background image

For

 cu

sto

mer

s in

 E

uro

pe,

 N

ort

h A

fri

ca 

an

d A

sia

 w

ho 

exp

eri

en

ce 

su

ch

 pr

obl

em

s w

e r

eco

mm

en

d o

ur 

Cry

pto

-

Ph

on

e 2

00

 T

/T

S s

olu

tio

n th

at u

ses

 th

e T

hu

ray

a  s

ate

l-

lit

e  s

yst

em

 to 

pro

vid

e t

he 

ad

ded

 b

en

efi

t  o

f a

ffo

rd

abl

sec

ure

 co

mm

un

ica

tio

n o

uts

ide

 G

SM

 co

ver

ed 

are

as.

 

Som

eti

mes

 a 

sp

eci

fic

 co

nd

iti

on

 of

 th

e  G

SM

 n

etw

ork 

may

 le

ad 

to 

an

 u

nst

ab

le 

sta

te 

of 

th

e G

SM

 p

art

 o

f t

he 

Cry

pto

Ph

on

e, w

hic

h a

lso

 m

igh

t c

au

se 

th

e “

nev

er 

en

d-

in

g k

ey 

set

up

”-p

rob

lem

 or

 o

th

er 

un

des

ire

d b

eh

avi

or. 

Thi

s c

on

diti

on 

can

 so

met

im

es 

be f

ixe

d b

y r

est

art

in

g th

Cry

pto

Pho

ne.

Cha

ngi

ng 

the

 vo

lum

e

 T

o c

han

ge 

th

e a

udi

o v

olu

me 

du

rin

g a

 S

ecu

re 

Cal

l, u

se 

th

e v

olu

me 

con

tro

l b

utt

on

s o

n t

he 

lef

t  s

id

e o

f t

he 

de-

vic

e. A

 vo

lu

me 

in

dic

ato

r is

 lo

cat

ed 

in

 th

e lo

wer

 le

ft c

or-

ner

 of

 th

e  s

cre

en

 an

d  w

ill 

pro

vid

e y

ou 

with

 vi

su

al f

eed

-

bac

k r

ega

rdi

ng 

th

e v

olu

me 

you

 se

t. P

lea

se 

not

 th

at t

he  

vol

um

e le

vel

s a

bov

e g

ree

n o

n th

e in

dic

ato

r (y

ello

w, r

ed) 

are

 on

ly 

des

ign

ed 

to 

be 

use

d  w

ith

 a 

hea

dse

t  o

r th

e P

ush 

to 

Tal

k m

ode

. C

hos

in

g th

em

 w

hile

 n

ot u

sin

g a

 h

ead

set 

or 

Pu

sh

 to

 T

alk

 m

ay 

lea

d t

o d

ist

ort

ion

s a

nd 

fee

dba

ck 

eff

ect

s th

at c

an

 re

duc

e y

our

 ca

ll q

ual

ity

 co

nsi

der

abl

y.

CryptoPhone G10 User Manual

13

No

te:

 In

 m

an

y c

ou

ntr

ies

 th

e u

se 

of 

mo

bil

e p

ho

nes 

whi

le 

dri

vin

g is

 re

gul

ate

d o

r c

om

ple

tel

y p

roh

ibi

ted

. Y

ou 

are

 re

sp

on

sib

le 

fo

r  c

om

ply

in

g w

ith

 lo

cal

 la

ws 

an

reg

ula

tio

ns 

on 

tel

ep

hon

e u

se 

wh

ile

 d

riv

in

g a

 ca

r. W

str

on

gly

 re

com

men

d th

e u

se 

of 

th

e e

ncl

ose

d h

ead

set 

wh

ile

 d

riv

in

g, e

ven

 if

 lo

cal

 re

gu

lat

ion

s m

ay 

not

 re

qu

ire 

thi

s.

Red

ial

in

Th

e C

ryp

toP

hon

e h

as 

acc

ess

 to

 a 

cal

l h

ist

ory

 co

mpr

is-

in

g th

e la

st 1

0 o

utg

oin

g c

alls

.. Y

ou 

can

 re

dia

l a

 n

um

ber 

by 

scr

olli

ng 

thr

oug

h th

e  la

st d

ial

ed 

num

ber

s b

y m

ovi

ng 

th

e  j

oys

tic

k u

p/d

ow

n a

nd 

pre

ss 

th

e g

ree

n T

alk

 bu

tto

on

ce 

the

 de

sir

ed 

num

ber

 is

 sh

ow

n in

 th

e d

isp

lay

.

Cal

lin

g fr

om

 th

e C

on

tac

ts 

lis

t

To 

cal

l a

 co

nta

ct s

tor

ed 

in 

the

 co

nta

ct l

ist

, pr

ess

 th

e  r

igh

sof

t k

ey 

in

 th

e h

om

e s

cre

en

 la

bel

ed 

Con

tac

ts.

 N

ow

 yo

see

 th

e  li

st o

f c

on

tac

ts 

sto

red

 o

n y

ou

r S

IM

 an

d o

n th

ph

on

e. T

he 

lef

t s

oft

key

 is

 n

ow

 la

bel

ed 

Cal

l S

ecu

re.

 T

pla

ce 

th

e s

ecu

re 

cal

l, m

ove

 th

e s

ele

cti

on

 b

ar 

wit

h t

he 

joy

sti

ck 

to 

th

e c

on

tac

t a

nd 

pre

ss 

th

e  C

all 

Sec

ure

 k

ey. 

Th

e  C

ryp

toP

hon

e G

10 

now

 sw

itc

hes

 to

 th

e s

ecu

re 

cal

mod

e a

nd 

im

med

iat

ely

 d

ial

s th

e s

ele

cte

d c

on

tac

t n

um

-

ber

 in

 se

cur

e m

ode

.

CryptoPhone G10 User Manual

16

Содержание CryptoPhone G10

Страница 1: ...anual Contact For support service and repair please contact e mail support cryptophone de phone 49 700 CRYPTTEL fax 49 700 CRYPTFAX Further information http www cryptophone com 2005 Gesellschaft für Sichere Mobile Kommunikation mbH GSMK Berlin Germany CryptoPhone G10 User Manual 28 ...

Страница 2: ...o install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be ...

Страница 3: ... Lift up the SIM card cover CryptoPhone G10 User Manual 3 There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective we will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail us at service crypt...

Страница 4: ... you may need a plug CryptoPhone G10 User Manual 4 sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh ...

Страница 5: ...es Note we recommend to charge your GSMK Crypto Phone every night or have a charged spare battery ready For security reasons explained later in the chap CryptoPhone G10 User Manual 5 immediately as this may be an attempt to insert mali cious firmware into your CryptoPhone Please see our Questions and Answers section Q A on the website http www cryptophone com for further detailed in formation on t...

Страница 6: ...select Flight Mode in CryptoPhone G10 User Manual 6 new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their i...

Страница 7: ... the event that the Cryptophone reacts unexpectedly i e device response becomes very slow key lock can not be unlocked or the phone does not connect to a GSM network you can quickly reset it by removing and re inserting the battery The GSMK CryptoPhone will restart without erasing the memory In the unlikely event such a problem persists you can Cold Boot the device see page 16 This will however de...

Страница 8: ...g each call By reading and CryptoPhone G10 User Manual 8 CTQ DGA Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not r...

Страница 9: ...etwork The GSM network handles data with lower priority than voice transmissions CryptoPhone G10 User Manual 9 Using the headset For hands free operation a stereo headset is included with the GSMK CryptoPhone You can plug it in any time before or during a call however you may termi nate an ongoing call under some conditions when in serting the headset plug off angle The headset cable connector soc...

Страница 10: ... on a satellite network or a network with weird data call configuration CryptoPhone G10 User Manual 10 Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it c...

Страница 11: ...d for the CryptoPhone The practice is becoming increasingly rare but a GSM provider may only allow incoming data calls to subscribers that have CryptoPhone G10 User Manual 11 sary Cold Boot will not erase the contacts and SMS messages stored on your SIM card Also a Cold Boot does not erase any information that you may have stored in Flash Storage or on SD memory cards To initiate a Cold Boot follo...

Страница 12: ...he other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone G10 User Manual 12 General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipment in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment t...

Страница 13: ...rtions and feedback effects that can reduce your call quality considerably CryptoPhone G10 User Manual 13 Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and regulations on telephone use while driving a car We strongly recommend the use of the enclosed headset while driving even if local regulatio...

Страница 14: ...n using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To pr...

Отзывы: