1
much higher for a flaw to be discovered and fixed quickly than with
any closed-source cryptographic product. Our advisory board of distin-
guished cryptographers and security researchers helps us to identify
and counter potential threats based on their intimate knowledge of
the latest academic research and emerging cryptanalysis methods. In
case a firmware update is needed for security reasons, you will get no-
tified either via the e-mail address that you supplied when purchasing
the CryptoPhone online, or directly by your local authorized Crypto-
Phone distributor.
If you receive a notice about an upcoming security update, please ver-
ify it by contacting us directly. The contact details are on our website
http://www.cryptophone.com/
to prevent attackers from slipping you a
malicious »update«.
The firmware update mechanism is cryptographically secured using a
4096 bit public key signature system, which ensures only signed Crypto-
Phone updates will be accepted by your CryptoPhone.
If you receive suspicious communication regarding CryptoPhone up-
dates (such as an unannounced e-mail with an update file as attach-
ment), please inform us immediately, as this may be an attempt to
insert malicious firmware into your CryptoPhone. Please see our Ques-
tions and Answers section (Q&A) on the website http://www.crypto-
Содержание CRYPTOPHONE G10i
Страница 1: ...CRYPTOPHONE GSMK CRYPTOPHONE G10i ...