Hoox M3 smartphone User Manual.pdf
Hoox phones designed for maximum security. Controlled communication ports, strong authentication, hardware encryption-all components of a smartphone designed to protect
your private space.
information security experts know that your level of protection is determined by the weakest link. It makes no sense to lock the front door if the windows are open ...
That's why Bull has implemented in phones Hoox high encryption technology and protected from intruders. This protects not only the individual units, but the entire communication chain. Hardware, operating system and various levels provide the highest level of security.
Phone calls, SMS, emails and other data is encrypted during transmission and reception, which guarantees the security of information exchange. The phone has implemented real-time protection of
stored data, applications and operating systems that ensure the confidentiality and integrity of that information.
The phone Hoox user is identified by using strong authentication - a mutual cryptographic authentication, biometrics, or security code to Hoox m2. To protect against malicious software, all attempts to access the terminal are checked, and communication ports are strictly controlled.
The result is a high level of data protection in the exchange of data and information stored in your phone.
Strictly necessary cookies guarantee functions without which this website would not function as intended. As a result these cookies cannot be deactivated. These cookies are used exclusively by this website and are therefore first party cookies. This means that all information stored in the cookies will be returned to this website.
Functional cookies enable this website to provide you with certain functions and to store information already provided (such as registered name or language selection) in order to offer you improved and more personalized functions.
Performance cookies gather information on how a web page is used. We use them to better understand how our web pages are used in order to improve their appeal, content and functionality.
Marketing / Third Party Cookies originate from external advertising companies (among others) and are used to gather information about the websites visited by you, in order to e.g. create targeted advertising for you.