background image

ver

ify

in

g th

em

 w

ith

 yo

ur 

par

tn

er,

 yo

u m

ake

 su

re 

th

at 

you

 ar

e i

nd

eed

 co

mm

un

ica

tin

g u

sin

g t

he 

sam

e k

ey. 

Ple

ase

 p

ay 

att

en

tio

n to

 th

e v

oic

e o

f y

ou

r p

art

ner

 w

hen 

he 

rea

ds 

his

 th

ree

 le

tte

rs.

 T

o b

e c

om

ple

tel

y o

n th

e s

afe 

sid

e a

gai

nst

 ve

ry 

sop

his

tic

ate

d v

oic

e  i

mp

ers

on

ati

on 

dur

in

g th

e k

ey 

ver

ific

atio

n, y

ou 

cou

ld 

per

iod

ica

lly

 re

ver

-

ify

 th

e le

tte

r c

ode

 w

ith

 yo

ur 

par

tn

er 

du

rin

g th

e  c

on

ver

-

sat

ion

Cal

l Q

ual

ity

 du

rin

g S

ecu

re 

Cal

ls 

Th

e c

all 

del

ay 

in

dic

ato

r c

han

ges

 co

lor

 in

 fi

ve 

ste

ps 

be-

tw

een

 gr

een

 ov

er 

yel

low

  to

 re

d. G

ree

n in

dic

ate

s th

e b

est 

cal

l q

ual

ity

, r

ed 

th

e w

ors

t. D

ela

y d

esc

rib

es 

th

e p

eri

od 

of 

tim

e it

 ta

kes

 fo

r y

ou

r v

oic

e to

 re

ach

 yo

ur 

par

tn

er.

 T

his 

tim

e  g

ets

 lo

nge

r if

 th

e t

ran

sm

iss

ion

 o

f t

he 

en

cry

pte

vo

ice

 o

ver

 th

e t

ele

ph

on

e n

etw

ork

 ta

kes

 lo

ng

er,

 o

tra

nsm

iss

ion

 er

ror

s o

ccu

r. 

Rea

son

s fo

r lo

nge

r  th

an 

nor

mal

 de

lay

 ar

e u

sua

lly

 ei

the

bad

 G

SM

 co

ver

age

 o

r n

etw

ork

 co

nge

sti

on

. N

etw

ork 

con

ges

tio

n c

an

 of

ten

 be

 ci

rcu

mve

nte

d  b

y s

etti

ng 

up 

the 

cal

l a

gai

n, s

om

eti

mes

 yo

u j

ust

 g

et 

a »

bad

 li

ne«

. T

he 

GS

M d

ata

 c

all

 m

od

e, 

use

d b

y t

he 

Cry

pto

Ph

on

e t

tra

nsp

ort

 th

e e

ncr

ypt

ed 

voi

ce 

dat

a d

uri

ng 

a c

all,

 h

as 

cer

tai

n d

ela

y, c

au

sed

 b

y t

he 

arc

hit

ect

ure

 o

f t

he 

GS

net

wor

k. T

he 

GS

M n

etw

ork

 h

an

dle

s d

ata

 w

ith

 lo

wer 

pri

ori

ty 

tha

n v

oic

e tr

an

sm

iss

ion

s. 

CryptoPhone G10 User Manual

9

Usi

ng 

the

 he

ads

et 

For

 h

an

ds 

fre

e o

per

ati

on

, a

 st

ere

o h

ead

set

 is

 in

clu

ded 

wit

h th

e G

SM

K C

ryp

toP

hon

e. Y

ou

 ca

n p

lu

g it

 in

 an

tim

e, b

efo

re 

or 

du

rin

g a

 ca

ll, 

how

eve

r y

ou 

may

 te

rm

i-

nat

e  a

n o

ngo

in

g c

all 

un

der

 so

me 

con

dit

ion

s w

hen

 in

-

ser

tin

g t

he 

hea

dse

t p

lu

g o

ff-

an

gle

. T

he 

hea

dse

t c

abl

con

nec

tor

 so

cke

t is

 on

 th

e lo

wer

 ri

ght

 si

de 

of t

he 

dev

ice

GS

MK

 do

es 

not

 p

rov

ide

 su

ppo

rt f

or 

pro

ble

ms 

cau

sed 

by 

usi

ng 

hea

dse

ts 

oth

er 

th

an

 th

e o

ne 

su

pp

lie

d w

ith 

you

r C

ryp

toP

hon

e. 

Blu

eto

oth

 he

ads

et

The

 C

ryp

toP

hon

e G

10

 h

as 

a B

lue

too

th

 in

ter

fac

e. W

hile 

it 

is 

pos

sib

le 

to 

use

 a 

Blu

eto

oth

 h

ead

set

 fo

r m

ak

in

nor

mal

 u

nen

cry

pte

d p

hon

e c

alls

, w

e s

tro

ngl

y n

ot r

ec-

om

men

d u

sin

g a

 b

lu

eto

oth

 h

ead

set

 d

uri

ng 

en

cry

pte

cal

ls.

 T

he 

rea

son

 is 

th

at w

ith

 a 

Blu

eto

oth

 h

ead

set

 yo

wou

ld 

bro

adc

ast

 th

e c

on

ten

ts 

of y

ou

r c

on

fid

en

tia

l c

alls 

bef

ore

 th

ey 

hav

e r

eac

hed

 th

e e

ncr

ypt

ion

 en

gin

e in

 th

Cry

pto

Ph

on

e. B

lu

eto

oth

 ra

dio

 si

gn

als

 ca

n b

e r

ece

ive

ove

r s

eve

ral

 h

un

dre

d m

ete

rs 

with

 m

ode

rat

ely

 so

ph

ist

i-

cat

ed 

eq

uip

men

t, s

o a

n a

tta

cke

r c

ou

ld 

lis

ten

 to

 yo

ur 

cal

ls 

eas

ily

. T

he 

en

cry

pti

on 

use

d w

ith

 B

lu

eto

oth

 is

 n

hu

rdl

e f

or 

a d

ete

rm

in

ed 

adv

ers

ary

 an

d d

oes

 n

ot o

ffe

su

ffi

cie

nt 

pro

tec

tio

n. 

We 

rec

om

men

d u

sin

g a

 w

ire 

bas

ed 

hea

dse

t w

hen

 pl

aci

ng 

sec

ure

 ca

lls

CryptoPhone G10 User Manual

20

Summary of Contents for CryptoPhone G10

Page 1: ...anual Contact For support service and repair please contact e mail support cryptophone de phone 49 700 CRYPTTEL fax 49 700 CRYPTFAX Further information http www cryptophone com 2005 Gesellschaft für Sichere Mobile Kommunikation mbH GSMK Berlin Germany CryptoPhone G10 User Manual 28 ...

Page 2: ...o install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be ...

Page 3: ... Lift up the SIM card cover CryptoPhone G10 User Manual 3 There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective we will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail us at service crypt...

Page 4: ... you may need a plug CryptoPhone G10 User Manual 4 sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh ...

Page 5: ...es Note we recommend to charge your GSMK Crypto Phone every night or have a charged spare battery ready For security reasons explained later in the chap CryptoPhone G10 User Manual 5 immediately as this may be an attempt to insert mali cious firmware into your CryptoPhone Please see our Questions and Answers section Q A on the website http www cryptophone com for further detailed in formation on t...

Page 6: ...select Flight Mode in CryptoPhone G10 User Manual 6 new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their i...

Page 7: ... the event that the Cryptophone reacts unexpectedly i e device response becomes very slow key lock can not be unlocked or the phone does not connect to a GSM network you can quickly reset it by removing and re inserting the battery The GSMK CryptoPhone will restart without erasing the memory In the unlikely event such a problem persists you can Cold Boot the device see page 16 This will however de...

Page 8: ...g each call By reading and CryptoPhone G10 User Manual 8 CTQ DGA Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not r...

Page 9: ...etwork The GSM network handles data with lower priority than voice transmissions CryptoPhone G10 User Manual 9 Using the headset For hands free operation a stereo headset is included with the GSMK CryptoPhone You can plug it in any time before or during a call however you may termi nate an ongoing call under some conditions when in serting the headset plug off angle The headset cable connector soc...

Page 10: ... on a satellite network or a network with weird data call configuration CryptoPhone G10 User Manual 10 Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it c...

Page 11: ...d for the CryptoPhone The practice is becoming increasingly rare but a GSM provider may only allow incoming data calls to subscribers that have CryptoPhone G10 User Manual 11 sary Cold Boot will not erase the contacts and SMS messages stored on your SIM card Also a Cold Boot does not erase any information that you may have stored in Flash Storage or on SD memory cards To initiate a Cold Boot follo...

Page 12: ...he other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone G10 User Manual 12 General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipment in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment t...

Page 13: ...rtions and feedback effects that can reduce your call quality considerably CryptoPhone G10 User Manual 13 Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and regulations on telephone use while driving a car We strongly recommend the use of the enclosed headset while driving even if local regulatio...

Page 14: ...n using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To pr...

Reviews: