background image

Gen

era

You

r C

ryp

toP

hon

e G

10 

is 

bas

ed 

on

 a 

gen

eri

c tr

i-b

an

(9

00

/18

00

/19

00

) G

SM

 Sm

art

pho

ne 

tha

t is

 so

ld 

un

der 

dif

fer

en

t b

ran

d n

am

es.

 T

he 

ph

on

es 

fir

mw

are

 an

d o

p-

era

tin

g s

yst

em

 h

ave

 b

een

 m

od

ifi

ed 

to 

acc

om

mod

ate 

the

 C

ryp

toP

hon

e fu

nct

ion

alit

y a

nd 

pro

vid

e a

dde

d s

ecu

-

rit

y, s

o a

 n

um

ber

 o

f th

in

gs 

th

at y

ou

 m

igh

t k

now

 fr

om 

oth

er 

Sm

art

ph

on

es 

are

 n

ot 

ava

ila

ble

 o

n t

he 

GS

MK 

Cry

pto

Ph

on

e fo

r s

ecu

rity

 re

aso

ns.

 W

e  s

upp

ly 

th

e  o

rig

i-

nal

 Sm

art

ph

on

e  m

an

ual

s, l

ice

nse

 st

ick

er 

an

d C

D w

ith 

the

 G

SM

K C

ryp

toP

hon

e G

10

, b

ut y

ou

 ne

ed 

to 

be 

aw

are 

th

at 

so

me 

fu

nct

io

nal

ity

 h

as 

bee

n d

isa

ble

d  b

y u

s f

or 

sec

uri

ty 

rea

son

s. D

o n

ot t

ry 

to 

use

 M

icr

oso

ft o

per

atin

sys

tem

 u

pda

tes

 as

 th

is 

may

 d

est

roy

 th

e  C

ryp

toP

hon

fir

mw

are

 a

nd 

vo

id 

yo

ur 

war

ran

ty.

 C

ert

ifi

ed 

Cry

pto

-

Pho

ne 

Upd

ate

s a

re o

nly

 pr

ovi

ded

 b

y G

SM

K to

 yo

u in

 a 

cry

pto

gra

phi

cal

ly 

sec

ure

 m

an

ner

.

In

ser

tin

g S

IM

 ca

rd 

& s

witc

hin

g th

pho

ne 

on

 

Yo

u n

eed

 to

 in

ser

t  a

 v

ali

d G

SM

 c

ard

 (S

IM

) i

n t

he 

GS

MK

 C

ryp

toP

hon

e G

10

 in

 o

rd

er 

to 

pla

ce 

cal

ls.

 T

in

ser

t th

e S

IM

, r

em

ove

 th

e b

ack

 co

ver

 of

 th

e d

evi

ce 

by 

pre

ssi

ng 

the

 la

tch

 on

 th

e lo

wer

 b

ack

sid

e a

nd 

slid

in

g th

cov

er 

dow

nw

ard

s. Y

ou

 w

ill s

ee t

he 

SIM

 ca

rd 

slo

t in

 th

low

er 

cor

ner

 o

f th

e d

evi

ce.

 Li

ft u

p th

e S

IM

 ca

rd 

cov

er 

CryptoPhone G10 User Manual

3

Th

ere

 is

 n

o s

uch

 th

in

g a

s a

 »r

est

ock

ed«

, »

ref

urb

ish

ed« 

or 

»se

con

d h

an

d« 

Cry

pto

Ph

on

e. A

ll s

ale

s a

re 

fin

al. 

If 

you

r C

ryp

toP

hon

e  is

 de

fec

tiv

e, w

e w

ill 

eith

er 

rep

air

 it 

or 

sw

ap 

th

e e

lec

tro

nic

s fo

r a

 n

ew

 fa

cto

ry 

fre

sh

 de

vic

e. N

par

ts 

th

at h

ave

 b

een

 in

 th

e h

an

ds 

of 

oth

er 

cu

sto

mer

will

 be

 u

sed

 in

 re

pai

rs.

 If

 yo

u n

eed

 a 

rep

air

, p

lea

se 

mai

us 

at s

erv

ice

@cr

ypt

oph

on

e.d

e, s

o w

e  c

an

 in

str

uct

 yo

ab

ou

t  t

he 

pro

per

 sh

ip

pin

g a

nd 

sec

uri

ty 

pro

ced

ure

s. 

Shi

pm

en

ts 

tha

t a

rri

ve 

for

 re

pai

r w

ith

out

 pr

ior

 ac

kn

ow

l-

edg

men

t a

nd/

or 

in

 ig

nor

an

ce 

of 

th

e a

dvi

sed

 sh

ipp

in

met

ho

d a

nd 

sec

uri

ty 

pre

cau

tio

ns 

wil

l b

e i

gn

ore

d. 

Ple

ase

 u

nde

rst

an

d th

at i

t is

 in

 yo

ur 

ow

n in

ter

est

 to

 ad

-

her

e to

 th

e s

ecu

rit

y m

eas

ure

s, s

in

ce 

on

ly 

th

is 

will

 en

-

abl

e  u

s to

 fu

lfi

ll y

ou

r s

ecu

rit

y r

equ

ire

men

ts.

 N

ote

: th

hig

h-p

ow

er 

Lit

hiu

m-P

oly

mer

 re

ch

arg

eab

le 

bat

ter

y o

th

e C

ryp

toP

hon

e is

 a 

wea

r-a

nd

-te

ar 

par

t a

nd 

not

 co

v-

ere

d b

y th

e  w

arr

an

ty. 

Rep

lac

em

en

t b

att

eri

es 

are

 av

ail

-

abl

e in

 n

orm

al P

DA

 or

 m

obi

le 

pho

ne 

sto

res

.

Acc

ess

ori

es 

Th

e G

SM

K C

ryp

toP

hon

e  is

 ba

sed

 o

n a

 d

evi

ce 

man

u-

fac

tu

red

 b

y H

TC

, s

old

 u

nd

er 

dif

fer

en

t b

ran

d  n

am

es. 

Add

itio

nal

 ac

ces

sor

ies

 fo

r y

ou

r  C

ryp

toP

hon

e  (l

ike

 h

ol-

ste

rs,

 ca

r k

its

, e

xte

rn

al a

nte

nn

as 

etc

.) c

an

 th

ere

for

e b

eas

ily

 ob

tai

ned

 b

y b

uyi

ng 

kit 

tha

t is

 de

stin

ed 

for

 S

DA

, i-

mat

e S

P3i

 or

 Q

tek

 8

020

 d

evi

ces

CryptoPhone G10 User Manual

26

Summary of Contents for CryptoPhone G10

Page 1: ...anual Contact For support service and repair please contact e mail support cryptophone de phone 49 700 CRYPTTEL fax 49 700 CRYPTFAX Further information http www cryptophone com 2005 Gesellschaft für Sichere Mobile Kommunikation mbH GSMK Berlin Germany CryptoPhone G10 User Manual 28 ...

Page 2: ...o install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be ...

Page 3: ... Lift up the SIM card cover CryptoPhone G10 User Manual 3 There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective we will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail us at service crypt...

Page 4: ... you may need a plug CryptoPhone G10 User Manual 4 sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh ...

Page 5: ...es Note we recommend to charge your GSMK Crypto Phone every night or have a charged spare battery ready For security reasons explained later in the chap CryptoPhone G10 User Manual 5 immediately as this may be an attempt to insert mali cious firmware into your CryptoPhone Please see our Questions and Answers section Q A on the website http www cryptophone com for further detailed in formation on t...

Page 6: ...select Flight Mode in CryptoPhone G10 User Manual 6 new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their i...

Page 7: ... the event that the Cryptophone reacts unexpectedly i e device response becomes very slow key lock can not be unlocked or the phone does not connect to a GSM network you can quickly reset it by removing and re inserting the battery The GSMK CryptoPhone will restart without erasing the memory In the unlikely event such a problem persists you can Cold Boot the device see page 16 This will however de...

Page 8: ...g each call By reading and CryptoPhone G10 User Manual 8 CTQ DGA Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not r...

Page 9: ...etwork The GSM network handles data with lower priority than voice transmissions CryptoPhone G10 User Manual 9 Using the headset For hands free operation a stereo headset is included with the GSMK CryptoPhone You can plug it in any time before or during a call however you may termi nate an ongoing call under some conditions when in serting the headset plug off angle The headset cable connector soc...

Page 10: ... on a satellite network or a network with weird data call configuration CryptoPhone G10 User Manual 10 Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it c...

Page 11: ...d for the CryptoPhone The practice is becoming increasingly rare but a GSM provider may only allow incoming data calls to subscribers that have CryptoPhone G10 User Manual 11 sary Cold Boot will not erase the contacts and SMS messages stored on your SIM card Also a Cold Boot does not erase any information that you may have stored in Flash Storage or on SD memory cards To initiate a Cold Boot follo...

Page 12: ...he other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone G10 User Manual 12 General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipment in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment t...

Page 13: ...rtions and feedback effects that can reduce your call quality considerably CryptoPhone G10 User Manual 13 Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and regulations on telephone use while driving a car We strongly recommend the use of the enclosed headset while driving even if local regulatio...

Page 14: ...n using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To pr...

Reviews: