eIDAS requirements for advanced electronic signatures, HSM OpenPGP also offers other data security and privacy benefits. For example, it allows you to generate, store, and use all types of symmetric and asymmetric keys offline for Open PGP encryption algorithms. The user can freely choose the algorithm he wants to use from AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing, or use with HSM OpenPGP.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS regulation, but also additional protection for your data thanks to the advanced features offered by HSM OpenPGP.

Compliance with eIDAS Regulation

It is an innovative application for managing encryption keys and signing files. Although HSM OpenPGP offers an interesting approach to electronic signatures, it is important to note that its approach differs from the requirements for a qualified electronic signature under the eIDAS regulation.

The eIDAS Regulation (No 910/2014) was adopted on 23 July 2014 by the European Parliament and the European Union Council. It aims to strengthen trust in electronic transactions within the internal market by establishing a common foundation for secure electronic interactions between citizens, businesses and public authorities. According to this regulation, a qualified electronic signature must be created using a secure signature creation device (DSC) that ensures that the signature creation data is under the exclusive control of the signatory. It must also be based on a qualified electronic signature certificate that attests to the identity of the signatory and is issued by a qualified trust service provider (PSC) meeting applicable technical and regulatory requirements. Finally, it must allow the signatory to be identified and any subsequent changes to the signed data to be detected.

To learn more about the eIDAS Regulation, you can visit the EUR-Lex website at the following address:

https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32014R0910

HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation because its approach does not rely on the use of a secure signature creation device (DSC) or a qualified certificate for electronic signatures issued by a qualified trust service provider (PSC).

However, It’s offers an innovative approach in the field of file signing and data encryption. HSM OpenPGP allows the signatory to generate, store and share their own public key and signature hash without relying on an external trusted third party. HSM OpenPGP uses technology patented by Freemindtronic on segmented key authentication to provide users with an unparalleled level of security and privacy. HSM OpenPGP also allows you to choose the level of security for your electronic signature based on your needs.

In short, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy.

According to the eIDAS Regulation, an advanced electronic signature must meet the following criteria:

  • It is uniquely linked to the signatory.
  • It allows the signatory to be identified.
  • It is created using data that the signatory can use under their exclusive control.
  • It is linked to the data to which it relates in such a way that any subsequent changes to the data can be detected.

It is appears to meet these criteria by allowing the signatory to generate their own private key using an application on their phone. The private key is encrypted and stored in the keychain (Apple) or key store (Android) and is only accessible to the signatory. The signatory creates their signature in .asc format from their private key after authenticating by entering at least one key or two or three. The signatory then sends the signature and their public key to the recipient so that they can verify that the file has not been corrupted.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

In conclusion, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy. It is appears to meet the criteria for an advanced electronic signature by allowing the signatory to generate their own private key using an application on their phone and providing users with an unparalleled level of security and privacy thanks to its patented technology. By using HSM OpenPGPfor advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

Serverless Cryptography Solution – FIC 2023

datashielder serverless cryptography solution team Sesame Expertises Region Hauts de France FIC 2023 Freemindtronic Andorra

DataShielder: Freemindtronic’s innovation at FIC 2023

 

DataShielder is a serverless cryptography solution that Freemindtronic presented at the International Cybersecurity Forum (FIC) 2023, which took place in Lille Grand Palais from 5 to 7 April 2023. The FIC is the leading European event on issues of security and digital trust. It brings together all cybersecurity actors, whether public or private, national or international. FIC visitors were able to attend demonstrations to discover all the features and benefits offered by DataShielder. The demonstrations took place on the stand of the Hauts-de-France region with Sésame Expertises, official partner of Freemindtronic.

DataShielder electronic signature compatible with eIDAS, GDPR, ISO/IEC 27001
Contact for demos on Sesame Expertises booth C9-12

Upload PDF press release (en) click here

CONFEX 4.0 Cybersecurity Transalley

CONFEX 4.0 Cybersecurity Transalley Freemindtronic from Andorra participates in the first edition theme industrial cybersecurity iiot cyber pc Kubb Bleujour
 
 
QR code black contact Freemindtronic Eurosatory Hall 5B C178

CONFEX 4.0 CYBERSECURITY TRANSALLEY 2022 for its 1st edition Freemindtronic Andorra participates on December 15, 2022 at the Technopole Transalley Famars (France) in the event on the theme Cybersecurity and IIOT

We thank the organizers of the Confex 4.0 Cybersecurite Transalley for having solicited Freemindtronic to participate as an industrial actor in safety and cybersecurity developer and manufacturer of industrial solutions and IIoT.

CONFEX 4.0 Transalley Expo 2022 Famars IMTD France

Demonstration available on the booth

Various safety and cybersecurity products and services are available under white label license.

NFC M15Secure Bleujour

Learn more

NFC CyberPC Bleujour

Learn more

NFC Cold Wallet Keepser

Learn more

NFC Secure Card Bleu Jour

Learn more

Data & Backup ITProtectee

Learn more

NFC HSM OTP Manager

Learn more

vCard & Badge Manager

Learn more

NFC Encryption Keys Manager

Learn more

Rugged Secure NFC USB key

Learn more

Encryption Keys PGP Manager

NEW 2023

vCard & Badge Manager

NEW 2023

PDF Encrypted Manager

NEW 2023

NFC HSM Advertising Pen

NEW 2022

NFC HSM Cufflinks

NEW 2022

NFC HSM Tuxedo Button

NEW 2022

NFC HSM Fake USB Stick

NEW 2023

NFC HSM Stealth Ruler

NEW 2023

Your NFC HSM   ?

NEW 2023

M15 SECURE BLEUJOUR

OEM RUGGED NFC HSM

The rugged NFC mini HSM (Hardware Security Module) offers the ability to store up to 100 encrypted secrets. It is paired with an NFC Android phone and works by energy harvesting, contactless, through the antenna signal of the phone, It can be embedded directly into different non-ferrous materials that do not disturb the NFC signal such as wood, leather, plastic, stone, resin, tissue. Very small size (less than 2 cm diameter and 2 mm thick), it can be used in different places, a wall, a door … for industrial use. In the video above, the NFC HSM has been embedded under the pad of the M15 Secure laptop from French computer manufacturer Bleu Jour. Advantageously, the aluminum casing of the laptop offers a Faraday protection blocking the NFC signal.

COLD WALLET KEEPSER

NFC Cold Wallet

Freemindtronic designs stealthy NFC HSM

Some examples which will be presented at Confex 4.0: advertising pen, cufflink, ruler and the stealthy NFC card.

Stealthy Secret Safe Pen
Discover EviStealth technologies

Anonymised real-time encrypted data transfer

Stealthy cufflink secret safe

Design of customized stealth eco-systems

EviKey Technology

Discover the Evikey technology, a mobile data storage that can only be unlocked contactless. In USB and SSD format, they are physically undetectable from computer systems when locked.

EviKey technology

Waterproof contactless data storage

The only contactless unlocking system with a configurable self-healing multi-factor and a tamper-proof black box that protects against mechanical, electrical, thermal and electronic stress.

Contact

Give us a call!

EviStealth technology

Secret Service

EviStealth technology

Regulated professions

CONFERENCES | #1 CONFEX 4.0 : Cyber Security and IIoT

First edition on Thursday, December 15, 2022 from 9:30 a.m. to 5:00 p.m. on the first 4.0. theme addressed: Industrial Cybersecurity and IIoT.

The Technolope Transalley on France, has partnered with the AIF (Association of Railway Industries Hauts-de-France), Altytud (Cluster of Aerospace Industries Hauts-de-France), ARIA Hauts-de-France (Regional Association of Automotive Industry Hauts-de-France), CAP’Industrie, CETIM, the CCI Grand Hainaut and HDFID (Hauts-de-France Innovation Development), to organize a cycle “CONFEX 4. 0”, an innovative formula that combines a conference program and an exhibition, bringing together solution providers on the theme of the day and the presence of training centers in the field of Industry 4.0.

Learn more about the Confex conference program clic button 👉

Contact support

Exhibitors list Eurosatory 2022 and Freemindtronic Story

List of exhibitors Eurosatory 2022 by Freemindtronic in Hall 5b stand C178 new stealth NFC card EviCypher

Our historical adventure at Eurosatory 2022

First time in the history of Andorra that an Andorran industrial exporter of safety and cyber security solutions has participated in the world’s largest defence and security exhibition.

Here you will discover our story that led us to Eurosatory 2022.

1726 exhibitors from 65 countries including Andorra for the first time in its history

Exhibitors list Eurosatory 2022 as of 6th of June 2022 COUNTRY
FREEMINDTRONIC ANDORRA
ADVANCED NAVIGATION AUSTRALIA
AIVA PTY AUSTRALIA
AMDA FOUNDATION AUSTRALIA
ANYWISE CONSULTING AUSTRALIA
ARCHTIS AUSTRALIA
BARRETT COMMUNICATIONS AUSTRALIA
BORESIGHT AUSTRALIA
CABLEX AUSTRALIA
CHIRON GLOBAL TECH AUSTRALIA
CODAN DEFENCE ELECTRONICS AUSTRALIA
CROSSFIRE AUSTRALIA AUSTRALIA
DEFENDTEX MILITARY PRODUCTS AUSTRALIA
DRONESHIELD AUSTRALIA
EGGLER INSTITUTE OF TECHNOLOGY AUSTRALIA
EOS DEFENCE SYSTEMS AUSTRALIA
FIBRE TECH SOLUTIONS LTD AUSTRALIA
FORTIFYEDGE AUSTRALIA
GAARDTECH AUSTRALIA
GLOBAL DEFENCE SOLUTIONS, PART OF THE ALKATH GROUP. AUSTRALIA
J3SEVEN PTY AUSTRALIA
MACKAY CONSOLIDATED INDUSTRIES AUSTRALIA
MARAND PRECISION ENGINEERING AUSTRALIA
MARATHON TARGETS AUSTRALIA
MILSPEC MANUFACTURING AUSTRALIA
MYRIAD TECH AUSTRALIA
NEXUS TRAINING SOLUTIONS AUSTRALIA
NIOA AUSTRALIA
NORSELD AUSTRALIA
ORBITAL AUSTRALIA AUSTRALIA
P.W.R PERFORMANCE PRODUCTS AUSTRALIA
POINT TRADING AUSTRALIA
RADIO FREQUENCY SYSTEMS AUSTRALIA
RAIDER TARGETRY AUSTRALIA
REVOLUTION AEROSPACE AUSTRALIA
S2IX AUSTRALIA
SAAB AUSTRALIA AUSTRALIA
SENTIENT AUSTRALIA
SKYBORNE TECHNOLOGIES AUSTRALIA
SOLINNOV AUSTRALIA
SPEE3D AUSTRALIA
TEAM DEFENCE AUSTRALIA AUSTRALIA
THALES AUSTRALIA AUSTRALIA
THE BLUEPRINT LABORATORY AUSTRALIA
TITOMIC AUSTRALIA
W&E PLATT MOUNTS AUSTRALIA
XTEK LIMITED AUSTRALIA
ACHLEITNER AUSTRIA
AIRBORNE TECHNOLOGIES AUSTRIA
AUSTRIAN DEFENCE & SECURITY INDUSTRY GROUP AUSTRIA
AUSTRIAN FEDERAL ECONOMIC CHAMBER AUSTRIA
AVL LIST AUSTRIA
CARINTHIA | GOLDECK TEXTIL AUSTRIA
CHEBCHEB GROUP AUSTRIA
DIPROMED AUSTRIA
EMPL FAHRZEUGWERK GES.M.B.H. AUSTRIA
ENGINEERING CENTER STEYR AUSTRIA
GLOCK AUSTRIA
HIGH PRESSURE INSTRUMENTATION – HPI AUSTRIA
HIRTENBERGER DEFENCE EUROPE AUSTRIA
J. BLASCHKE WEHRTECHNIK AUSTRIA
KAHLES GESELLSCHAFT AUSTRIA
MXR TACTICS AUSTRIA
PALFINGER AUSTRIA
PEWAG AUSTRIA AUSTRIA
PIK-AS AUSTRIA AUSTRIA
PLANSEE SE AUSTRIA
RAYTECH VERTRIEBS AUSTRIA
STEYR ARMS AUSTRIA
STEYR TRUCKS SALES & SERVICES INTERNATIONAL AUSTRIA
SWAROVSKI OPTIK AUSTRIA
ULBRICHTS GESMBH AUSTRIA
ZCO ZERO COMPROMISE OPTIC AUSTRIA
AEROSPACELAB SA BELGIUM
ARMY RECOGNITION BELGIUM
BSDI BELGIUM
DAUDE FABRICATION BELGIUM
FN HERSTAL BELGIUM
GRIMONPREZ TRANSMISSION GEARS BELGIUM
GROUPEMECA BELGIUM
IR&D BELGIUM
JD’C INNOVATION BELGIUM
MUSTAD BELGIUM BELGIUM
OIP LAND SYSTEMS BELGIUM
OIP SENSOR SYSTEMS BELGIUM
PIRON PRECISION COATINGS BELGIUM
PITAGONE BELGIUM
PRAESENS CARE BELGIUM
PROCOTEX CORPORATION BELGIUM
SCIOTEQ BELGIUM
SEYNTEX BELGIUM
SIMTECH BELGIUM
SIOEN BALLISTICS BELGIUM
SKY-HERO BELGIUM
ST ENGINEERING IDIRECT BELGIUM
THALES BELGIUM BELGIUM
XENICS NV BELGIUM
FOREIGN TRADE CHAMBER OF BOSNIA AND HERZEGOVINA BOSNIA AND HERZEGOVINA
IGMAN KONJIC BOSNIA AND HERZEGOVINA
PRETIS VOGOSCA BOSNIA AND HERZEGOVINA
UNIS GINEX GORAZDE BOSNIA AND HERZEGOVINA
ABIMDE BRAZIL
AEL SISTEMAS BRAZIL
AKAER ENGENHARIA BRAZIL
ARES – AEROESPACIAL E DEFESA BRAZIL
ATECH – NEGÓCIOS EM TECNOLOGIAS BRAZIL
BCA BALLISTIC PROTECTION BRAZIL
CBC DEFENSE BRAZIL
CONDOR NAO LETAL BRAZIL
CSA – CENTRO DE SERVIÇOS AERONÁUTICOS BRAZIL
EMBRAER BRAZIL
GESPI INDÚSTRIA COMÉRCIO DE EQUIPAMENTOS BRAZIL
KRYPTUS BRAZIL
M&K ASSESSORIA EXPORTADORA E IMPORTADORA BRAZIL
MAC JEE BRAZIL
NEGER INDUSTRIAL PESQUISA E DESENVOLVIMENTO BRAZIL
RF COM SISTEMAS LTDA BRAZIL
TAURUS BRAZIL
VERTICAL DO PONTO IND E COM DE PARA-QUEDAS BRAZIL
ARSENAL 2000 JSCO BULGARIA
DUNARIT CORP BULGARIA
HADES DEFENSE SYSTEMS BULGARIA
MARS ARMOR LTD BULGARIA
OPTICOELECTRON GROUP JSC. BULGARIA
OPTIX BULGARIA
SAMEL- 90 BULGARIA
TRANSMOBIL BULGARIA
AI REDEFINED CANADA
ALLEN VANGUARD CANADA
ALPHACASTING INC CANADA
APEXO CANADA
CADSI – CANADIAN ASSOCIATION OF DEFENCE AND SECURITY INDUSTRY CANADA
COLT CANADA CANADA
EVERTZ CANADA
HAIVISION NETWORK VIDEO CANADA
KWESST CANADA
LIFTKING MANUFACTURING CORP CANADA
LOGISTIK UNICORP INC CANADA
MODEST TREE CANADA
NANUK BY PLASTICASE CANADA
NEWCON OPTIK CANADA
NIGHTINGALE SECURITZ CANADA
NOVATEL CANADA
OCTASIC CANADA
OFFWORLD DEFENCE SIMULATIONS CANADA
PRESAGIS CANADA CANADA
QUEBEC (GOUVERNEMENT DU / GOVERNMENT OF) CANADA
SANTOR SECURITY CANADA
SCEPTER CANADA CANADA
SEI INDUSTRIES CANADA
SOUCY DEFENSE CANADA
SPACEBRIDGE CANADA
TELEDYNE IMAGING CANADA
UTV INTERNATIONAL CANADA
CDDZ CHINA
CHINA NORTH INDUSTRIES CORP (NORINCO) CHINA
K6 TACTICAL CHINA
UNITREE ROBOTICS CHINA
CORPORACIÓN DE ALTA TECNOLOGÍA PARA LA DEFENSA / CODALTEC COLOMBIA
CORPORACION DE LA INDUSTRIA AERONAUTICA COLOMBIANA/CIAC COLOMBIA
EXPODEFENSA 2023 COLOMBIA
FONDO ROTATORIO DE LA POLICIA / FORPO COLOMBIA
GRUPO SOCIAL Y EMPRESARIAL DE LA DEFENSA COLOMBIA
INDUMIL – INDUSTRIA MILITAR DE COLOMBIA COLOMBIA
AGENCIJA ALAN D.O.O. CROATIA
CROATIAN CHAMBER OF ECONOMY CROATIA
CROSHIELD D.O.O. CROATIA
DOK-ING D.O.O. CROATIA
HS PRODUKT D.O.O. CROATIA
IRON BULL CROATIA
ODJECA CROATIA
ORQA D.O.O. CROATIA
P-MTC D.O.O. CROATIA
SESTAN BUSCH D.O.O. CROATIA
CYPRUS RESEARCH AND INNOVATION CENTER CYPRUS
DBDC INTERNATIONAL DEFENCE PUBLICATIONS CYPRUS
EIGHT BELLS CYPRUS
ENCORP CYPRUS
SIGNALGENERIX CYPRUS
SWARMLY CYPRUS
ZOMIDEA DESIGN & SERVICES CYPRUS
ADS CZECH REPUBLIC
ANV KNIVES CZECH REPUBLIC
AVEC CHEM CZECH REPUBLIC
CESKA ZBROJOVKA CZECH REPUBLIC
CRYTUR, SPOL. S R.O. CZECH REPUBLIC
CZECHOSLOVAK GROUP CZECH REPUBLIC
DEFENCE AND SECURITY INDUSTRY ASSOCIATION OF THE CZECH REPUBLIC CZECH REPUBLIC
ELDIS PARDUBICE, S.R.O. CZECH REPUBLIC
EURO SECURITY PRODUCTS CZECH REPUBLIC
EVOLVING SYSTEMS CONSULTING CZECH REPUBLIC
EVPU DEFENCE A. S. CZECH REPUBLIC
EXCALIBUR ARMY CZECH REPUBLIC
HOLÍK INTERNATIONAL CZECH REPUBLIC
MEOPTA SYSTEMS CZECH REPUBLIC
MESIT ASD, S.R.O. CZECH REPUBLIC
ORITEST SPOL CZECH REPUBLIC
PBS VELKA BITES CZECH REPUBLIC
PROTOTYPA CZECH REPUBLIC
QUITTNER & SCHIMEK CZECH REPUBLIC
RAY SERVICE CZECH REPUBLIC
REDO CZECH REPUBLIC
RETIA CZECH REPUBLIC
RUBENA NACHOD, S.R.O. CZECH REPUBLIC
SELLIER & BELLOT CZECH REPUBLIC
STV GROUP CZECH REPUBLIC
SVOS SPOL S.R.O. CZECH REPUBLIC
TATRA EXPORT S.R.O. CZECH REPUBLIC
THE CZECH MINISTRY OF INDUSTRY AND TRADE CZECH REPUBLIC
TOVEK, SPOL. S R.O. CZECH REPUBLIC
TRAAM S.R.O. CZECH REPUBLIC
AALBORG UNIVERSITET DENMARK
BRUHN NEWTECH DENMARK
CHORA DENMARK
COBHAM SATCOM DENMARK
COPENHAGEN SENSOR TECHNOLOGY DENMARK
DANISH DEFENCE AND SECURITY INDUSTRIES DENMARK
DANTHERM DENMARK
DC-SUPPLY DENMARK
DENCRYPT DENMARK
DTU SPACE INSTITUT DENMARK
EOMAX APS DENMARK
EVERGREEN AVIATION APS, DENMARK
FALCK-SCHMIDT DENMARK
FALCOM DENMARK
FORCE TECHNOLOGY DENMARK
GLAUCUS APS DENMARK
HMK BILCON A/S DENMARK
HYDREMA EXPORT DENMARK
IDOC DENMARK
INVISIO DENMARK
LORENZ TECHNOLOGY DENMARK
MIKKELSEN ELECTRONICS DENMARK
MILITARY EQUIPMENT DENMARK DENMARK
MULTICUT DENMARK
MYDEFENCE DENMARK
NECAS DENMARK
NORDIC RADAR SOLUTIONS APS DENMARK
PLASTPACK DEFENCE APS DENMARK
PORT OF AALBORG DENMARK
SCANFIBER COMPOSITES DENMARK
SIMA INNOVATION DENMARK
SKY-WATCH DENMARK
STERNULA APS DENMARK
TEKNOLOGISK INSTITUT DENMARK
UXV TECHNOLOGIES APS DENMARK
WEIBEL SCIENTIFIC DENMARK
WISELED DENMARK
ARABIAN WORLD EVENTS EGYPT
EAGLES INTERNATIONAL FOR DEFENSE SYSTEM EGYPT
BRISTOL TRUST OÜ ESTONIA
DEFENDEC OÜ ESTONIA
DEFSECINTEL SOLUTIONS OÜ ESTONIA
ENTERPRISE ESTONIA ESTONIA
ETHR OÜ ESTONIA
GALVI-LINDA ESTONIA
Marduk Technologies OÜ ESTONIA
MILECTRIA EST OÜ ESTONIA
MILREM ROBOTICS ESTONIA
NORDIC ARMOURY OÜ ESTONIA
SAMELIN AS ESTONIA
SENSUSQ ESTONIA
TERRAMIL OÜ ESTONIA
THREOD SYSTEMS OÜ ESTONIA
TOCI OÜ ESTONIA
VEGVISIR ESTONIA
AIRBUS EUROPEAN UNION
DIRECTORATE-GENERAL FOR DEFENCE INDUSTRY AND SPACE EUROPEAN UNION
EUMS / MPCC – EUROPEAN UNION MILITARY STAFF EUROPEAN UNION
AFDA – ASSOCIATION OF FINNISH DEFENCE & AEROSPACE FINLAND
BITTIUM FINLAND
DA-GROUP FINLAND
ENVIRONICS OY FINLAND
FMG DEFENCE FINLAND
FORCIT OY FINLAND
FRESTEMS FINLAND
LITQU GROUP OY FINLAND
MASTSYSTEM INTERNATIONAL OY FINLAND
MIKRO-PULSSI FINLAND
NOPTEL OY FINLAND
OBSERVIS OY FINLAND
PATRIA OYJ FINLAND
RAIKKA OY FINLAND
SAKO FINLAND
SAVOX COMMUNICATIONS FINLAND
SISU AXLES FINLAND
TEMET INTERNATIONAL OY LTD FINLAND
VALTRA FINLAND
VTT OY FINLAND
0T0N0HM FRANCE
2 CA FRANCE
3AED-IHEDN ASSOCIATION FRANCE
A2R ELECTRONIQUE FRANCE
AART ELECTRONICS FRANCE
ABEILLON FRANCE
ABMI GROUPE FRANCE
ACE INGENIERIE – MEKABOY FRANCE
ACGB – GROUPE OTS FRANCE
ACI GROUPE – DÉFENSE & INDUSTRIE FRANCE
ACTEMIUM FRANCE
ACTIA TELECOM FRANCE
ADACIS FRANCE
AddUp FRANCE
ADETESTS FRANCE
ADOK FRANCE
ADR FRANCE
ADR USINAGE FRANCE
ADV2S FRANCE
ADVANTEN (SODIRA CONNECT) FRANCE
AEGIS PLATING FRANCE
AERACCESS FRANCE
AERIADES FRANCE
AERIX SYSTEMS FRANCE
AERO NET FRANCE
AEROCENTRE FRANCE
AEROMAPPER FRANCE
AEROSPATIUM FRANCE
AEVA (AECE GROUP) FRANCE
AFSIM FRANCE
AGELEC FRANCE
AGENIUM IT & SYSTEMS FRANCE
AGILINK GROUP FRANCE
AGLO DEVELOPPEMENT FRANCE
AGORIZE FRANCE
AGUERIS FRANCE
AIMPACT DEFENSE FRANCE
AIR ET COSMOS FRANCE
AIRUDIT FRANCE
AKG FRANCE FRANCE
AKIRA TECHNOLOGIES FRANCE
ALCEN FRANCE
ALEPH NETWORKS FRANCE
ALGODONE FRANCE
ALL PRECISION SYSTEMS FRANCE
ALPHAGUARD – PROTEC SÉCURITÉ FRANCE
ALSEAMAR FRANCE
ALSETEX FRANCE
ALSYMEX FRANCE
ALTEN FRANCE
ALTRONICS CDM FRANCE
ALTYTUD FRANCE
AMEFO FRANCE
AMETEK ULTRA PRECISION TECHNOLOGY FRANCE
AMETRA GROUP FRANCE
AMG PRO FRANCE
AMGD FRANCE
AMPHENOL FRANCE
AN2V FRANCE
A-NSE FRANCE
APAVE FRANCE
APLUS SYSTEME AUTOMATION FRANCE
APPI -TECHNOLOGY SAS FRANCE
APPLICATIONS COMPOSITES FRANCE
APS COATING SOLUTIONS FRANCE
AQUAPURE SYSTEMS FRANCE
AQUITAINE ELECTRONICS FRANCE
AREION GROUPE FRANCE
ARELIS FRANCE
ARKANIA FRANCE
ARMONA SYSTEMS FRANCE
ARMOR MECA DEVELOPPEMENT FRANCE
ARMTEK FRANCE
ARQUUS FRANCE
ART CONCEPT COMPOSITES FRANCE
ARTEM INFORMATION & STRATEGIES FRANCE
ASB FRANCE
ASELEC TECHNOLOGIES FRANCE
ASMAN TECHNOLOGY FRANCE
ASTECH PARIS REGION FRANCE
ATALANTE STRATEGIC FRANCE
ATELIERS ROCHE FRANCE
ATERMES FRANCE
ATHEA FRANCE
ATHONET FRANCE FRANCE
ATOS FRANCE
ATS – GROUPE AGS FRANCE
ATTAX FRANCE
AUXILIA FRANCE
AVANTIS TECHNOLOGY FRANCE
AVANTIX FRANCE
AVIAGROUP INDUSTRIES FRANCE
AXON CABLE FRANCE
AZUR SIEGE FRANCE FRANCE
BACHMANN RDS FRANCE
BAGALU FRANCE
BANC NATIONAL D’EPREUVE FRANCE
BAUDRY FRANCE
BEFPI FRANCE
BERNIER FRANCE
BERTIN TECHNOLOGIES FRANCE
BLACKLEAF FRANCE
BODY ARMOR RECYCLER FRANCE
BOLLE SAFETY FRANCE
BOREAL FRANCE
BOWEN FRANCE
BREN-TRONICS FRANCE
BRM INDUSTRIE FRANCE
BROKK FRANCE FRANCE
BROWNELL – DIATERO FRANCE
BRP FRANCE
BRUNO SCHERER ENTREPRISE FRANCE
BULLET LINER FRANCE FRANCE
CALIP GROUP FRANCE
CARMA MC FRANCE
CASIO-G-SHOCK FRANCE
CATOIRE SEMI FRANCE
CATS FRANCE
CCI ALSACE EUROMÉTROPOLE FRANCE
CCI BOURGOGNE FRANCHE COMTE FRANCE
CEFA FRANCE
CEFSI FRANCE
CEGELEC DEFENSE FRANCE
CELLUTEC FRANCE
CENTIGON France FRANCE
CENTRAIR FRANCE
CENTRALP FRANCE
CENTRE DE RESSOURCES DES INDUSTRIES DE LA DEFENSE FRANCE
CENTRE FRANCAIS DU CAOUTCHOUC ET DES POLYMERES FRANCE
CERBAIR FRANCE
CESTA FRANCE
CEV FRANCE
CHAMBRE DE COMMERCE ET D’INDUSTRIE PARIS IDF FRANCE
CHAMBRELAN FRANCE
CHARLATTE MANUTENTION FRANCE
CIDER ENGINEERING FRANCE
CILAS FRANCE
CIRRA PACKAGING FRANCE
CISTROM FRANCE
CLASQUIN FDS FRANCE
CLEMESSY FRANCE
CNH INDUSTRIAL FRANCE FRANCE
CNIM FRANCE
CNIM AIR SPACE FRANCE
CODECHAMP FRANCE
COGES FRANCE
COINTET INDUSTRIES FRANCE
COMETE J. PARIS FRANCE
COMEXPOSIUM SECURITY FRANCE
COMPACT GYM FRANCE
COMU SYSTEMS FRANCE
CONSCIOUS LABS FRANCE
COREDUX FRANCE
CORSO MAGENTA FRANCE
COSE FRANCE
CP FRANCE FRANCE
CROSSCALL FRANCE
CS GROUP FRANCE FRANCE
CSA FRANCE
CSTM EUROPE FRANCE
CTA INTERNATIONAL FRANCE
CUSTOM DIVING SYSTEMS FRANCE
CYALUME TECHNOLOGIES FRANCE
DAHER FRANCE
DANIELSON ENGINEERING FRANCE
DCI GROUP FRANCE
DECOLLETAGE DU BERRY FRANCE
DEGOISEY FRANCE
DELAIR FRANCE
DELFOX PREDICTIVE TECHNOLOGIES FRANCE
DELL TECHNOLOGIES FRANCE
DELTA DRONE FRANCE
DEMONSTRATIONS SECURITE-SURETE DES INFRASTRUCTURES FRANCE
DERICHEBOURG AERONAUTICS SERVICES FRANCE
DERIVERY FRANCE
DESAUTEL FRANCE
DESCHAMPS FRANCE
DESMAN FRANCE
DESSIA FRANCE
DETI MICROWAVE FRANCE
DEVERYWARE FRANCE
DEV’UP CENTRE-VAL DE LOIRE FRANCE
DIODON DRONE TECHNOLOGY FRANCE
DIRECTION GENERALE DES DOUANES ET DROITS INDIRECTS FRANCE
DIVA ROBOTICS FRANCE
DIXI MICROTECHNIQUES FRANCE
DOMUSA GROUP FRANCE
DON FOSTER FRANCE
DRÄGER FRANCE FRANCE
DRAGO PARIS FRANCE
DRONE VOLT FRANCE
DRONISOS- ICARUS SWARMS FRANCE
DUBUIS ET CIE FRANCE
DUST MOBILE FRANCE
EASTERN CIRCLES FRANCE
EASYCUBE 4 TRADING FRANCE
EBERSPÄCHER FRANCE
ECA GROUP FRANCE
ECONOMAT DES ARMÉES – EDA – FRANCE
ECOSUN INNOVATIONS FRANCE
ECRIN SYSTEMS FRANCE
EDEN FRANCE
EDISER FRANCE
EGIDIUM TECHNOLOGIES FRANCE
EIKOSIM FRANCE
EIZO FRANCE
ELAUL FRANCE
ELDIM FRANCE
ELECTROPOLI FRANCE
ELEXO FRANCE
ELIKA TEAM FRANCE
ELISTAIR FRANCE
ELLCIE HEALTHY FRANCE
ELMA ELECTRONIC FRANCE FRANCE
ELNO FRANCE
EM2 LES EMBALLAGES FRANCE
EMD FRANCE
EMILE MAURIN COMPOSANTS FRANCE
EMS CONCEPT SARL FRANCE
ENAG FRANCE
ENERGIE METAL FRANCE
EOS TECHNOLOGIE FRANCE
EPCI FRANCE
EPSI – ITNI FRANCE
ERICH JAEGER FRANCE FRANCE
ERYS GROUP FRANCE
ESARIS INDUSTRIES FRANCE
ESSONNE SECURITE / ARMORIC HOLDING FRANCE
E-TAG RFID FRANCE FRANCE
EUCLIDE INDUSTRIE FRANCE
EURENCO FRANCE
EURO BENGALE FRANCE
EUROMIP FRANCE
EUROPEAN DEFENCE REVIEW FRANCE
EUROSAM FRANCE
EUROSATCOM FRANCE
EUROSATORY LAB FRANCE
EVENEMENTS ET TERRITOIRES FRANCE
EVERAXIS FRANCE
EXAVISION FRANCE
EXPLEO FRANCE
EXXELIA FRANCE
FACTEM FRANCE
FANTASSINS FRANCE
FEDD FRANCE
FEDERAL-MOGUL SYSTEMS PROTECTION FRANCE
FFMI ASSO FRANCE
FINGERMIND FRANCE
FISCHER CONNECTORS FRANCE
FIXATION TECHNIQUE FRANCE
FLEURET FRANCE
FLEURY FRANCE
FLEX CONNECT FRANCE
FLYING EYE FRANCE
FLYING ROBOTS FRANCE SKYBIRDSVIEW FRANCE
FONDERIE BARBAS ET PLAILLY FRANCE
FONDIS ELECTRONIC FRANCE
FOSINA FRANCE
FRANCE ROBOTIQUE FRANCE
FULLSCALE FRANCE
GABRIEL ET CIE FRANCE
GACHES CHIMIE SPECIALITES FRANCE
GACI TECHNOLOGIES FRANCE
GAI4A FRANCE
GARMIN FRANCE FRANCE
GATEWATCHER FRANCE
GAUTHIER CONNECTIQUE FRANCE
GDI SIMULATION FRANCE
GEAR FRANCE
GEFICCA FRANCE
GEO4I FRANCE
GEODIS FRANCE
GEOMINES FRANCE
GEORGES MORAND FRANCE
GEOS FRANCE
GETELEC FRANCE
GICAT FRANCE
GICAT – ENERGIE OPÉRATIONNELLE FRANCE
GIE DEFENSE NBC FRANCE
GLENAIR FRANCE FRANCE
GLOBAL COMPLIANCE FRANCE
GLOBAL ROBOTICS EUROPE FRANCE
GLOBAL SMART RESCUE FRANCE
GMT FRANCE
GOLEM.AI FRANCE
GOMOUV FRANCE
GROUPE 6NAPSE FRANCE
GROUPE ABILIS FRANCE
GROUPE COURBIS FRANCE
GROUPE GODET FRANCE
GROUPE HERACLES FRANCE
