background image

th

e  li

st b

y p

res

sin

g th

e 2

 k

ey.

 Y

ou 

will

 n

ow

 se

e a

 li

ttle

 x 

nex

t to

 th

e a

nte

nn

a s

ym

bol

 w

hen

 fl

igh

t m

ode

 is

 ac

tiv

an

d th

e G

SM

 is

 sw

itc

hed

 of

f. T

o s

wit

ch

 th

e  r

adi

o b

ack 

on 

aga

in

, fo

llo

w th

e s

am

e  p

roc

edu

re 

an

d s

ele

ct “

Flig

ht 

Mo

de 

Off

”. 

Yo

u w

ill

 b

e  r

eq

uir

ed 

to 

en

ter

 y

ou

r  P

IN 

aga

in

.

Pla

cin

g a

n E

ncr

ypt

ed 

Cal

l

In 

ord

er 

to 

pla

ce 

a s

ecu

re 

cal

l, t

he 

fol

low

in

g c

on

diti

on

nee

d to

 be 

met

•y

ou

r p

art

ner

 h

as 

a C

ryp

toP

hon

e  c

om

pat

ibl

e d

evi

ce 

up 

an

d r

un

nin

•t

her

e is

 su

ffic

ien

t G

SM

 co

ver

age

 

•t

he 

GS

M o

pe

ra

to

r s

up

po

rts

 ‘G

SM

 d

ata

 c

all

s’ 

(te

chn

ica

lly

 ca

lle

d C

irc

uit 

Sw

itc

hed

 D

ata

 or

 ‘C

SD

’) 

To 

pla

ce 

a s

ecu

re 

cal

l, y

ou

 ca

n s

im

ply

 d

ial

 fr

om

 th

hom

e s

cre

en

 an

d p

res

s th

e “

Cal

l S

ecu

re”

 so

ftk

ey 

on

 th

lef

t s

ide

. A

lso

 yo

u c

an

 ch

oos

e “

Con

tac

ts”

, s

ele

ct a

 co

n-

tac

t a

nd 

pre

ss 

“C

all 

Sec

ure

”. F

urt

her

 yo

u c

an 

sw

itc

h to 

th

e  C

ryp

toP

hon

e s

cre

en

 by

 p

res

sin

g th

e h

om

e k

ey 

an

dia

l d

ire

ctly

 (p

res

s th

e g

ree

n C

all 

bu

tto

n a

fte

r e

nte

rin

the

 n

um

ber

.

CryptoPhone G10 User Manual

7

Tro

ubl

esh

oot

in

In 

th

e e

ven

t th

at t

he 

Cry

pto

ph

on

e  r

eac

ts 

un

exp

ect

edl

i.e

., d

evi

ce 

res

pon

se 

bec

om

es 

ver

y s

low

, k

ey-

loc

k c

an 

not

 b

e u

nlo

cke

d, o

r t

he 

ph

on

e  d

oes

 n

ot 

con

nec

t t

o a 

GS

M n

etw

ork

, y

ou

 ca

n q

uic

kly

 re

set

 it

 b

y r

em

ovi

ng 

an

d r

e-in

ser

tin

g th

e b

att

ery

. T

he 

GS

MK

 C

ryp

toP

hon

will

 re

sta

rt w

ith

out

 er

asi

ng 

the

 m

em

ory

. I

n th

e u

nlik

ely 

eve

nt s

uch

 a 

pro

ble

m p

ers

ist

s, y

ou

 ca

n C

old

 B

oot

 th

dev

ice

 (s

ee 

pag

e 1

6). 

Th

is 

will

 h

ow

eve

r d

ele

te 

all 

in

for

-

mat

ion

 in

 vo

lat

ile

 m

em

ory

Sec

uri

ty 

Upd

ate

GS

MK

 co

nti

nu

ally

 se

eks

 to

 im

pro

ve 

th

e s

ecu

rit

y a

nd 

qu

ali

ty 

of 

op

era

tio

n o

f t

he 

Cry

pto

ph

on

e G

10

. I

n t

he 

eve

nt a

nyo

ne 

dis

cov

ers

 a 

fla

w in

 th

e C

ryp

toP

hon

e, w

wil

l p

rov

id

e a

 fi

rm

war

e u

pd

ate

, a

s w

ell

 as

 a 

det

ail

ed 

rep

ort

 on

 th

e p

oss

ibl

e s

ecu

rity

 im

pac

t. A

s b

ad 

as 

sec

u-

rit

y p

rob

lem

s w

ith 

cry

pto

gra

ph

ic 

pro

du

cts

 ca

n b

e, w

bel

iev

e  t

he 

on

ly 

way

 to

 h

an

dle

 th

em 

pro

per

ly 

is 

op

en 

an

d tr

an

spa

ren

t c

om

mu

nic

ati

on 

wit

h o

ur 

cu

sto

mer

s. 

Yo

u a

re 

th

e o

ne 

bes

t s

uit

ed 

to 

det

erm

in

e p

ote

nti

al 

dam

age

 to

 yo

ur 

in

ter

est

s, s

o w

e w

ill 

pro

vid

e y

ou

 w

ith

 al

the

 kn

ow

n fa

cts

Sec

uri

ty 

is 

not

 a 

sta

te 

bu

t a

 p

roc

ess

. A

nd 

th

is 

pro

ces

req

uir

es 

con

sta

nt c

hec

kin

g a

gai

nst

 em

erg

in

g r

isk

s a

nd 

CryptoPhone G10 User Manual

22

Summary of Contents for CryptoPhone G10

Page 1: ...anual Contact For support service and repair please contact e mail support cryptophone de phone 49 700 CRYPTTEL fax 49 700 CRYPTFAX Further information http www cryptophone com 2005 Gesellschaft für Sichere Mobile Kommunikation mbH GSMK Berlin Germany CryptoPhone G10 User Manual 28 ...

Page 2: ...o install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be ...

Page 3: ... Lift up the SIM card cover CryptoPhone G10 User Manual 3 There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective we will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail us at service crypt...

Page 4: ... you may need a plug CryptoPhone G10 User Manual 4 sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh ...

Page 5: ...es Note we recommend to charge your GSMK Crypto Phone every night or have a charged spare battery ready For security reasons explained later in the chap CryptoPhone G10 User Manual 5 immediately as this may be an attempt to insert mali cious firmware into your CryptoPhone Please see our Questions and Answers section Q A on the website http www cryptophone com for further detailed in formation on t...

Page 6: ...select Flight Mode in CryptoPhone G10 User Manual 6 new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their i...

Page 7: ... the event that the Cryptophone reacts unexpectedly i e device response becomes very slow key lock can not be unlocked or the phone does not connect to a GSM network you can quickly reset it by removing and re inserting the battery The GSMK CryptoPhone will restart without erasing the memory In the unlikely event such a problem persists you can Cold Boot the device see page 16 This will however de...

Page 8: ...g each call By reading and CryptoPhone G10 User Manual 8 CTQ DGA Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not r...

Page 9: ...etwork The GSM network handles data with lower priority than voice transmissions CryptoPhone G10 User Manual 9 Using the headset For hands free operation a stereo headset is included with the GSMK CryptoPhone You can plug it in any time before or during a call however you may termi nate an ongoing call under some conditions when in serting the headset plug off angle The headset cable connector soc...

Page 10: ... on a satellite network or a network with weird data call configuration CryptoPhone G10 User Manual 10 Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it c...

Page 11: ...d for the CryptoPhone The practice is becoming increasingly rare but a GSM provider may only allow incoming data calls to subscribers that have CryptoPhone G10 User Manual 11 sary Cold Boot will not erase the contacts and SMS messages stored on your SIM card Also a Cold Boot does not erase any information that you may have stored in Flash Storage or on SD memory cards To initiate a Cold Boot follo...

Page 12: ...he other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone G10 User Manual 12 General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipment in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment t...

Page 13: ...rtions and feedback effects that can reduce your call quality considerably CryptoPhone G10 User Manual 13 Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and regulations on telephone use while driving a car We strongly recommend the use of the enclosed headset while driving even if local regulatio...

Page 14: ...n using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To pr...

Reviews: