background image

CRYPTO

PHONE

GSMK CRYPTOPHONE G10i

Содержание CRYPTOPHONE G10i

Страница 1: ...CRYPTOPHONE GSMK CRYPTOPHONE G10i ...

Страница 2: ... network type signal strength encryption indicator key verification code caller id delay indicator caller number fast robust indicator volume indicator settings menu line type indicator battery status ...

Страница 3: ...16 Secure Calls while moving 18 Switching the Call Type 19 Switching the Linetype 20 Problems with setting up a Secure Call 21 Changing the volume 24 Mute during call 24 General Mobile Phone Security Advice 25 Power down 25 Cold Boot Emergency Erase 26 Security Advice regarding Flash Storage 27 Using the headset 28 Bluetooth headset 28 Sync Contacts and Appointments 29 Troubleshooting 30 Security ...

Страница 4: ...ilable on the GSMK CryptoPhone for security reasons We supply the original Smartphone manuals license sticker and CD with the GSMK CryptoPhone G10i but you need to be aware that some functionality has been disabled by us for security reasons and some functions have been changed to better integrate the Crypto Phone functionality Note Do not try to use Microsoft operating system updates as this may ...

Страница 5: ...see the SIM card slot in the lower middle of the device Insert the SIM card with the gold plated contact area facing down Now insert the battery which is stored stored separately in the shipping box Replace the back cover by sliding it gently upwards onto the device Now oben the lid and push the power hangup button The screen will light up and the GSMK CryptoPhone G10i begins its firmware initiali...

Страница 6: ...lities In the following section the different settings of the Security Profile Manager are explained in detail Please take your time to read all the options to make an informed decision After you have selected a Security Profile click the OK button on the screen Now the phone will install the operating system components according to the profile you selected The default setting is Medium Security w...

Страница 7: ... this creates only a base layer of protection that is not sufficient against a skilled adversary New threats against any operating system are discovered from time to time and we feel selecting No Added Security exposes the CryptoPhone to un neccessary risk Choose this setting only if you really need one of the services that would otherwise be disabled in the Medium security setting and if doing so...

Страница 8: ...s Once you select Medium Security the following functionality is disabled Picture Caller ID and Picture Contacts NET compact framework Javascript MIDP and all other Java framework MS scripting VBscript MS terminal services client MS Messenger client SIM Toolkit Remote OS updates Downloadable Ringtones some media playback features WAP and WAP push MMS and Video MMS ...

Страница 9: ...r and the Windows Media Player are disabled in addition to the measures taken in Medium Se curty setting The following functionallity is disabled in High Security mode Bluetooth OBEX WLAN GPRS all TCP IP functionality MediaPlayer Internet Explorer Video Telephony email functionality ActiveSync Infrared SD card functionality ...

Страница 10: ... for situations where a highly skilled adversary has to be as sumed Note Depending on how you obtained your CryptoPhone not all Security Profiles might be available or the described choices might be different in detail GSMK provides customized Security Pro file configurations as part of volume purchases for larger companies and organizations So if you received your CryptoPhone from your organizati...

Страница 11: ...red on the SIM more difficult for an attacker and prevents you from incurring charges to your ac count if the phone is stolen Charging Before using your CryptoPhone we recommend that you fully charge the battery In order to do this you must connect the power supply to the CryptoPhone Depending on your location you may need a plug adaptor to use the power supply if the plug does not fit in your out...

Страница 12: ...secure mode are slightly less than what you might expect from stan dard GSM phones Also please note that the standby and talk times may vary depending on your distance to the nearest GSM base station the further away the base station the more power your phone needs to use to reach it Spare batteries are available in normal electronic stores that sell HTC Qtek or i mate brand mobile phones Note For...

Страница 13: ...he GSMK CryptoPhone will still receive incoming calls when it is in standby mode In other words standby mode will not disable the radio it just puts the processor to sleep and switches the display off Switching on off It is not safe to enter an airplane hospital or other no phone area with the GSMK CryptoPhone switched on or in standby mode To ensure the radio is off you need to switch off your Cr...

Страница 14: ...s the green Call button after entering the number The very first call after you switch on the CryptoPhone will take lon ger to be dialed after you press the green button as the random num ber generator needs to be initialized and verified After this you will hear a bit of comfort noise in the speaker followed by the normal ring ing tone It may take longer than in unsecure mode before the secure co...

Страница 15: ...tect you against so called man in the middle attacks on the se cret session key The session key is different for each call as no key ma terial is re used between calls The letters are mathematically derived from the unique secret key that is generated for each call By reading and verifying them with your partner you make sure that you are in deed communicating using the same key Please pay attenti...

Страница 16: ...e phone The left softkey is now labeled Call Secure To place the secure call move the selection bar with the Navigation keys to the contact and press the Call Secure softkey The CryptoPhone G10i now switches to the secure call mode and immedi ately dials the selected contact number in secure mode Call Quality during Secure Calls The call delay indicator changes color in five steps between green ov...

Страница 17: ...een there is always a certain notice able delay much like on some transcontinental phone calls If the over all line quality becomes bad the delay rises and you may experience drop outs Note that the quality on international calls might not be as good as on domestic calls The multiple operators involved in an in ternational call often try to minimize their costs by technical measures that can affec...

Страница 18: ...ects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly inter rupted The GSMK CryptoPhone G10i has been successfully tested traveling at speeds faster then 180km h The frequency and intensity of disturbanc es is primarily determined by the GSM network In rural a...

Страница 19: ... short interrup tions in the conversation but can cause longer delay under bad condi tions and buildup of delay in the network The Fast mode does not use this error correction and thus has less delay and no delay buildup How ever under certain network conditions it can cause chopped up con versations with lots of dropouts or does not work at all e g on some international calls or calls between dif...

Страница 20: ... To call to an analog landline or to a CryptoPhone on a satel lite network or a network with non standard data call configuration like most GSM carriers in the USA you can switch to the V 32 bearer mode To switch the line type in the CryptoPhone mode select the Menu softkey choose Settings and use the Navigation Control and Enter but ton to change the Line Type to the desired mode Then leave the S...

Страница 21: ...call at all i e if the called party s CryptoPhone does not ring you may have to select a different Line Type or Call Type In the USA and Australia for instance the Line Type must be set to V 32 and the Call Type to Robust while in Europe and most Asian countries Line Type V 110 and Call Type Fast works best Depending on the local GSM providers network configuration different Call Type Li nie Type ...

Страница 22: ...ital GSM data number and may erroneously try to handle the data call via an analog modem In this case incoming calls may erroneously be signalled as analog unen crypted voice calls and consequently they can not be picked up in Cryp toPhone mode This issue can be recognized by the called party when a modem tone can be heared after picking up the phone If switching the line type to V 110 is not poss...

Страница 23: ... you can also use an unencrypted call to tell the other party to call you back securely using his or her CryptoPhone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM Under certain rare circumstances a specific signalling con dition in the GSM network may lead to an unclear signalling state in the CryptoPhone s GSM engine which may also c...

Страница 24: ...l pro vide you with visual feedback regarding the volume you set The CryptoPhone G10i volume can be changed over a very wide range to accomodate for different sound characteristics of the CryptoPhone the other party uses Beyond the normal audio levels additional levels provide an extra boost of volume They are marked blue in the volume indicator Note using the blue audio levels may cause the sound...

Страница 25: ...ospitals Using a mobile phone in an airplane is a felo ny in most countries You are responsible for complying with local laws and regulations Power down Simply press the power hangup button for three seconds and the phone switches off The GSMK CryptoPhone firmware is unaffected by a power down as it resides in non volatile memory It is recommended to store the CryptoPhone with the battery removed ...

Страница 26: ...mory cards To initiate a Cold Boot follow the following procedure Remove the battery re insert the battery place the phone on a flat surface hold the softkeys 1 and 2 while pressing briefly the power hangup button 1 sec wait till the screen becomes dark then release the softkeys simultaneously press 0 Now the re initialization process takes place and the phone will boot up again after a while Note...

Страница 27: ...h Storage Flash memory uses its own way of managing files that is beyond the control of the operating system So files that are no longer visible after deletion in the file manager may still exist in some unused part of the Flash memory In addition esoteric physical effects memory burn in may make it possible for a forensic intelligence laboratory to reconstruct the former content of Flash mem ory ...

Страница 28: ... Bluetooth interface While it is possible to use a Bluetooth headset for making normal unencrypted phone calls a bluetooth headset can not be used during encrypted calls The rea son is that with a Bluetooth headset you would broadcast the contents of your confidential calls before they have reached the encryption en gine in the CryptoPhone Bluetooth radio signals can be received over several hundr...

Страница 29: ... your Crypto Phone with a PC The CryptoPhone ships with de activated Active Sync functionality You need to re activate the sync option manually in the CryptoPhone to use it To initiate a sync connect the CryptoPhone the the computer using the enclosed USB cable When you sync your Cryp toPhone with a PC we strongly recommend to physically disconnect the PC from any network connection as a precautio...

Страница 30: ...e security and quality of opera tion of the CryptoPhone G10i In the event anyone discovers a flaw in the CryptoPhone we will provide a firmware update as well as a de tailed report on the possible security impact As bad as security prob lems with cryptographic products can be we believe the only way to handle them properly is open and transparent communication with our customers You are the one be...

Страница 31: ...Phone distributor If you receive a notice about an upcoming security update please ver ify it by contacting us directly The contact details are on our website http www cryptophone com to prevent attackers from slipping you a malicious update The firmware update mechanism is cryptographically secured using a 4096 bit public key signature system which ensures only signed Crypto Phone updates will be...

Страница 32: ...listen into your calls after he manipulated the CryptoPhone and gave it back to you Keep the handset with you securely at all times You should take it with you to the bathroom put it beside your bed when you sleep and not leave it alone in the hotel room If you have lost the CryptoPhone and find it back again it has to be regarded as compromised Never lend your CryptoPhone Major in telligence agen...

Страница 33: ...y damage the display and lead to accelerated battery aging affecting the ability of the battery to store power and thereby reduc ing the standby time of your CryptoPhone Sitting on the CryptoPhone or submitting the device to other heavy mechanical loads may damage parts of the phone especially the keyboard Damage to the keyboard battery and display as well as any kind of other mechanical damage is...

Страница 34: ... stand that it is in your own interest to adhere to the security measures since only this will enable us to fulfill your security requirements Note The high power Lithium Polymer rechargeable battery of the CryptoPhone is a wear and tear part and not covered by the warranty Replacement batteries are available in normal PDA or mobile phone stores Accessories The GSMK CryptoPhone is based on a devic...

Страница 35: ...t is absolutely necessary Please be aware that installing 3rd party software might irrevocably compro mise the security of your CryptoPhone or damage its functionality GSMK does not provide any support for installing 3rd party software and will not provide support for problems caused by installing 3rd par ty software Any and all problems caused by 3rd party software are not covered by warranty or ...

Отзывы: