using the “emergency erase”
function and can possibly be
reconstructed by forensic meth-
ods.
Encrypted data stored in the
secure storage container is still
as secure as your passphrase.
Follow the setup instructions
(
see
sections
1
and
2
) to re-setup
your CryptoPhone.
15 Baseband Firewall
The Baseband Firewall protects
the microchip in your Crypto-
Phone that manages the com-
munication with the mobile
network, the so-called base-
band chip, against attacks.
The Baseband Firewall was pro-
grammed to recognize certain
patterns of phone behavior, it
will notify you if it detects too
many suspicious events and will
then reset the baseband chip to
get rid of possible attack mal-
ware.
It will also detect any attempt
to force the CryptoPhone’s base
band to connect to a rogue
base station (e.g. a so-called
IMSI Catcher) by providing ma-
nipulated network parameters
and notify you if such a situa-
tion occurs.
The Baseband Firewall control
screen can be found in the
CryptoPhone “Settings” menu.
Note that in certain situations,
events will be flagged as suspi-
cious that are due to misconfig-
uration of the mobile network,
can be explained by spotty