GROUPE LORENTZ FRANCE
GROUPE PIROUX FRANCE
GROUPE POMMIER FRANCE
GROUPE SAGAERT FRANCE
GSSI FRANCE
GTID FRANCE
GWAGENN FRANCE
HALGAND FRANCE
HEBCO INDUSTRIE FRANCE
HELI-UNION FRANCE
HEMERIA FRANCE
HEROPOLIS FRANCE
HGH INFRARED SYSTEMS FRANCE
HIOLLE TECHNOLOGIES FRANCE
HI-TECH DETECTION SYSTEMS FRANCE
HORNET FRANCE
HOWA TRAMICO FRANCE
HUBNER GROUP HEURTEAUX FRANCE
HUTCHINSON SNC FRANCE
I-4S FRANCE
ICOHUP FRANCE
IDEA GROUPE FRANCE
IFESO FRANCE
IMEMG FRANCE
INDUSTEEL ARCELORMITTAL GROUP FRANCE
INEO DEFENSE FRANCE
INMIND-VR FRANCE
INOVEOS FRANCE
INPIXAL FRANCE
INSTITUT CARNOT MICA FRANCE
INSTITUT FRANÇAIS DES RELATIONS INTERNATIONALES – IFRI FRANCE
INTACTILE DESIGN FRANCE
INTERFACE CONCEPT FRANCE
INVIRTUS TECHNOLOGIES FRANCE
IREPA LASER FRANCE
IRTS FRANCE
IRVINGQ FRANCE
ISD – INGENIERIE SERVICES DEVELOPPEMENT FRANCE
ISL – INSTITUT FRANCO-ALLEMAND DE RECHERCHES FRANCE
ISP SYSTEM FRANCE
ITC FRANCE
ITHPP FRANCE
ITS FRANCE
IXBLUE FRANCE
JACOBI CARBONS FRANCE
JACQUES DUBOIS FRANCE
JEM FRANCE
JENOPTEC FRANCE
JERLAURE FRANCE
JOHN COCKERILL DEFENSE FRANCE FRANCE
JOHN COCKERILL FORTRESS – ADVANCED TECHNOLOGIES FRANCE
KALLISTO FRANCE
KAPI FRANCE
KEAS FRANCE
KILI TECHNOLOGY FRANCE
KONTRON FRANCE
LABCOOR FRANCE
LABORATOIRE HEMATOLOGIE MEDICO LEGALE FRANCE
LACROIX FRANCE
LAROCHE GROUP FRANCE
LATECOERE FRANCE
LATHUILLE HUDRY FRANCE
LB EQUIPEMENT FRANCE
LE BUREAU DES LEGENDES FRANCE
LEBLANC FRANCE
LEMO France FRANCE
LEPAPE FRANCE
LERITY ALCEN FRANCE
LFE FRANCE
LGM FRANCE
LIBERVIT FRANCE
LIMATECH FRANCE
LINE-X SRPP FRANCE
LISI AEROSPACE FRANCE
LMB FRANCE
LOGIC INSTRUMENT FRANCE
LUCEOR FRANCE
LUCHARD DÉCALCOLUX FRANCE
LUXERI FRANCE
LYNRED FRANCE
LYNXTER FRANCE
MAFELEC FRANCE
MAGELLIUM FRANCE
MAGYAR SA. FRANCE
MAINTLOG FRANCE
MAISONNEUVE FRANCE
MANITOU BF FRANCE
MANKIEWICZ FRANCE FRANCE
MANUFACTURE DU HAUT RHIN FRANCE
MARCEL INDUSTRIE FRANCE
MARCK & BALSAN FRANCE
MARREL FRANCE
MASA GROUP FRANCE
MATISEC FRANCE
MATRA ELECTRONIQUE FRANCE
MBDA FRANCE
MC2 TECHNOLOGIES FRANCE
MCE-5 DEVELOPMENT FRANCE
MECABRIVE INDUSTRIES FRANCE
MECALECTRO FRANCE
MECANIQUE 2 L FRANCE
MECAPOLE FRANCE
MECHANICAL WARRIORS FRANCE
MERIO FRANCE
METALHOM FRANCE
METRACOM FRANCE
METRAVIB DEFENCE FRANCE
MGB FRANCE
MICHELIN FRANCE
MILTON FRANCE
MINISTÈRE DE L’INTÉRIEUR FRANCE
MINISTERE DES ARMEES FRANCE
MIRION TECHNOLOGIES FRANCE
MK COMPOSITES – MEKAMICRON FRANCE
MOABI FRANCE
MONKILOWATT FRANCE
MOOG FRANCE
MORIN SAS FRANCE
MOS FRANCE
MSA SAFETY FRANCE
MUSTHANE FRANCE
MYDATAMODELS FRANCE
NBC SYS FRANCE
NEOPOLIA FRANCE
NEOTEK FRANCE
NEXTER SYSTEMS FRANCE
NEXVISION FRANCE
NICOLAS INDUSTRIES FRANCE
NICOMATIC FRANCE
NIJKERK COMPUTER SOLUTIONS FRANCE
NITD FRANCE
NOBEL SPORT FRANCE
NORMANDIE AEROESPACE FRANCE
NOVADEM FRANCE
NOVAE FRANCE
NOVAE FRANCE
NOVAKAMP FRANCE
NOVIUM FRANCE
NOXANT FRANCE
NSE FRANCE
NUANCES TECHNOLOGIES FRANCE
NUKKAI FRANCE
NUMALIS FRANCE
NYCO FRANCE
ODU FRANCE FRANCE
ODYSSEE SYSTEMES FRANCE
OERLIKON SURFACE SOLUTIONS FRANCE
OLEDCOMM FRANCE
ONEEX FRANCE
OPPIDA FRANCE
OPTALM FRANCE
ORBITICA FRANCE
ORIGINAL CUSTOM COMPONENTS FRANCE
OROLIA FRANCE
OSAC FRANCE
OUTSIGHT FRANCE
OUVRY FRANCE
OWLINT FRANCE
P&C INTERNATIONAL FRANCE
PANASONIC CONNECT TOUGHBOOK FRANCE
PANGOLIN DEFENSE FRANCE
PARCOOR SAS FRANCE
PAUL BOYE TECHNOLOGIES FRANCE
PAVILLON GICAT FRANCE
PB SOLUTIONS FRANCE
PCB PIEZOTRONICS FRANCE
PELI PRODUCTS FRANCE FRANCE
PELICO FRANCE
PERIPHERAL FRANCE
PETERCEM FRANCE
PGM PRECISION FRANCE
PHOENIX EQUIPEMENT FRANCE
PHOTONIS GROUP FRANCE
PIERRE PEZET FRANCE
PLANCY MECA FRANCE
PLR GROUP (TAUR) FRANCE
POLYMERIS FRANCE
POSITHOT FRANCE
POWEREX EUROPE FRANCE
PRECICAST FRANCE
PRECISION TECHNIC DEFENCE FRANCE
PRELIGENS FRANCE
PRIMUS DEFENSE ET SECURITE FRANCE
PROBAYES FRANCE
PROCOMM MMC FRANCE
PROENGIN FRANCE
PROLANN FRANCE
PROMETHEE FRANCE
PROMODELS FRANCE
PRONAL FRANCE
PRONERGY – FAAR FRANCE
PROSHOCK FRANCE
PROTEC GROUP FRANCE
PROTECOP FRANCE
PROTUBE VR FRANCE
PROVENRUN FRANCE
PSM MÉDICALISATION FRANCE
PULSE MC² FRANCE
PULSE MC² NIGHTSEARCHER FRANCE
PYROALLIANCE FRANCE
QUANTUM FRANCE
QUIRI HYDROMECANIQUE FRANCE
R&DNANO FRANCE
RADIALL FRANCE
RAFAUT GROUP FRANCE
REGION NOUVELLE-AQUITAINE FRANCE
RELLUMIX FRANCE
REMORQUES LOUAULT FRANCE
RENAULT TRUCKS FRANCE
RESA FRANCE
RESSORTS MASSELIN FRANCE
RFENCE FRANCE
RICHARD PONTVERT FRANCE
RISK & CO FRANCE
RIVOLIER FRANCE
RODA COMPUTER FRANCE
RODRIGUEZ GMBH FRANCE FRANCE
ROUSSEL FRÈRES PRÉCISION MÉCANIQUE FRANCE
ROXEL FRANCE FRANCE
RPM – POLARIS FRANCE
RXR PROTECT FRANCE
S2M EQUIPMENT FRANCE
S2P – SMART PLASTIC PRODUCTS FRANCE
SAFE CLUSTER FRANCE
SAFRAN FRANCE
SAFRAN ELECTRONICS & DEFENSE FRANCE
SAFT FRANCE
SAHAR FRANCE
SAIB CONNECTIQUE FRANCE
SAINT-GOBAIN FRANCE
SAPEM SA FRANCE
SAS SPEMA FRANCE
SATAM SAS FRANCE
SBG SYSTEMS FRANCE
SCANIA FRANCE FRANCE
SCOPEX FRANCE
SCROME (ELYNXO GROUP) FRANCE
SEAT TEC FRANCE FRANCE
SECOURS MAG/SECOURS EXPO FRANCE
SEDI-ATI FRANCE
SEF POWER – CNB ELECTRONIQUE FRANCE
SELHA GROUP FRANCE
SEMAWORLD FRANCE
SENSIVIC FRANCE
SENSUP FRANCE
SENTINEL FRANCE
SEPROLEC FRANCE
SEPTEC FRANCE
SERA INGENIERIE FRANCE
SERENICITY FRANCE
SERT FRANCE
SERVICE DE L’ENERGIE OPERATIONNELLE FRANCE
SERVICE DE SANTÉ DES ARMÉES – DIRECTION CENTRALE FRANCE
SHARK ROBOTICS FRANCE
SHERWIN-WILLIAMS FRANCE
SIDES FRANCE
SIFCO ASC FRANCE
SILLINGER FRANCE
SILMACH FRANCE
SIO FRANCE
SLTS FRANCE
SMAC FRANCE
SNDMECA INDUSTRIE FRANCE
SOCIETE DE MECANIQUE CHAMPENOISE – SMC FRANCE
SOCITEC FRANCE
SOFEMA FRANCE
SOFRAME FRANCE
SOFRIGAM FRANCE
SOGITEC FRANCE
SOLARMTEX FRANCE
SOLCERA FRANCE
SOLUTECH INDUSTRIES FRANCE
SOPEMEA FRANCE
SOPRA STERIA FRANCE
SOTREM SEO FRANCE
SPHEREA FRANCE
SPRING FRANCE
STAHLWILLE FRANCE
STAR PACK FRANCE
STARNAV FRANCE
STARTER GROUPE DLD FRANCE
STÄUBLI FAVERGES FRANCE
STERELA FRANCE
STID FRANCE
STRATIFORME INDUSTRIES FRANCE
STREAMWIDE FRANCE
STRUCTURAL FASTENERS FACTORY FRANCE
SUCHIER SAS FRANCE
SUDP FRANCE
SUEZ FRANCE
SYANS FRANCE
SYMBIO FRANCE
SYMETRIE FRANCE
SYNOPIA FRANCE
SYSNAV FRANCE
SYT TECHNOLOGIES FRANCE
TARRERIAS BONJEAN / TB OUTDOOR FRANCE
TDM INGÉNIERIE FRANCE
TE CONNECTIVITY FRANCE
TEASERPUB FRANCE
TECHNAMM FRANCE
TECHNIC EXPORT FRANCE
TECHNIC SERIGRAPHIE SERVICE FRANCE
TECHWAVE FRANCE
TECHWAY FRANCE
TECKNISOLAR SENI FRANCE
TECSUP FRANCE
TELEFLOW FRANCE
TELESPAZIO FRANCE FRANCE
TENCATE ADVANCED ARMOUR FRANCE
TENEXIUM FRANCE
TERFACE FRANCE
TERNWAVES FRANCE
TERRANG MP SEC FRANCE FRANCE
TEXELIS FRANCE
THALES FRANCE
THALES SIX GTS FRANCE
THERMOBILE FRANCE FRANCE
THIOT INGENIERIE FRANCE
TIAG INDUSTRIES FRANCE
TITAN DEFENSE FRANCE
TITAN PREFA FRANCE
TODA PHARMA FRANCE
TOLERIE JANNIN CARNET FRANCE
T-OPS FRANCE
TOUTENKAMION GROUP FRANCE
TR EQUIPEMENT FRANCE
TRAAK FRANCE
TRA-C INDUSTRIE FRANCE
TRACIP FRANCE
TRELLEBORG INDUSTRIE FRANCE
TRIUMPH CONTROLS FRANCE FRANCE
TRYAME FRANCE
TVI GROUPE FRANCE
TWO-I FRANCE
TYCO ELECTRONICS France FRANCE
TYVA ENERGIE FRANCE
ULTRATECH FRANCE
UNITIVE FRANCE
UNIVEIRA FRANCE
UNSEENLABS FRANCE
UTILIS FRANCE
VERNEY CARRON SECURITY FRANCE
VERRE INDUSTRIE FRANCE
VISTORY FRANCE
VITABRI FRANCE
VITEC SA FRANCE
VODEA FRANCE
VOLUM-e FRANCE
WARYME FRANCE
WEARTRONIC WEET FRANCE
WEEPACKUP FRANCE
WELKIT FRANCE
WORKSHOP MOBILE – MECAMINUTE FRANCE
XXII FRANCE
YELLOZ COMPONENTS FRANCE
ZEBRA TECHNOLOGIES CORPORATION FRANCE
ZHENDRE FRANCE
SOAIRTECH GEORGIA
ACS – ARMOURED CAR SYSTEMS GERMANY
AGP EUROPE GERMANY
AIM INFRAROT-MODULE GERMANY
ALBRECHT BENDER GERMANY
AUTOFLUG GERMANY
B-B SYSTEMTECHNIK GERMANY
BDSV E.V. GERMANY
BLACKNED GERMANY
BLÜCHER GERMANY
BRABUS AUTOMOTIVE GERMANY
BRUKER OPTICS GERMANY
BRUNS MESSE- UND AUSSTELLUNGSGESTALTUNG GERMANY
BSST GERMANY
CCO CREATIVE CONSULTING GERMANY
CEOTRONICS GERMANY
CERAMTEC-ETEC GERMANY
DAIMLER TRUCK GERMANY
DIEHL DEFENCE GERMANY
DILLINGER HÜTTENWERKE GERMANY
DOLL FAHRZEUGBAU GERMANY
DREHTAINER GERMANY
DST DEFENCE SERVICE TRACKS GERMANY
DYNAMIT NOBEL DEFENCE GERMANY
EUROPLAST-NYCAST GERMANY
EUROSPIKE GERMANY
EUROTROPHY GERMANY
F.W.BREITHAUPT & SOHN GERMANY
FFG FLENSBURGER FAHRZEUGBAU GESELLSCHAFT GERMANY
FISCHER PANDA GERMANY
GERMANDRONES GERMANY
GETAC TECHNOLOGY GERMANY
GHOSTHOOD GERMANY
GOFA GOCHER FAHRZEUGBAU GERMANY
GUS GLASS + SAFETY GERMANY
HAIX-SCHUHE GERMANY
HARTMANN ELECTRONIC GERMANY
HECKLER & KOCH GERMANY
HEMSCHEIDT FAHRWERKTECHNIK GERMANY
HENSOLDT GERMANY
HETEK LIFT- UND HEBETECHNIK GERMANY
HTS TENTIQ GERMANY
HÜBNER GERMANY
IABG GERMANY
ILSENBURGER GROBBLECH GERMANY
JENOPTIK OPTICAL SYSTEMS GERMANY
JOWO – SYSTEMTECHNIK GERMANY
JUNGHANS DEFENCE GERMANY
KÄRCHER FUTURETECH GERMANY
KARODUR-WIRKTELLER GERMANY
KESSLER+CO. GERMANY
KIDDE DEUGRA GERMANY
KÖNIG KOMFORT-U RENNSITZE GERMANY
KRAUSS-MAFFEI WEGMANN GERMANY
LANCO GROUP GERMANY
LEITSTANDSYSTEME STEFAN GROISSMEIER GERMANY
LINDNERHOF-TAKTIK GERMANY
MAHLE INDUSTRIAL THERMAL SYSTEMS GERMANY
MANN+HUMMEL GERMANY
MEHLER ENGINEERED DEFENCE GERMANY
MEHLER VARIO SYSTEM GERMANY
MERCEDES-BENZ GROUP GERMANY
METALLWERK ELISENHÜTTE GERMANY
MIPA SE GERMANY
MITTLER REPORT VERLAG GERMANY
MONCH MEDIA GERMANY
MOTEC GERMANY
NEMS GERMANY
NORTHROP GRUMMAN LITEF GERMANY
NOVORIZON GERMANY
OCCAR-EA GERMANY
PASS MEDIENTECHNIK GERMANY
POWERMOON GERMANY
PROBATEC GERMANY
PSM PROJEKT SYSTEM & MANAGEMENT GERMANY
RENK GROUP GERMANY
RHEINMETALL GERMANY
ROHDE & SCHWARZ GERMANY
ROLLS-ROYCE SOLUTIONS GERMANY
ROTZLER DEUTSCHLAND GERMANY
RUD KETTEN RIEGER & DIETZ GERMANY
SCANDEX AG GERMANY
SCHEUERLE FAHRZEUGFABRIK GERMANY
SCHLEIFRING GERMANY
SCHMIDT & BENDER GERMANY
SCHMITZ CARGOBULL GERMANY
SCHUNK GERMANY
SFC ENERGY GERMANY
SMAG MOBILE ANTENNA MASTS GERMANY
STEINBACH GERMANY
STEINER OPTIK GERMANY
SYKO GERMANY
TATONKA GERMANY
TDW GESELLSCHAFT FÜR VERTEIDIGUNGSTECHNISCHE GERMANY
TEIJIN ARAMID GERMANY
TELEROB GESELLSCHAFT FÜR FERNHANTIERUNGSTECHNIK GERMANY
TI.SYSTEMS GERMANY
WEBASTO THERMO & COMFORT SE GERMANY
WEISS TECHNIK GERMANY
WELP HOLDING GERMANY
WILHELM LAUSBERG & SOHN GERMANY
WITTENSTEIN MOTION CONTROL GERMANY
ZARGES GERMANY
AADS GIBRALTAR
CENSUS GREECE
ELMON GREECE
EODH GREECE
EUROTRADE SA GREECE
HELLENIC MANUFACTURERS OF DEFENCE MATERIAL ASSOCIA GREECE
INTRACOM DEFENSE SINGLE MEMBER GREECE
MENGIA GREECE
NATO MISSILE FIRING INSTALLATION (NAMFI) GREECE
ROTA SA – DEFEA GREECE
SCYTALYS GREECE
THEON SENSORS GREECE
CYBER SMART HONG KONG
DATA PROFIT INTERNATIONAL LIMITED HONG KONG
HONGKONG HIMARK ELECTRON MODEL LIMITED HONG KONG
LANDS MARINE SYSTEMS BY KOLEN & KOLEN HONG-KONG HONG KONG
AERINX KFT HUNGARY
BHE BONN HUNGARY ELECTRONICS HUNGARY
LOGIPIX LTD. HUNGARY
PRO PATRIA ELECTRONICS HUNGARY
BHARAT DYNAMICS INDIA
BHARAT ELECTRONICS INDIA
CHANAKYA AEROSPACE, DEFENCE & MARITIME REVIEW INDIA
COMINT SYSTEMS AND SOLUTIONS PVT INDIA
DCM SHRIRAM INDUSTRIES LIMITED INDIA
ENTEC ADVANCED TECHNOLOGIES LIMITED INDIA
ENTREMONDE POLYCOATERS LIMITED INDIA
FORCE MAGAZINE INDIA
FRONTIER PROTECTIVEWEAR INDIA
HYDERABAD PRECISION MANUFACTURING COMPANY INDIA
INDIAN CHAMBER OF COMMERCE INDIA
JEET & JEET GLASS AND CHEM P INDIA
KUSUMGAR CORPORATES PRIVATE LIMITED INDIA
MICRON INSTRUMENTS INDIA
MKU INDIA
MOLBIO DIAGNOSTICS PRIVATE LIMITED INDIA
MUNITIONS INDIA LIMITED INDIA
OM EXPORTS INDIA
PRECISION ELECTRONICS INDIA
RRP S4E INNOVATION INDIA
RUNFLAT TIRE SYSTEMS INDIA
SANATHAN ALLIED INDUSTRIES INDIA
SERVOCONTROLS AEROSPACE INDIA INDIA
SMPP PVR. LTD. (SM Carapace Armor) INDIA
SPS LAND FORCES INDIA
STAR WIRE INDIA INDIA
SUTTATTI ENTERPRISES INDIA
TURBO INDIA INTERCONNECT SOLUTIONS INDIA
VICTORA AUTO PRIVATE LIMITED INDIA
INDODEFENCE 2022 EXPO & FORUM INDONESIA
CALYPSO AI IRELAND
INNALABS LIMITED IRELAND
POWELL ELECTRONICS IRELAND
TIMONEY TECHNOLOGY IRELAND
VRAI IRELAND
AERONAUTICS GROUP ISRAEL
AVNON GROUP ISRAEL
BAT-BEIT ALFA TECHNOLOGIES LTD ISRAEL
BETH-EL ZIKHRON YAAQOV INDUSTRIES ISRAEL
BIRD AEROSYSTEMS ISRAEL
BLUEBIRD AERO SYSTEMS ISRAEL
CAA GROUP ISRAEL
CAMERO-TECH ISRAEL
CI SYSTEMS ISRAEL
COGNATA ISRAEL
COLUGO SYSTEMS ISRAEL
COMMTACT LTD. ISRAEL
CONDOR PACIFIC LTD. ISRAEL
CONTROP PRECISION TECHNOLOGIES ISRAEL
COPTERPIX ISRAEL
CTI COMPUTECH INTERNATIONAL ISRAEL
ELBIT SYSTEMS ISRAEL
EPSILOR ISRAEL
FIBROTEX TECHNOLOGIES ISRAEL
GATE TECHNOLOGIES ISRAEL
GENERAL ROBOTICS ISRAEL
GILAT TELECOM ISRAEL
GOLDTEC TECHNOLOGIES ISRAEL
HAGOR INDUSTRIES ISRAEL
IAI – ISRAEL AEROSPACE INDUSTRIES ISRAEL
IMPERTECH IND. LTD ISRAEL
INFINIDOME ISRAEL
ISRAEL MINISTRY OF DEFENSE – SIBAT ISRAEL
IWI – ISRAEL WEAPON INDUSTRIES ISRAEL
MAGAM SAFETY LTD ISRAEL
MAGNA BSP LTD. ISRAEL
MARIS TECH ISRAEL
MAROM DOLPHIN ISRAEL
MEPROLIGHT LTD ISRAEL
MIFRAM LTD ISRAEL
MOBIUS PROTECTION SYSTEMS ISRAEL
NETLINE COMMUNICATIONS TECHNOLOGIES ISRAEL
OPHIR OPTRONICS SOLUTIONS ISRAEL
ORTECH DEFENCE SYSTEMS ISRAEL
OSG ISRAEL
PAXIS ISRAEL
PHANTOM TECHNOLOGIES ISRAEL
PHYSICAL LOGIC ISRAEL
PLASAN SASA ISRAEL
RADA ELECTRONIC INDUSTRIES ISRAEL
RAFAEL ADVANCED DEFENSE SYSTEMS ISRAEL
REDLER TECHNOLOGIES ISRAEL
RESHET GRAF ISRAEL
ROBOTEAM ISRAEL
ROBOTICAN ISRAEL
RP OPTICAL LAB ISRAEL
RT LTA SYSTEMS ISRAEL
SCD – SEMI CONDUCTOR DEVICES ISRAEL
SHLADOT ISRAEL
SILYNX ISRAEL
SK GROUP ISRAEL
SMART SHOOTER ISRAEL
SOURCE VAGABOND SYSTEMS ISRAEL
SPEAR ISRAEL
STEADICOPTER ISRAEL
THIRD EYE SYSTEMS ISRAEL
TOMER – A GOVERNMENT-OWNED COMPANY ISRAEL
UVISION ISRAEL
VOYAGER LABS ISRAEL
WATCHFOR.TV ISRAEL
XTEND REALITY EXPANSION ISRAEL
AIAD & M.O.D ITALY
AMATEC ITALY
BAI BRESCIA ANTINCENDI INTERNATIONAL ITALY
BDT-  BERETTA DEFENSE TECHNOLOGIES ITALY
BENELLI ARMI ITALY
BIEMMEDUE ITALY
CEIA ITALY
CIO IVECO OTO MELARA ITALY
CORMACH ITALY
CPM ELETTRONICA ITALY
CRISTANINI ITALY
DEFCON 5 ITALY
EMILIANA SERBATOI ITALY
EXCOSYSTEM ITALY
EXPLORER CASES BY GT LINE ITALY
FASSI GRU ITALY
FIOCCHI MUNIZIONI ITALY
FIRECO ITALY
FOX KNIVES – ORESTE FRATI ITALY
GALPERTI TECH FORGED PRODUCTS ITALY
GOMEDIA SATCOM ITALY
GORIZIANE GROUP ITALY
IMEAR ITALY
ISOCLIMA ITALY
ITALWATT ITALY
IVECO DEFENCE VEHICLES ITALY
LA GRIFFE ITALY
LEONARDO ITALY
M.D.M. ITALY
M.E.RIN ITALY
MASPEROTECH SRL ITALY
NURJANA TECHNOLOGIES ITALY
OMP ENGINEERING ITALY
PLASTICA PANARO ITALY
PRO-SYSTEMS ITALY
RADAR LEATHER DIVISION ITALY
RCD ITALY
SAATI ITALY
SIMOL SPA ITALY
TASTITALIA ITALY
TCM ITALY
VEGA HOLSTER ITALY
PES IVORY COAST
ACQUISITION TECHNOLOGY & LOGISTICS AGENCY JAPAN
FLE CO., LTD. JAPAN
MITSUBISHI ELECTRIC CORPORATION JAPAN
MITSUBISHI HEAVY INDUSTRIES JAPAN
NSBT JAPAN JAPAN
TAMAGAWA SEIKI JAPAN
TOSHIBA INFRASTRUCTURE SYSTEMS & SOLUTIONS CORPORATION JAPAN
ALMADK KAZAKHSTAN
WEST-KAZAKHSTAN MACHINE BUILDING COMPANY (ZKMK) KAZAKHSTAN
BELSS LATVIA
BRASA DEFENCE SYSTEMS LATVIA
CATCHSMART LATVIA
EDGE AUTONOMY LATVIA
EDGE AUTONOMY EUROPE LATVIA
ELECTRONIC COMMUNICATIONS OFFICE OF LATVIA SJSC LATVIA
FEDERATION OF SECURITY AND DEFENCE INDUSTRIES OF LATVIA (FSDI) LATVIA
FIXAR AERO LATVIA
LMT LATVIA
RIOT ENGINEERING LATVIA
SIA “RIGAS DIZELIS DG” LATVIA
TAGINN EUROPE LATVIA
DEFENCE 21 LEBANON
ATRI JSC LITHUANIA
BALTIC INSTITUTE OF ADVANCED TECHNOLOGY (BPTI) LITHUANIA
CELLULAR EXPERT LITHUANIA
ENTERPRISE LITHUANIA LITHUANIA
GRANTA SOLUTIONS LITHUANIA
JSC ADOS-TECH LITHUANIA
JSC AERODIAGNOSTIKA LITHUANIA
JSC BROLIS SEMICONDUCTORS LITHUANIA
JSC NT SERVICE LITHUANIA
OSTARA LITHUANIA
TIGBIS, JSC LITHUANIA
VAIZDUOTE, JSC LITHUANIA
ACTINBLACK EUROPE LUXEMBOURG
AMPHINICY Luxembourg LUXEMBOURG
CHAMBRE DE COMMERCE DU LUXEMBOURG LUXEMBOURG
EURO-COMPOSITES LUXEMBOURG
FAYMONVILLE DISTRIBUTION LUXEMBOURG
FLEN HEALTH LUXEMBOURG
GRADEL LUXEMBOURG
HITEC LUXEMBOURG LUXEMBOURG
KLEOS SPACE SARL LUXEMBOURG
LIFTEUROP LUXEMBOURG
LUXGOVSAT LUXEMBOURG
LUXTRUST LUXEMBOURG
MOLECULAR PLASMA GROUP LUXEMBOURG
NO NAIL BOXES LUXEMBOURG
OIKOS-CONCEPT LUXEMBOURG
RHEA SYSTEM LUXEMBOURG LUXEMBOURG
SATURNE TECHNOLOGY LUXEMBOURG
SES ASTRA LUXEMBOURG
SHP MEDIA MALAYSIA
SPARTACUS TECHNOLOGY MEXICO
BALSEAL ENGINEERING NETHERLANDS
CONTOUR ADVANCED SYSTEMS NETHERLANDS
CRYSTAL COMPANY B.V. NETHERLANDS
DEFENTURE NETHERLANDS
DELFT DYNAMICS NETHERLANDS
DSM PROTECTIVE MATERIALS NETHERLANDS
EXTRON NETHERLANDS
GEMCO MOBILE SAFETY NETHERLANDS
HOTZONE SOLUTIONS GROUP NETHERLANDS
IB CONSULTANCY NETHERLANDS
INNODISK EUROPE NETHERLANDS
INTESPRING NETHERLANDS
KNDS – KMW+NEXTER DEFENSE SYSTEMS N.V. NETHERLANDS
KONI – AN ITT COMPANY NETHERLANDS
LIFT-TEX HEAVY LIFT SLINGS NETHERLANDS
MINISTRY OF DEFENCE, SECTION MARKETING & SALES NETHERLANDS
NEDINSCO NETHERLANDS
NETHERLANDS INDUSTRIES FOR DEFENCE AND SECURITY NETHERLANDS
ORLACO PRODUCTS NETHERLANDS
POTTI CORP. EU NETHERLANDS
SEKO Logistics NETHERLANDS
SIGNIFY NETHERLANDS
THERMOBILE NETHERLANDS
TNO DEFENCE, SAFETY & SECURITY NETHERLANDS
TRANSCONTINENTA NETHERLANDS
TSS INTERNATIONAL NETHERLANDS
V.S.E. VEHICLE SYSTEMS ENGINEERING NETHERLANDS
VAN HALTEREN DEFENCE NETHERLANDS
PROFORCE LIMITED NIGERIA
ATS GROUP DOOEL SKOPJE NORTH MACEDONIA
AXNES NORWAY
COMROD COMMUNICATION NORWAY
DALETEC AS NORWAY
FJORD DEFENCE NORWAY
GALLEON EMBEDDED COMPUTING NORWAY
KITRON NORWAY
KONGSBERG DEFENCE & AEROSPACE AS NORWAY
NAMMO NORWAY
NFM GROUP NORWAY
NORLENSE AS NORWAY
NORWEGIAN DEFENCE & SECURITY INDUSTRIES ASSOCIATION NORWAY
RADIONOR COMMUNICATIONS NORWAY
REBS NORWAY
SHARKCAGE NORWAY
TELEPLAN GLOBE AS NORWAY
THALES NORWAY NORWAY
TOTAL DEFENCE GROUP NORWAY
VÅPENSMIA NORWAY
ALSONS INDUSTRIES (PVT) PAKISTAN
DEFENCE EXPORT PROMOTION ORGANIZATION-DEPO PAKISTAN
EMBROIDERY EXPORT CORP PAKISTAN
METASCO INTERNATIONAL PAKISTAN
MILIT FORCE MANUFACTURERS AND EXPORTERS PAKISTAN
PAKISTAN ORDNANCE FACTORIES (POF) PAKISTAN
POPULAR FABRICS LIMITED PAKISTAN
SAPPHIRE FINISHING MILLS PAKISTAN
4MILITARY – RUBOX BALLISTIC WALL SYSTEM POLAND
ADVANCED PROTECTION SYSTEMS POLAND
AP-FLYER SP. Z O.O. POLAND
DIRECT ACTION POLAND
GMP DEFENCE POLAND
KADAR POLAND SP. Z O.O. POLAND
MSPO 2022, KIELCE-POLAND POLAND
PGZ POLAND
PIAP – INDUSTRIAL RESEARCH INSTITUTE POLAND
WB GROUP POLAND
AIGA CONCEPT PORTUGAL
ALBISABORES PORTUGAL
EID PORTUGAL
ACF INDUSTRIE ROMANIA
DIGITAL BIT ROMANIA
ICPE ROMANIA
PIONEERS TECHNICAL SYSTEMS COMPANY SAUDI ARABIA
RAY SERVICE MIDDLE EAST SAUDI ARABIA
PRDC DOO SERBIA
YUGOIMPORT-SDPR SERBIA
GLOBAL BUSINESS PRESS SINGAPORE
ST ENGINEERING SINGAPORE
ALITER TECHNOLOGIES SLOVAKIA
METRODAT SLOVAKIA
MSM HOLDING S.R.O. SLOVAKIA
NIXUS SLOVAKIA
S.G.S. – EXPO SLOVAKIA
SEC TECHNOLOGIES SLOVAKIA
SPINEA SLOVAKIA
AREX D.O.O. SENTJERNEJ SLOVENIA
BIJOL D.O.O. SLOVENIA
C-ASTRAL D.O.O. SLOVENIA
DAT – CON D.O.O. SLOVENIA
ELAN D.O.O. SLOVENIA
EM.TRONIC D.O.O. SLOVENIA
GUARDIARIS D.O.O. SLOVENIA
MIL SISTEMIKA D.O.O. SLOVENIA
MINISTRY OF DEFENCE OF THE REPUBLIC OF SLOVENIA SLOVENIA
PREVENT&DELOZA D.O.O. SLOVENIA
RTC SLOVENIA
SLOVENIAN DEFENCE INDUSTRY CLUSTER-GOIS SLOVENIA
SPIRIT SLOVENIJA, PUBLIC AGENCY SLOVENIA
STUBELJ D.O.O. SLOVENIA
TIMTEC DEFENSE SLOVENIA
TRIVAL ANTENE D.O.O. SLOVENIA
VALHALLA TURRETS D.O.O. SLOVENIA
ZEBRA ARMOUR SOUTH AFRICA
BUMHAN FUEL CELL CO SOUTH KOREA
C-RICH CO. SOUTH KOREA
DASAN MACHINERIES CO. SOUTH KOREA
DONG IN OPTICAL SOUTH KOREA
ELECTRONIC DEVICE SOLUTION SOUTH KOREA
FS CO. SOUTH KOREA
HANWHA DEFENSE SOUTH KOREA
HYUNDAI ROTEM COMPANY SOUTH KOREA
I3SYSTEM SOUTH KOREA
KOREA CNO TECH CO. SOUTH KOREA
KOREA DEFENSE INDUSTRY ASSOCIATION SOUTH KOREA
LOTUS INTERNATIONAL COMPANY SOUTH KOREA
POONGSAN CORPORATION SOUTH KOREA
ROTAC SOUTH KOREA
TBT SOUTH KOREA
VITZROCELL CO SOUTH KOREA
WOORIBYUL. CO. SOUTH KOREA
YEONHAB PRECISION SOUTH KOREA
YOUNG POONG ELECTRONICS SOUTH KOREA
ARQUIMEA SPAIN
CENTUM SPAIN
ENGINEERED LAND SYSTEMS SPAIN
EQUIPOS INDUSTRIALES DE MANUTENCION SPAIN
ESCRIBANO MECHANICAL & ENGINEERING SPAIN
EXPAL SYSTEMS SPAIN
FALKEN S.A.U. SPAIN
GENERAL DYNAMICS EUROPEAN LAND SYSTEMS SPAIN
GMV AEROSPACE AND DEFENSE SPAIN
GTD SPAIN
IBEROPTICS SPAIN
IKONOS PRESS – FAM-FUERZAS MILITARES SPAIN
INDRA SPAIN
INFODEFENSA.COM SPAIN
INSTALAZA SPAIN
IRAUNDI SPECIAL BEARINGS SPAIN
MADES SPAIN
NAVANTIA SPAIN
PIEDRAFITA SL SPAIN
PLESIUM, S.L. SPAIN
SAPA PLACENCIA SPAIN
SDLE – STAR DEFENCE LOGISTICS & ENGINEERING SPAIN
TECNOBIT SPAIN
TEDAE – ASOCIACION ESPAÑOLA SPAIN
TSD INTERNATIONAL SPAIN
URO SPAIN
3M / PELTOR SWEDEN
ACCURATE NORDIC SWEDEN
AFRY SWEDEN
AIMPOINT AB SWEDEN
ARCQOR SWEDEN
BOFORS TEST CENTER SWEDEN
CARMENTA GEOSPATIAL TECHNOLOGIES SWEDEN
CLAVISTER SWEDEN
CLP SYSTEM SWEDEN
COMBITECH SWEDEN
COMEX ELECTRONICS SWEDEN
DEFORM AB SWEDEN
EXENSOR SWEDEN
FMV SWEDEN
HABIA CABLE SWEDEN
HANDHELD EUROPE SWEDEN
HUNNA SWEDEN
IRNOVA AB SWEDEN
MICROPOL FIBEROPTIC SWEDEN
MILDEF SWEDEN
MW GROUP SWEDEN
ONEMED SWEDEN
OVZON SWEDEN
PITCH TECHNOLOGIES SWEDEN
RECOTECH SWEDEN
SAAB SWEDEN
SCANIA CV AB SWEDEN
SEPSON SWEDEN
SSAB / ARMOX SWEDEN
SWEDISH SECURITY & DEFENCE INDUSTRY SWEDEN
SYSTECON SWEDEN
SYSTEM ENGINEERING SOLUTION 37 SWEDEN
VOLVO DEFENSE SWEDEN
WATERPROOF DIVING INTERNATIONAL SWEDEN
ANAVIA SWITZERLAND
CATHYOR ENGINEERING SWITZERLAND
DUPONT INTERNATIONAL OPERATIONS SWITZERLAND
FAIR MANAGEMENT SWITZERLAND
GLOBAL CLEARANCE SOLUTIONS SWITZERLAND
HEXAGON SWITZERLAND
HONEYWELL SWITZERLAND
HUBER+SUHNER SWITZERLAND
IRDAM SWITZERLAND
IVF HARTMANN SWITZERLAND
LECLANCHÉ SWITZERLAND
POLYTRONIC INTERNATIONAL SWITZERLAND
RIPENERGY SWITZERLAND
RUAG  AG SWITZERLAND
RUAG AMMOTEC AG SWITZERLAND
SALTECH SWITZERLAND
SOLIFOS SWITZERLAND
SSZ CAMOUFLAGE TECHNOLOGY AG SWITZERLAND
SWISSOPTIC SWITZERLAND
SYMLAB SWITZERLAND
THALES SUISSE SWITZERLAND
VICTORINOX SWITZERLAND
HONG YANG BUCKLE TAIWAN
CHAISERI METAL & RUBBER CO THAILAND
DIGITAL RESEARCH AND CONSULTING CO THAILAND
MEDIA TRANSASIA THAILAND
AC PROJE TASARIM TURKEY
ARMASSGLASS TURKEY
ASELSAN TURKEY
ATESCI TURKEY
BAROK SAVUNMA VE TASARIM MÜHENDISLIK TURKEY
BARTEZ CAM SAN. VE TIC. A.S. TURKEY
BMC TURKEY
CES ADVANCED COMPOSITE AND DEFENCE TECHNOLOGIES TURKEY
ÇUKUROVA MAKINA IMALAT VE TICARET TURKEY
EREGLI DEMIR VE ÇELIK FABRIKASI TURKEY
FEMSAN ELECTRIC MOTORS TURKEY
GARANTI GIYIM KOMPOZIT TEKNOLOJILERI TURKEY
GRUP IMPEKS TURKEY
HAMMER ENDÜSTRI IS MAKINALARI HIDROLIK SAN. IÇ VE TURKEY
HYPSUS MÜHENDISLIK VE SÜSPANSIYON SISTEMLERI ANONIM SIRKETI TURKEY
IPEK SAVUNMA SANAYI LIMITED SIRKETI TURKEY
KALE ARASTIRMA GELISTIRME TURKEY
KALEKALIP MAKINA VE KALIP SAN. A.S. TURKEY
MAKEL MEKANIK MÜHENDISLIK TURKEY
MENATEK DEFENSE TECHNOLOGIES TURKEY
MILDATA PRODUKSIYON TURKEY
MILPOWER SAVUNMA SISTEMLERI TURKEY
NORM TURKEY
OTOKAR TURKEY
OZTEK TEKSTIL TERBIYE TESISLERI TURKEY
ÖZTIRYAKILER SAVUNMA EKIPMANLARI SAN. VE TIC.A.S. TURKEY
REPKON TURKEY
ROKETSAN MISSILES INDUSTRIES TURKEY
SAMSUN YURT SAVUNMA SAN. VE TIC. A.S. TURKEY
SARSILMAZ SILAH SANAYI TURKEY
TARHAN ÜNIFORMA TEKSTIL SAN. VE TIC. LTD.STI. TURKEY
TEPAS TURKEY
T-KALIP TURKEY
TRANSVARO ELEKTRON ALETLERI TURKEY
TURMAKS INSAAT TUR. ILET. BILG.YAY.SAN. TIC.LTD. STI. TURKEY
TUYAP TURKEY
VOLT TEKNOLOJI GELISTIRME VE MÜHENDISLIK TURKEY
ZSR PATLAYICI SANAYI TURKEY
MINISTRY OF DEFENCE OF UKRAINE UKRAINE
RPA “PRACTIKA” UKRAINE
SPETSTECHNOEXPORT (STE) UKRAINE
STATE COMPANY «UKRSPECEXPORT» UKRAINE
STATE FIRM “PROGRESS” UKRAINE
ADVANCED ARMOUR ENGINEERING UNITED ARAB EMIRATES
AL JASOOR UNITED ARAB EMIRATES
CAPITAL EVENTS LLC UNITED ARAB EMIRATES
INTERNATIONAL ARMORED GROUP (FZE) UNITED ARAB EMIRATES
KEY TECHNOLOGIES UNITED ARAB EMIRATES
NATION SHIELD JOURNAL UNITED ARAB EMIRATES
RAPIDEV DMCC UNITED ARAB EMIRATES
STREIT GROUP UNITED ARAB EMIRATES
4C EUROPE UK LTD UNITED KINGDOM
ADS GROUP LIMITED UNITED KINGDOM
AEROGLOW INTERNATIONAL UNITED KINGDOM
AIRBORN UNITED KINGDOM
ALCON COMPONENTS UNITED KINGDOM
AMETEK AIRTECHNOLOGY GROUP UNITED KINGDOM
ARAB DEFENCE JOURNAL UNITED KINGDOM
ARKTIS LIMITED UNITED KINGDOM
ATN EUROPE UNITED KINGDOM
AVON PROTECTION UNITED KINGDOM
BABCOCK INTERNATIONAL UNITED KINGDOM
BAE SYSTEMS UNITED KINGDOM
CHELTON LIMITED UNITED KINGDOM
CHESS DYNAMICS UNITED KINGDOM
CLARION DEFENCE & SECURITY UNITED KINGDOM
COOK DEFENCE SYSTEMS LTD UNITED KINGDOM
CP CASES LTD UNITED KINGDOM
CPI TMD TECHNOLOGIES LTD UNITED KINGDOM
CUMMINS UNITED KINGDOM
DATAMINR UNITED KINGDOM
DAVID BROWN SANTASALO UK UNITED KINGDOM
DEFENCE PROCUREMENT INTERNATIONAL UNITED KINGDOM
DSSI DEFENCE & SECURITY SYSTEMS INTERNATIONAL UNITED KINGDOM
ENVIROFLUID T&T ECO UNITED KINGDOM
ESKAN ELECTRONICS UNITED KINGDOM
FT TECHNOLOGIES UNITED KINGDOM
G&H AEROSPACE AND DEFENCE UNITED KINGDOM
GOLDEN ARROW MARINE UNITED KINGDOM
HEATHCOAT FABRICS UNITED KINGDOM
HIAB LIMITED UNITED KINGDOM
HORIBA MIRA UNITED KINGDOM
HORSTMAN GROUP UNITED KINGDOM
IFS UNITED KINGDOM
JANKEL UNITED KINGDOM
KENT MODULAR ELECTRONICS UNITED KINGDOM
KIRINTEC LIMITED UNITED KINGDOM
LEAFIELD CASES UNITED KINGDOM
LINCAD UNITED KINGDOM
MARLOW ROPES UNITED KINGDOM
MARSHALL LAND SYSTEMS LIMITED UNITED KINGDOM
MDH DEFENCE UNITED KINGDOM
MICROLISE UNITED KINGDOM
MILITARY COMPLIANCE SERVICES UNITED KINGDOM
MTL ADVANCED LIMITED UNITED KINGDOM
NOAH’S ARK MEDIA UNITED KINGDOM
NP AEROSPACE UNITED KINGDOM
OXLEY DEVELOPMENTS COMPANY UNITED KINGDOM
PEARSON ENGINEERING LIMITED UNITED KINGDOM
PRESTOLITE ELECTRIC UNITED KINGDOM
PROTEUS MATERIALS LIMITED UNITED KINGDOM
QIOPTIQ UNITED KINGDOM
RAPTOR PHOTONICS UNITED KINGDOM
RICHMOND DEFENCE SYSTEMS UNITED KINGDOM
RUNFLAT INTERNATIONAL UNITED KINGDOM
SHEPHARD MEDIA UNITED KINGDOM
SOUTHCO MANUFACTURING UNITED KINGDOM
SPAFAX INTERNATIONAL LIMITED UNITED KINGDOM
SUPACAT LTD SC-GROUP UNITED KINGDOM
SYSTEMWARE EUROPE UNITED KINGDOM
THERMOTEKNIX SYSTEMS UNITED KINGDOM
THISTLE DESIGN (MMC) LIMITED UNITED KINGDOM
TYRON RUNFLAT LIMITED UNITED KINGDOM
WESCOM DEFENCE UNITED KINGDOM
WFEL LIMITED UNITED KINGDOM
14BIS SUPPLY TRACKING USA
910 FACTOR INC. USA
A. HAROLD AND ASSOCIATES, LLC USA
AAR MOBILITY SYSTEMS USA
ACROMAG USA
AEROVIRONMENT USA
AIRBORNE SYSTEMS USA
AIRBOSS DEFENSE GROUP USA
ALASKA STRUCTURES USA
ALLISON TRANSMISSION USA
AM GENERAL USA
ARES FSS USA
ARGON CORPORATION USA
ARIZONA COMMERCE AUTHORITY USA
ARMORSOURCE USA
ASPEN WATER USA
AUSA (ASSOCIATION OF THE US ARMY) USA
B.E. MEYERS & CO USA
BARRETT FIREARMS MANUFACTURING USA
BARRON INDUSTRIES USA
BELLEVILLE BOOT COMPANY USA
BLUE SKY NETWORK USA
BREAULT RESEARCH ORGANIZATION USA
C.E. NIEHOFF & CO USA
C3AI USA
CATERPILLAR USA
CENTURY ARMS USA
COLLINS AEROSPACE USA
COLT’S MANUFACTURING COMPANY USA
CONTROL SOLUTIONS USA
CP TECHNOLOGIES NORTH AMERICA USA
CRIBMASTER USA
CTG USA
CUBIC MISSION AND PERFORMANCE SOLUTIONS (CMPS) USA
CURTISS-WRIGHT USA
D&M HOLDING COMPANY USA
DARLEY DEFENSE USA
DEFENSE SECURITY COOPERATION AGENCY USA
DILLON AERO USA
DTC USA
DYNASAFE USA
ELBIT SYSTEMS OF AMERICA USA
ENSIGN-BICKFORD AEROSPACE & DEFENSE USA
EPIC GAMES USA
ESRI USA
FLEX FORCE ENTERPRISES USA
FRONT LINE EMS USA
GALVION USA
GARRETT METAL DETECTORS USA
GENASYS USA
GENTEX CORPORATION USA
GEORGIA, USA USA
GES USA
GLADIATOR TECHNOLOGIES USA
GM DEFENSE USA
GoTenna USA
GREAT LAKES SOUND AND VIBRATION USA
HAWKEYE 360 USA
HDT GLOBAL USA
HIGHCOM ARMOR USA
HOLOSUN TECHNOLOGIES USA
HOOD TECH VISION USA
HURON INDUSTRIES USA
HUXWRX SAFETY USA
HYDRONALIX USA
I2K DEFENSE USA
INERTIAL LABS USA
INTEGRATED PROCUREMENT TECHNOLOGIES (IPT) USA
INVISTA USA
JETCO SOLUTIONS USA
JONATHAN ENG. SOLUTIONS USA
KALLMAN WORLDWIDE USA
KAMAN PRECISION PRODUCTS USA
KENTUCKY TRAILER USA
L3HARRIS TECHNOLOGIES USA
LASER TECHNIQUES COMPANY USA
LEONARDO DRS USA
LEUPOLD & STEVENS USA
LMT DEFENSE USA
LOCKHEED MARTIN CORPORATION US USA
MANTIS USA
MAXVISION – RUGGED PORTABLE COMPUTERS USA
MCM LEARNING USA
MEGGITT USA
MERITOR DEFENSE USA
MESODYNE USA
MICHIGAN ECONOMIC DEVELOPMENT CORPORATION USA
MICROSOFT USA
MILLIKEN & COMPANY USA
MISTRAL GROUP USA
MOHOC, INC. USA
NOCTIS TECHNOLOGIES USA
NONLETHAL TECHNOLOGIES USA
NORTH CAROLINA USA
NORTHROP GRUMMAN CORPORATION USA
OASIS ADVANCED ENGINEERING USA
OLIN-WINCHESTER USA
ONLINE EXPOS USA
OPTIMUM VEHICLE LOGISTICS (OVL) USA
ORION TECHNOLOGIES USA
OTTO ENGINEERING USA
PACIFIC NORTHWEST DEFENSE COALITION (PNDC) USA
PACSCI EMC USA
PERIMETER GLOBAL LOGISTICS USA
PERSISTENT SYSTEMS USA
POINT BLANK ENTERPRISES USA
POLARTEC LLC USA
PYROTECHNIC SPECIALTIES INCORPORATED USA
RAYTHEON TECHNOLOGIES USA
RELLI TECHNOLOGY USA
RENTON COIL SPRING USA
RESECURITY USA
RIVEER ENVIRONMENTAL USA
SABER TORCH USA
SAINT GOBAIN CERAMICS USA
SCHROTH SAFETY PRODUCTS USA
SCIAKY USA
SELECTWO MACHINE COMPANY USA
SHADOW SYSTEMS USA
SHIELD AI USA
SIG SAUER USA
SIGHTLINE APPLICATIONS USA
SIGNATURE SYSTEMS USA
SKYDEX TECHNOLOGIES USA
SMALL ARMS DEFENSE JOURNAL USA
SMITH & WESSON USA
SOUTHWEST MICROWAVE USA
SRC, INC USA
SUCO ESI NORTH AMERICA USA
SUREFIRE USA
SWRI USA
TAQTILE USA
TELEDYNE FLIR USA
TEXTRON SYSTEMS USA
THE WILL-BURT COMPANY USA
TRAKKA SYSTEMS USA
TRENTON SYSTEMS USA
TRIJICON, INC. USA
TRUST STAMP USA
TWI GLOBAL USA
U.S. DEPARTMENT OF COMMERCE (USDOC) USA
US ORDNANCE USA
WASHINGTON STATE DEPARTMENT OF COMMERCE USA
ZENADRONE USA

EviStealth Technology at Eurosatory 2022

evistealth FOMEC FFOMECBLOT Camouflage Furtif Anonymat












EviStealth logo color svg



EviStealth, its exhibition at Eurosatory 2022








EviStealth stealth data exchange

EviStealth



1

Anonymization

Stealth system to transmit sensitive data with a click from a phone


2

Without compromises

Encrypted data exchange without risk of compromise


3

Untraceable

Leaves no trace in computer and telephone systems












About the event



Eurosatory, Paris, Hall 5B booth C178 from June 13th to June 17th 2022: Freemindtronic will present for the very first time its EviStealth technology. It offers users many usage possibilities from smartphone devices, such as the camera, the microphone, the gyroscope, the GPS, the digital fingerprint, as well as NFC’s means of communication, Bluetooth, Wi-Fi and GSM. The sender transmits, instantly and without leaving any traces, different types of encrypted data (photo, video, text, sound) with the keys of the recipients stealthily, anonymously and secured.

Press Release






The Andorran start-up Freemindtronic Ltd., conceiver and creator of security, cyber-security and counterespionage systems is also specialised in contactless technology (NFC).

The chosen logo for the new technological milestone shows the idea of the solution. Indeed, the Megascops, also named scops owl, is a master in the art of camouflage.

 The solution is mainly designed to significantly limit the risk for senders to be compromised and/or the recipients, as well as of the sensitive data transfer.

Press Release



evistealth FOMEC FFOMECBLOT Camouflage Furtif Anonymat





The solution is mainly designed to significantly limit the risk for senders to be compromised and/or the recipients, as well as of the sensitive data transfer.

EviStealth possesses different anonymization implementations such as taking pictures through the digital fingerprint of the smartphone. Therefore, it is the user’s experience that is at the heart of this innovation.



DISCRETION, SIMPLICITY AND QUICK USAGE OF THE SOLUTION IN ONE CLICK







1 ) The discretion is shown, for instance, thanks to the possibility to take pictures while faking that you are making a phone call. The sender has, to do this, a function that is shown on the screen darkened by a discreet framing viewer with the telephone placed close to the ear.

2) The simplicity is found in the different stages of the solution. The sender sends, by a simple click, his encryption key to the recipient, who adds it to his phone in one click. Then, the recipient is authenticated. The recipient’s encription key can also be added via a Freemindtronic’s contactless NFC device.

Press Release





The recipients, as well as the senders, have different possibilities to store their encryption and decryption keys. They can be stored and encrypted in the EviStealth application or in an NFC device. For this latter, the physical externalization of the keys grealtly increases the anonymity, the stealth and the reduction of some compromising risks.

Any transferred data is stored neither on the sender’s phone, nor on the recipient’s one. The data are stored encrypted in a server, temporary or permanently.

3 / Untraceable: Quick usage is crucial. The sender stealthily takes a photo and transfers it instantly to an authenticated recipient, without leaving digital traces, neither in the sender’s system, nor in the recipient’s computer system.

You will understand it with the EviStealth solution, transfer videos, audio messages or photos without leaving any trace, from your phone to your recipient’s phone.







Contact for a meeting on the Freemindtronic stand at Eurosatory









Press release

Multi-language download links for press releases.





CP EviStealth download links


Links exhibtion EviStealth at Eurosatory 2022:





Cyber Computer at Eurosatory 2022

Cyber Computer Laptop EviCypher technology embedded contactless NFC hardware from Freemindtronic andorra Eurosatory 2022 exhibition picture web edition



Cyber Computer technology logo 2022

Cyber Computer on display at Eurosatory 2022

Cyber Computer auto locks and isolates backups

Cyber Computer at Eurosatory

1

Auto-lock storage

Encrypts and auto-locks all kinds of data storage media.

2

Dongle creation

Creates an unlocking Dongle operating system.

3

Auto-lock backup

It executes an additional encrypted and auto-locked backup

4

Offline secrets

Operates externalised secrets (IDs, encryption keys) in a secured NFC device

About the event

The Cyber Computer equipped with Freemindtronic’s EviCypher technology has won a Gold Globee Award 2022 in Material Security and 2 Global InfoSec Awards 2021 in Most Innovative Hardware Password Manager and Next-Gen in Secrets Management.

The Andorran start-up Freemindtronic Ltd., conceiver and creator of safety, cyber-security and counterespionage systems is also specialised in contactless technology (NFC).

Freemindtronic will present its Cyber Computer technology, protected by 3 international invention patents at Eurosatory, Paris, Hall 5B booth C178 from June 13th to June 17th 2022

Press Release

The solution is mainly designed to significantly limit the risk for senders to be compromised and/or the recipients, as well as of the sensitive data transfer.

EviStealth possesses different anonymization implementations such as taking pictures through the digital fingerprint of the smartphone. Therefore, it is the user’s experience that is at the heart of this innovation.

What is a Cyber Computer?

It consists of a new automated, quickly-deployable system to fight at once against different Cyber risks in a computer.

An ecosystem conceived of the control access taking of physical internal storage supports (HDD, SSD) and/or removable (USB key, SD, external SSD). The first solution presented at EUROSATORY 2022 is compatible with the TPM2.0 norm via Windows Bitlocker. It also encrypts the stored saves on the Cloud. The user carries out differential saves according to the 3-2-1 rule, encrypted in version management, with auto-locking and auto-logout.

This solution can work on the software installed in the computer. To obtain an extreme security level and the largest possible field of application, you can combine it with a manager of physically externalised secrets NFC device.

A solution designed for a « dual use », in every sense of the word.

The security and sovereignty of the sensitive data are a global issue that imply the private and public sectors, companies, state and, particularly, Defense, without making any distinctions. The Cyber Computer is customised by Freemindtronic, as an answer to traceability and access denial demands of the data, for instance.

Its advantages / qualities / specifications

Simplicity, quick deployment, efficiency at a low cost, non-intrusive retro-compatibility to computer and data systems, anonymous, physical and digital access control to sensitive data: it is a sovereign sensitive data storage solution, without having to know where the Cloud is physically located.

The solution allows different unlocking methods: manual key input, through an associated Dongle, via an NFC device or through a digital fingerprint, for instance.

The Cyber Computer successfully resolves all the problems related to private and company related data in BYOD, CYOD, COPE and COBO usages.

Moreover, the usage of Freemindtronic’s Rugged NFC USB Flash Drive EviKey® significantly increases the safe securing and the sensitive data restoration. Indeed, in terms of saving, Evikey automatically disconnects from the computer physically and becomes undetectable for computer systems.

Made in Europe

Software, application, extension and NFC devices are developed and made in Andorra by Freemindtronic.

Products compatible with Cyber Computer: Bleujour’s Kubb Secure French computer manufacturer https://freemindtronic.com/partner-products-with-freemindtronic-technologies/kubb-secure-products-freemindtronic-technology-embedded  click here more information

Contact for a meeting on the Freemindtronic stand at Eurosatory