Cryptophone CryptoPhone 220 User Manual Download Page 27

26

Security Updates • Security, Storage and Handling

knowledge of upcoming academic research and new emerging
cryptanalysis methods. In case a firmware update is needed for security
reasons, you will get notified either via the e-mail address that you
supplied when purchasing the CryptoPhone online, or directly by the
distributor. If you receive a notice about an upcoming security update,
please verify it directly at our website htttp://www.cryptophone.de/ to
prevent attackers from slipping you a malicious »update«. Please note
that we will describe the details of the update procedure directly on the
website. The firmware update mechanism is cryptographically secured
using a 4096 bit public key signature system, which ensures only signed
CryptoPhone updates will be accepted by your CryptoPhone. If you receive
suspicious communication regarding CryptoPhone updates (such as an
e-mail with an update file as attachment), please inform us immediately,
as this may be an attempt to insert malicious firmware into your
CryptoPhone. Please see our Frequently Asked Questions (FAQ) section
on the website http://www.cryptophone.de/ for further detailed information
on the benefits of published source cryptography.

Security, Storage and Handling

Your CryptoPhone is a Communication Security (COMSEC) device. It can
only be regarded as secure as long as you have permanent and uninterrupted
physical control over the CryptoPhone. Once an adversary could have
gained physical possession of the CryptoPhone, it must be regarded as
compromised. There is a variety of potential methods that would allow an
adversary to listen into your calls after he manipulated the CryptoPhone

Summary of Contents for CryptoPhone 220

Page 1: ...form factor and the technological advances incorporated in the underlying hardware platform have allowed us to introduce certain technical improvements which result in some minor changes to the user m...

Page 2: ...n making encrypted calls Inserting your SIM card page 6 The CryptoPhone 220 s back cover can be removed by carefully sliding the lower part of the back cover downwards It is no longer necessary to pre...

Page 3: ...t might otherwise disturb your conversation when not using a headset the CryptoPhone 220 features a Push to Talk option If the Push to Talk option is activated the microphone is switched off by defaul...

Page 4: ...rst use might require a bit of force to move Inside the carrying case you will find your CryptoPhone packaged in a security sealed transparent plastic film nested in the foam pad Please also verify th...

Page 5: ...ly the original PocketPC2003 manuals license sticker and CD with the GSMK CryptoPhone 200 but you need to be aware that some functionality of the PocketPC OS have been disabled by us for security reas...

Page 6: ...rom normal GSM phones Also please note that these times may vary depending on your distance to the nearest GSM base station the further away the base station the more power your phone needs to use to...

Page 7: ...e back cover of the device by pressing the silver button on the backside and sliding the cover downwards back cover 6 You will see the SIM card slot in the upper right corner of the device SIM card sl...

Page 8: ...Manager will boot up Security Profile Manager The CryptoPhone is based on the Windows Mobile PocketPC 2003 operating system which contains some potentially vulnerable yet convenient features and appli...

Page 9: ...operating system New threats against any system are discovered from time to time and we feel selecting No Added Security exposes the CryptoPhone to unneccessary risk Choose this setting only if you re...

Page 10: ...not save contacts or calendar appointments for permanent storage to flash Extreme Security This setting is intended for customers who only use the CryptoPhone and normal unsecure call functionality bu...

Page 11: ...tallation if we receive information that indicates a higher vulnerability of these components than originally assumed Please check the CryptoPhone website for details Booting After pressing OK in the...

Page 12: ...Enter your PIN Most GSM SIM cards require you to enter a PIN number After you have initialized the CryptoPhone the application for unencrypted phone calls shows up and asks you to enter your PIN After...

Page 13: ...enter an airplane hospital or other no phone area with the GSMK CryptoPhone switched on or in standby mode To ensure the radio is off you need to enter flight mode To enter flight mode hold the volum...

Page 14: ...tions Power down To completely power down the CryptoPhone open the back cover and push the red battery lock downwards to the Open position and remove the battery Since the CryptoPhones memory is buffe...

Page 15: ...he Standby button Cold Boot 14 Note no key material that might compromise the security of your past calls is stored anywhere on your device Upon completion of a secure call all key material for the ca...

Page 16: ...end not to store any potentially compromising information on Flash Storage if there is a risk that the device may fall into the hands of an adversary You should store sensitive information in volatile...

Page 17: ...her end picks up so please let it ring After your partner has pressed the Talk button on his end you will hear a ditt dutt ditt dutt sound that signals to you that the key setup procedure for the secu...

Page 18: ...s unexpectedly in the middle of your call again and ask him to verify Call Quality during Secure Calls The call delay indicator changes color in five steps between green over yellow to red Green indic...

Page 19: ...roviders or while driving fast in a car or train If the Delay indicator becomes reddish or red Indicator a 18 please try to find a place with better GSM coverage Use the signal strength indicator on t...

Page 20: ...yptoPhones As a work around if you are roaming try switching providers If secure calling only works in one direction you could use an unencrypted call to tell the other party to call you using CryptoP...

Page 21: ...d back into your microphone In noisy environments the use of the included headset is recommended With the headset you can set the volume to any desired level without experiencing noticeable echo When...

Page 22: ...hone You can plug it in any time before or during a call The headset cable connector socket is on the lower right side of the device You will notice that the headset is connected through a small adapt...

Page 23: ...ection We recommend using a wire based headset when placing secure calls Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degradatio...

Page 24: ...moving and thereby causing more disturbances Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and r...

Page 25: ...irst need to copy them into the main contacts database on the CryptoPhone To do so switch to the unencrypyted phone mode by pressing the Center Key Center Key then click on the CryptoPhone symbol in t...

Page 26: ...well as a detailed and honest report on the possible security impact As bad as security problems with cryptographic products can be we believe the only way to handle them properly is open and transpar...

Page 27: ...ly signed CryptoPhone updates will be accepted by your CryptoPhone If you receive suspicious communication regarding CryptoPhone updates such as an e mail with an update file as attachment please info...

Page 28: ...elligence agencies are known for a wide variety of hightech manipulation methods that are impossible to detect without a massive scientific effort several months of analysis at the cost of several 100...

Page 29: ...lease mail us at service cryptophone de so we can instruct you about the proper shipping and security procedures Shipments that arrive for repair without prior acknowledgement and or in ignorance of t...

Page 30: ...integrity and security of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is abso...

Reviews: