background image

ada

pto

r to

 u

se 

th

e p

ow

er 

su

ppl

y if

 th

e p

lu

g d

oes

 n

ot f

it 

in

 yo

ur 

ou

tle

t. T

he 

pow

er 

su

pp

ly 

is 

rat

ed 

10

0-2

40

V, 

wh

ich

 m

ean

s i

t w

ill 

acc

ep

t y

ou

r li

ne 

vol

tag

e w

ith

ou

con

ver

sio

n a

s lo

ng 

as 

it l

ies

 w

ith

in 

thi

s r

an

ge.

 Th

e  L

ED 

in the

 upper

 area

 of

 your

 CryptoPhone

 will

 change 

col

or 

to 

yel

low

 w

hile

 th

e d

evi

ce 

is 

bei

ng 

cha

rge

d, a

nd 

to 

gre

en

 wh

en

 fu

lly

 ch

arg

ed

. Y

ou

 ca

n e

ith

er 

ch

arg

e t

he 

Cry

pto

Ph

on

e w

ith

 th

e  p

ow

er 

su

pp

ly 

(re

com

men

ded

or 

wit

h t

he 

su

pp

lie

d U

SB

 sy

nc 

cab

le 

on

 a 

com

pu

ter

Ch

arg

in

g o

ver

 U

SB

 ta

kes

 co

nsi

der

abl

y m

ore

 ti

me 

an

is 

dep

en

den

t o

n y

ou

r c

om

pu

ter

s c

on

fig

ura

tio

n a

nd 

set

up

, s

o it

 m

ay 

not

 w

ork

 u

nde

r s

om

e c

irc

um

sta

nce

(e.

g. i

f yo

u h

ave

 n

o s

yn

ch

ron

iza

tio

n s

oft

war

e in

sta

lle

on 

you

r c

om

put

er 

or 

the

 U

SB

 po

rt i

s n

ot p

ow

ere

d  u

p). 

Du

e to

 th

e h

igh

er 

pow

er 

con

su

mp

tio

n o

f th

e b

uilt

-in 

pow

erf

ul c

om

pu

ter

 an

d th

e b

ack

lit 

dis

pla

y, t

he s

tan

dby 

an

d ta

lk 

tim

es 

in

 se

cu

re 

mod

e  a

re 

les

s th

an

 w

hat

 yo

mig

ht e

xpe

ct i

n n

orm

al G

SM

 ph

on

es.

 A

lso

 p

lea

se 

not

th

at t

he 

sta

ndb

y a

nd 

tal

k ti

mes

 m

ay 

var

y d

epe

ndi

ng 

on 

you

r d

ist

an

ce 

to 

th

e n

ear

est

 G

SM

 ba

se 

sta

tio

n: t

he 

fu

r-

th

er 

aw

ay 

th

e  b

ase

 st

atio

n, t

he 

mor

e p

ow

er 

you

r p

hon

nee

ds 

to 

use

 to

 re

ach

 it.

 S

par

e b

att

eri

es 

are

 av

aila

ble

 in 

nor

mal

 el

ect

ron

ic 

sto

res

 th

at s

ell 

mob

ile

 p

hon

es.

 

Not

e: w

e r

eco

mm

en

d t

o c

har

ge 

you

r G

SM

K C

ryp

to-

Ph

on

e e

ver

y n

ig

ht 

or 

hav

e a

 c

har

ged

 sp

are

 b

att

ery 

rea

dy.

 Fo

r s

ecu

rity

 re

aso

ns 

exp

lai

ned

 la

ter

 in

 th

e c

hap

-

CryptoPhone G10 User Manual

5

im

med

iat

ely

, a

s th

is 

may

 b

e a

n a

tte

mpt

 to

 in

ser

t  m

ali-

cio

us 

fir

mw

are

 in

to 

you

r C

ryp

toP

hon

e. P

lea

se 

see

 o

ur 

Qu

est

ion

s a

nd 

An

sw

ers

 se

ctio

n (Q

&A

) o

n th

e w

ebs

ite

htt

p:/

/w

ww

.cr

ypt

oph

on

e.c

om

/ f

or 

fu

rth

er 

det

aile

d in

-

for

mat

ion

 on

 th

e b

en

efi

ts 

of p

ubl

ish

ed 

sou

rce

 cr

ypt

og-

rap

hy.

 

Sec

uri

ty,

 St

ora

ge 

an

d H

an

dlin

Yo

ur 

Cry

pto

Ph

on

e i

s a

 C

om

mu

nic

ati

on

 S

ecu

rit

(C

OM

SE

C) d

evi

ce.

 It

 ca

n o

nly

 be

 re

gar

ded

 as

 se

cu

re 

as 

lon

g a

s y

ou

 ha

ve 

per

man

en

t a

nd 

un

in

ter

ru

pte

d p

hys

i-

cal

 co

ntr

ol o

ver

 th

e C

ryp

toP

hon

e. O

nce

 an

 ad

ver

sar

cou

ld 

hav

e g

ain

ed 

tem

por

ary

 ph

ysi

cal

 po

sse

ssi

on 

of t

he 

Cry

pto

Ph

on

e, i

t  m

ust

 b

e r

ega

rd

ed 

as 

com

pro

mis

ed

The

re 

is 

a  v

ari

ety

 of

 po

ten

tia

l m

eth

ods

 th

at w

oul

d a

llo

an

 ad

ver

sar

y to

 lis

ten

 in

to 

you

r c

alls

 aft

er 

he 

man

ipu

-

lat

ed 

the

 C

ryp

toP

hon

e a

nd 

gav

e it

 ba

ck 

to 

you

. K

eep

 th

han

dse

t w

ith

 yo

u s

ecu

rel

y a

t a

ll t

im

es.

 O

pti

mal

ly,

 yo

sh

ou

ld 

tak

e  it

 w

ith

 yo

u to

 th

e b

ath

roo

m, p

ut i

t b

esi

de 

you

r b

ed 

wh

en 

you

 sl

eep

 an

d n

ot l

eav

e  it

 alo

ne 

in

 th

hot

el r

oom

If 

you

 h

ave

 »

los

t« 

th

e C

ryp

toP

hon

e a

nd 

»fi

nd«

 it

 ba

ck 

aga

in

, i

t h

as 

to 

be 

reg

ard

ed 

as 

com

pro

mis

ed

. N

eve

len

d  y

our

 C

ryp

toP

hon

e. M

ajo

r in

tel

lig

en

ce 

age

nci

es 

are 

kn

ow

n f

or 

a w

id

e  v

ari

ety

 o

f h

igh

-te

ch

 m

an

ip

ula

tio

met

hod

s th

at a

re 

im

pos

sib

le 

to 

det

ect

 w

ith

ou

t a

 m

as-

CryptoPhone G10 User Manual

24

Содержание CryptoPhone G10

Страница 1: ...anual Contact For support service and repair please contact e mail support cryptophone de phone 49 700 CRYPTTEL fax 49 700 CRYPTFAX Further information http www cryptophone com 2005 Gesellschaft für Sichere Mobile Kommunikation mbH GSMK Berlin Germany CryptoPhone G10 User Manual 28 ...

Страница 2: ...o install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be ...

Страница 3: ... Lift up the SIM card cover CryptoPhone G10 User Manual 3 There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective we will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail us at service crypt...

Страница 4: ... you may need a plug CryptoPhone G10 User Manual 4 sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh ...

Страница 5: ...es Note we recommend to charge your GSMK Crypto Phone every night or have a charged spare battery ready For security reasons explained later in the chap CryptoPhone G10 User Manual 5 immediately as this may be an attempt to insert mali cious firmware into your CryptoPhone Please see our Questions and Answers section Q A on the website http www cryptophone com for further detailed in formation on t...

Страница 6: ...select Flight Mode in CryptoPhone G10 User Manual 6 new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their i...

Страница 7: ... the event that the Cryptophone reacts unexpectedly i e device response becomes very slow key lock can not be unlocked or the phone does not connect to a GSM network you can quickly reset it by removing and re inserting the battery The GSMK CryptoPhone will restart without erasing the memory In the unlikely event such a problem persists you can Cold Boot the device see page 16 This will however de...

Страница 8: ...g each call By reading and CryptoPhone G10 User Manual 8 CTQ DGA Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not r...

Страница 9: ...etwork The GSM network handles data with lower priority than voice transmissions CryptoPhone G10 User Manual 9 Using the headset For hands free operation a stereo headset is included with the GSMK CryptoPhone You can plug it in any time before or during a call however you may termi nate an ongoing call under some conditions when in serting the headset plug off angle The headset cable connector soc...

Страница 10: ... on a satellite network or a network with weird data call configuration CryptoPhone G10 User Manual 10 Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it c...

Страница 11: ...d for the CryptoPhone The practice is becoming increasingly rare but a GSM provider may only allow incoming data calls to subscribers that have CryptoPhone G10 User Manual 11 sary Cold Boot will not erase the contacts and SMS messages stored on your SIM card Also a Cold Boot does not erase any information that you may have stored in Flash Storage or on SD memory cards To initiate a Cold Boot follo...

Страница 12: ...he other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone G10 User Manual 12 General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipment in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment t...

Страница 13: ...rtions and feedback effects that can reduce your call quality considerably CryptoPhone G10 User Manual 13 Note In many countries the use of mobile phones while driving is regulated or completely prohibited You are responsible for complying with local laws and regulations on telephone use while driving a car We strongly recommend the use of the enclosed headset while driving even if local regulatio...

Страница 14: ...n using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To pr...

Отзывы: