Home

GSMK CryptoPhone G10 User Manual

image

Contents

1. p ureza e sey e e Suump ep aroa padnu y 1Hodsuen 0 uoy goidArD y Aq p sn apow Je erep WSS ay Pur peq lt e jas 1sn no souryowuos utege pje ayy dn Sumas Aq PAUAUMIID aq UYO ULI uons Suoo5 YIOMJIN uons 8uo2 YIOMJSU IO 881 A0D2 WSS peq IOM ATensn ze Aejap euurou uey 198U0 10 SUOSPOY moo o SIOII uotssrtuusuen 10 IaSUO s e1 YIOMJOU uoud 1 IY 1 AO 3IOA p 1d pu y Jo uorssrtusuezn u Jr 198U0 s1 9 owy SIU Toued nok year 0 MOA INOA 107 s ye1 IUH Jo ponad ayy saquosap Aejaq 1S1oA ay per enb preo 1s q t SAJCIIPUL UIH pai 0 MOTJEA JAAO U 18 UIM q Sdajs AJ ut IO OD soue 1oleorpur AkTap fe UL SED rn s Sump eno ep uones IdAUOD ay Suump Jouyred MOA YAM po2 1 n t Gr 1 A 1 ATTestpotied pno no uoye dyad Ady oy Sutmp uoneuos1oduur 104 poyedt stydos 3 A jsuTese opts ayes ay uo l duuo2 aq o I S19 AY STY spe oy u uA 1 unled INOA JO J3OA dy 0 uonu ne ed se jd Ady wues y SUISN 89uneorunusuuo2 p put are no yey ons ayeut nod Toued Nok YIM Way SUJUA enuen osn O15 suoygoyd r5 STe mo s SuDeld u uA 1 spe u paseq M amp SUISN pUdWIWIODAI IM UOTIa 0Id 1u DuJns Jayjo jou saop pue Aresiaape p urtu3 l p L 107 a_pANy OU SI dlool n g uA pasn uoydAIDuUA ul A Isea spe INoA 0 Ud sT pno Jaydeye ue os qu uudrnbD payed ystydos j tez pouu YIM si 1 tu p zpunu eIaAas 1
2. affect the quality of the call If the call quality is unac ceptable please try calling again Call quality can also be adversely affected when using certain GSM providers If the Delay indicator becomes reddish or red please try to find a place with better GSM coverage Use the signal strength indicator on the right upper side of the display to find a better spot If the delay indicator turns and stays solid red please hang up and set up the call again When no call is in progress the delay indicator is shown grey Switching the Calltype Normally the CryptoPhone uses the V 110 circuit switched data CSD also called digital data call bearer type to establish a secure connection To call to an analog landline or to a CryptoPhone on a satellite network or a network with weird data call configuration CryptoPhone Gro User Manual Security Advice regarding Flash Mem ory With the GSMK CryptoPhone various information is stored in Flash Memory Flash type storage is safe against failure of the backup battery You must how ever be aware that there is no way to securely erase in formation stored in flash memory in a way that it can not be possibly reconstructed by sophisticated methods of computer forensics Even if you erase the informa tion and overwrite it with other data it cannot be con sidered safely destroyed when stored on Flash Mem ory Flash memory uses its own way of managing files thatis beyond the control of the
3. aotstu JJe 0 Ssadde sey sUOYJoO dATD L SUTLEPA sry rmbD z1ou APU suone n98 1 ezo JI UA SUIALIP oym 1 spe q p sopu y Jo sn ay pu urtuo2o 1 8uons AN TED e SUIALIP ItqA asn uoud 1 uo suone n8 1 pue smej eoo yya Sur duuo2 10 ajqrsuodsai are noq payiqryord J l dtuuoo Jo paenga st SULALIP oym s uoyd rqotu Jo asn ay S LYUNOD AUR UJ 31ON enuen 219sn O15 suoygoyd ry 14 CryptoPhone Gro User Manual Mute during call To mute the microphone during a call press the soft key labeled Mute To switch the microphone back on again press the Mute key again The current status is shown in the display with the Mute Unmute Icon Secure Push to Talk In certain situations especially when you have a lot of background noise or need a high speaker volume you can activate the Push to Talk mode or PTT for short to achieve good call results This can be done either during a Secure Call or before To activate or deactivate PTT press the Menu Softkey choose Push to Talk in the Settings screen toggle the setting with the center click and press the Done softkey to return to the main screen PTT works like a two way radio When you want to talk you press the PTT button When you fin shed speaking you release the button The button used for PTT on your CryptoPhone Gio is the Camera but ton on the right side of the device Please do not forget to release the ta
4. ory aUOYgoidATD JWS I UNA QO pue Jays su or sTenuetu uoudiretus eu 1810 ayy Ajddns suose r n o s 10 guoudo1ld ro YNSD oY uo qe reAe jou are sauoydyieurs 19440 WOI MOUY 1u8rtu noA yey sgum JO Jaquinu e os AYLI no s pappe apiaoid pue GQreuonounj uoyqodA ayy JJEPOWIWIOIIE 0 PaTfIpOw Usaq MLY uu l1s s Sune1 do pue tewuug souoyd ay s tueu puerq 1u 1 grp 1 pun ppos st yey auoYdyrews INS5 0061 00g1 006 pueq rn 3u9u 8 e uo p seq st O15 uoudo1d 9 Mog jeru enuen osn OTD uoyqoadAo Ss 51A D OZO Yad Jo gs letu L VAS 10 p uns p si ey AP SuLAnq Aq p urelqo Ajisea aq 1zoJ 1z u UVI dja seuu lue eu1 o SPJ Ted SIS Iou ay sUOYgodATD IMOA 10 SaLIOssad0e euontppy s ureu puerq 1u 1 grp Japun p os O LH Aq poinyoey NULU MAP L uo p seq st uoyqodA YIWSD L SILIOSSDDIV saio s uoud tqotu 10 Wd euuou ut qe jese are sonopeq 1u uu oe d q que1reA ay Aq par AOD JOU pue Ved re 1 pue Ie A p st Uoyd ay jo Arayeq a qeadsieyoal JawiAjog wintyy JaMmod ysiy JY 1oN stu usr rzmb Quno s INOA yny 0 sn qe u JIM STU ATUO ourts s mse ur tun2 s IY o1 AY pe o11s z lur UMO INOA ut st r ey puelss pun se d p 1oustr aq pjm suoynev rd quno s pue poyu suiddrys pastape y Jo sueI0USI Ul 10 pue 1u ur8p Mope 101d mom redor 10 SALE PY siu tudrus s rmp oo1d Qumo s pue Zurddrys 1 dord y moqe nok pny
5. AO P AI 2 1 aq ULI s eUSIS orpe1 yzoopnjg uoudo1d 1o y ut ur8u uoydAnu y p u2e savy t a10Jaq sI e2 epu pyuo INOA Jo siu l1uo2 IY 1seo9peolaq prom no jaspesy ulool ni g UHA PY SI uose 1 IYL sTTeD paidAinua Suunp 1 spe u ulool niq e Sutsn pu uutuo 3 11ou Suomns am sje ououd p 1d u un eurrou SULJEUL 10 19spe u yoong 2 asn o jqrssod st y MYM PAU YNJE L seu O1D auoygoydATD AL 1 spe u ypoopnjg auoygoydAry mo ym p r ddns uo y uey 19440 sjaspeay Sursn Aq p sne2 sw jqord 103 yzoddns aptaoid jou s op YWSD stA p IY JO PIS FUSH JAMO IY UO ST 1 5pos JOPSUUOD qe2 19spe u u L 8ue Jo Snyd 1 spe u ay ZunI s ur UYM suonrpuo2 dos JapuN Je SUIOSUO ue leu TUL19 APU NOA JaAaMoyY Ted e SULINP 10 aiojaq Suy Aue ut yt Snyd ued nox auoygoydAry YINSD oy YM p pnput st spe y Oaiajs e UONeIado zj spuey 104 jespeay t Sutsr enuen 219sn O15 suoygoyd ry OT IO CryptoPhone Gro User Manual So even if the delay indicator is green there is always a certain noticeable delay much like on some transcon tinental phone calls If the overall line quality becomes bad the delay rises and you may experience gt drop outs lt Note that the quality on international calls might not be as good as on domestic calls The multiple op erators involved in an international call often try to minimize their costs by technical measures that can
6. KLEA IPM L 10J UMOUY are SaUade uS 1ofe lw uoudold sS IMo lt pus 1 A N p sruroiduuoo se papsesdal aq 0 sey y ulese ypeq 4 puy pue suoygoydArD ay gt 13so lt aaey NOK JI WOOL a 0Y y Ul uo e y aAea 1ou pue d ls nok u uA paq Tmo pts q 4 1nd tuoolqteq Iy o1 NOA uA 1 aye pinous nod eumdo sou ye ye J rm s nok YIM 19spueu ay d y nok 0 yeq y aAes pue uoudqo1d 1O ay pare ndruew ay Jaye syed nod OUI u tst 0 ATesIaApe ue MOTe prom y spoot enu lod Jo KOMEA st YI p sruroiduuo2o se papiesal aq 1snuu y uoudo1d 1o y JO uorss ssod e5tsKud Are1oduu 1 p ure8 aaey p noo Aresiaape ue uO uoudo1d 32 IY 1940 OIJUOD Ted ishyd paydniiayurun pue 1tu uetusod aary nod se Suo se mo s se popreSal aq ATUO ue 4 2dIAaP DASWOD AyLINDIS UOTJEIIUNWIWIOT amp st BUOY goIdAID INOA Sur puerH pue IBLIS Qum s Ayder 30 d 1 adios paystqnd jo sypou q ay uo Uoyeunoz ur p re1 p z uln 10 uoo uoudold ro AAA dnu lrtsq A y UO W290 uono s sIaMsUY pue suons nO INO das se d uoudo1d 3O AMOK olur 1eAXu1U SNOP jeu posut 0 1dus ne ue aq Aew sry se Ajoyerpourun enuen 219sn O15 suoygoyd ry Vz CryptoPhone Gro User Manual ter Security Storage and Handling we suggest you keep the CryptoPhone with you at all times so that it is under your permanent supervision If the phone rings or you need to place a call whi
7. on Communication Security equipment like the CryptoPhone is a grave security risk that you should only take if it is absolutely necessary Please be aware that installing 3rd party software might irrevocably compromise the security of your CryptoPhone or dam age its functionality GSMK does not provide any support for installing 3rd party software and will not provide support for prob lems caused by installing 3rd party software Any and all problems caused by 3rd party software are not cov ered by warranty or support You have been warned If you require large number of custom CryptoPhones that include certain software components of your choice by default please contact sales cryptophone de to discuss your requirements 27 T AO2 PIED WIS t dn Yr ad1Aap IY JO 19u1o02 1I MO Y ut 1o Ss PED WIS IY s M NOX spTeAuAop 1 A0O2 dU Surpys pue pts oeq JAMO u uo Ye ayy Surss 1d Aq o5tA p IY JO 19A0D Ye IY AOUI 1 WIS IY 1H sur OL s Ie3 2e d o 1 p10 ut or5 auoygoidAID YWSD y ut WIS pIe WSD PHA e posut o p u nog uo uoud IP SUTUPIIMS 79 pled WIS Suru sul JOUUUL aides ATTesTYyde1s0ydA19 e ut nok 0 YS Aq paptaoid ATuo are s epdn uoud 01d 1 poH AyUeITeEM MoA proa pue 1eAG11U auoygoydArD y ons p euu sty se soyepdn uu ls s Sune31 do yoso sn 0 AT JOU OG suose 1 Qumno s 10 sn Aq p qesrp u q seu tr euonounJj tuos yey STEME dq o1 p u NOA qmq
8. operating system So files that are no longer visible after deletion in the file manager may still exist in some unused part of the Flash memory In addition esoteric physical effects memory burn in make it possible for a forensic in telligence laboratory to reconstruct the former content of Flash memory even if it has been erased or overwrit ten once The same problem holds true for mini SD memory cards because they are also based on flash memory technology We therefore recommend that any potentially compromising information is not stored in the Flash Storage if there is a risk that the device may fall into the wrong hands I9 II DALY FEY si quosqns o1 sje eyep Surtuuoour mopje ATUO Keu Japtaoid p s5 e mq oter A Surse pour 8urtuo5 q st 9n5e1d ay suoygoydA1 gt D y 104 p p u se yons Se Bep INS gt Jo uondaces t Drns si ptAo1d IUOS TIED mn s e dn Sumas UHA stu qoid sues d Ted y Aq pop Je JOU ale s e5 SUTUOIU zruoruou Ks 0 SUT IUOS p u suu pouu t Sk OTT A YIM Udy 198uo Saye TE A UA dnjas Ted ayy Poran st ZEA Jt dn moys IM us sUoYgoydArD ay ut uor uoud doyysap pews y utege UO pue Fo y Suys Aq uoyd y mezso1 pue yo ss rd o1r A sdq 0096 0 U d e1 ed OY adUeY 0 nu ui tuss IY sn OITA 0 eq yams O Urese uo pue JJo uoud JY YMS 31Jos YO ay ss 1d zE A sdq 0096 O 1e1 LA TOPUN Amu I YDJLIMS MO
9. 15 suoygoydAry QI I2 CryptoPhone Gro User Manual a special data subscription which comes with a special second phone number to call to reach the Crypto Phone Some providers may not recognize that a num ber you are calling is a GSM ISDN number and erro neously try to handle the call via a modem This can be recognized by the called party because he she hears a modem sound when picking up the phone Some pro viders may not pass data calls to certain other providers at all Under certain circumstances especially when roaming in GSM networks that are not properly configured the never ending key setup problem may occur The phenomenon is that the key setup phase takes longer then 20 seconds and never comes to an end The un derlying technical problem resides in the GSM net work Data calls are sometimes set up but then fail to transport any data All of the above conditions may make it impossible to use the CryptoPhone in one or both directions between two CryptoPhones To by pass this problem if you are roaming try switching providers If secure calling only works in one direction you could use an unencrypted call to tell the other party to call you using Crypto Phone These problems are inherent to using the CSD data call facility and apply to all encrypted telephony over GSM CryptoPhone Gro User Manual General Mobile Phone Security Advice The use of mobile phones and other radio transmis sion equipmen
10. LMOT OJ t Te andes L 5e d o1 1 p10 UJ ep paidAnug ue Supejq urese NId 1Tno 1939 0 p rmb aq JIM NOX JJO POIN W314 Papas pue rmp oo1d oures ay Moyo urese uo yPeq OIPeI IY YAMS o I JJO POYAS SI WSD oy pue SADIE ST IPOW JSF u uA ToquiAS euu lue Iy 0 Ix u x M 99S MOU TIM noq Ady lt y Sutssaid Aq 4S1 enuen osn OTD uoudo1d ro pue systu Sur81 uu JsuTese guppy 1uelsuoo s rmbD ssadoid sty puy ssadoid e mq tels L JOU st Qum s sloej UMOJ U1 Te Ya nod ptAo1d JTA M os s1s 1 1ur INA 0 adeUTEP JeQuajod uru p 0 pains jsaq uo ay are no X SIOUWIO SND INO YIM uoneoruntutruoo JUaTedsuey pue uado st Ajiadoid way sppuey o Aem ATUO ay aAaTiaq aM aq ued spnpord orude18o1d D YM sw jqord Qu no s se peq sy pedutt Qumo s qtssod y uo yoda1 p lre1 p e se A se oyepdn IeAUU1U e aprAodd IM M uoudo1d uaO IY ut MET e SIAAOISIP uoKue JUDAS y uj oI5 auoydoydArD y Jo uonerodo Jo QtIenb pue Gumno s y aaordut 0 sy s ATTeNUTUOD YWSD s iepdn rm s AIOUISUL 1e oA Ul UOLUIT 1OJUL Je XPP IAMO LA SYL OI aded s brA p y 100g POD ued nod slsts1od us qo1d e yons 1u A AJOYTUN ayy UJ AIOWUIW IY Sutse1 NOY 1Ie1s 1 M auoygoidA1D yIINS25 IL Alayeq oy SuLJasut o1 pue SuIAOUJ 1 Aq 4 jase J ombD ued nod YIomjou INS5 p 0 IUD Jou s op uoud y 10 p po un aq Jou UD YDO
11. Lid I SeN OLD AWNSD jenuey sN O15 uoudo1ld 19 AWSD enuen osn O15 uoudo1d ro gz ueus g AWS Hq uoneyrunuuruoy IQON IPPS M PEPSI Cooz wioo suoydoydAr mam dyy uoneuudojur yung XVALJAND OOL 6 xez TALLAJAND 004 6t uoud p uoudoid ro uoddns Treuu peu se d ed r pue m s 41oddns 104 pauo enuen I sn O15 suoygoyd ry CryptoPhone Gro User Manual General Inserting SIM card amp switching the phone on Enter your PIN Charging Standby Flight Mode Placing an Encrypted Call Key Verification Call Quality during Secure Calls Switching the Calltype Problems with setting up a Secure Call Changing the volume Mute during call Secure Push to Talk Secure Calls while moving Redialing Calling from the Contacts list General Mobile Phone Security Advice Power down Cold Boot amp Emergency Erase Security Advice regarding Flash Memory Using the headset Bluetooth headset Sync Contacts and Appointments Troubleshooting Security Updates Security Storage and Handling Repairs Accessories 3rd Party Software Contact ODO ON AAAA uwv IO CryptoPhone Gro User Manual 3rd Party Software In theory it is possible to install Microsoft Smartphone compatible 3rd party software on your GSMK Crypto Phone device You should know that 3rd party software of any kind can be used to attack the integrity and secu rity of your GSMK CryptoPhone Installing additional software
12. MA p SY JO APIs Ya IY uo suolnq oruo2 tun oA IY sn ED m s e SULINp urnoA orpne sy 8ueu2 OJ SUINJOA t SUISUY uoudold o oy Suniels 1 Aq POX q s uun uuos ULI uonrpuo2 st IL IOLARYaq parrsopun Jayjo 10 tu qoid dni1 s Ady Sur pu 1 A u Y sne2 1u8ttu ospe prym auoygoidArD y Jo wed WS ay Jo ayejs qelsun ue 0 pe Leur YIOMIIU WISH IY JO uonrpuo2 dyfIDEds e s tun tuos Stale PIIA WSH pts1no uoneoruntuuuoo2 IMS qepioje Jo 1J u q p ppe y aptaoid 0 tu 1s s A J tes eAeINY dy s sn yey uonnos S L I ooz uoud o d 10 INO pu uruuo2 1 aM Sstu qo1d yns u dx OYM etsy pue BLY YON domy ut si uuolsno 104 enuen osn O15 suoygoydAr15 pour SINS ut Jaq UNU JEU p lo s dy serp J terp tuuur pue spout JE aANDas Y 0 SOYDIIMS MOU OTD aUoYygoydATD ay Ad 91ND eO ss 1d pue 1oe1uoo y 0 3ons o dU YIM Teq uon2o s IY Aout Ted rn2 s ay Jd OJ m s eD p l qe Mou st yos YA oy uoud y UO pue WIS INOA uo paiojs s1oe1uo2 Jo IST Y s nok MON SPeWOD p j qe uns tuou y ut Ady IOS JS y ss 1d 4ST 1peluo2 dy ut p zols JEJUOD L JED OT JST SPEJUO oy Woy SULD Aejdstp y ut UMOYS SI JaquINU parisap Iy U0 uopnq Ye U22183 ay ss 1d pue umop dn ypysdol ayy Sulaout Aq si qtunu p erp Ise oyp YSsnosyy Sut oz25s Aq 1 quunu t eIp 1 UD NOX spe SUIOSINO ot sej oy Sut suuduuo2
13. N SZUWP S Ted gep ASD 10 nuou uoyerngyuo dy 0 Jos IA nog s ocue1suunorD 1sotu 1 pun 3194498 0 TV66 lt 1215 shay y d osje ued nod d I ur1 ASD lt suon PINSIJUOD lt IION lt 1olW US pue L MJOS 414S y ssoid u ps ruou ay OS od q e2 IY DIAS oL pout Jareaq TE A I 0 Uys ULI Nok YSN I UT SIMILI WSD 1souu NH enuen osn OTD uoudo1d S yo Grotstu Ted SINS sioe1uoo s 1ou AI 351A p IY uo Pai0js eyep IYO 0 s le ATUO suonentrs AUASIOWI9 ut 400g POD 2 10 uonepu urtuo 291 u L p se1 nu uetusod pue p X ons p ST Jed y 10 eug 1euu Ady Te e2 rno s e Jo uon duuoo uodn 5tA p INOA uo aTaYMAUP D 1O8S SI syed 1sed o Jo Qu no s dU srtuo1duuoo yru yey eu l1euu y OU JON aT e Jaye urese dn 1ooq p uoud y pue aoejd saye ss d201d uonezr enIur 31 24 MON ossaid Ajsnoaueynuris s gos dU se u u1 Yep s uro5 q UDS ay HR eM VY s 1 uonnq Jamod ayy K gp uq Sutssoid ruA z pue r shoyjJos y poy E ovens yey e uo uoud t oed z G neq oY u sur Alayeq OY SAOWIAL I amnpacoid SULMOT OF Iy MOT OF 1oog p oO HLYTU OJ spied AIOUISUW GS UO 10 8e1ols use 4 Ul poTos Ley Leu nok yey UOTJeUTIOFUI AU aSe1a JOU s op 1oog POD OST pred WIS o uo parojs sadessout SIS pue s1oel1uo2 IY SLI JOU JIM 1oog p oO Ares enuen 19sn O
14. T AdY MOTS 39A s uro5 q suods 1 BILASP I K p 1o dx un si1os 1 suoYydoydArD ay Fey JAAS Y ul Sunoous qno1l enuen 19sn O15 suoygoydAry lt lt you say CTQ CryptoPhone Gro User Manual You will hear a bit of comfort noise in the speaker fol lowed by the normal ringing tone It may take a bit longer than normal before the connection is made so please let it ring After your partner has pressed the Talk button on his end you will hear a ditt dutt ditt dutt sound that signals to you that the key setup procedure for the secure connection is in progress Key setup may take from 3 to 3o seconds but typically 8 seconds de pending on line quality Once key setup is completed you hear a gt Ping lt sound and can start talking to your partner In order to verify the authenticity of the key Please take a look at the display and read the three let ters under gt you say lt to your partner and verify the three letters under gt partner says lt The green SECURE indicator is only visible when a secure call is estab lished During all other times it is shown in grey with a open lock Key Verification partner says DGA Reading the three letters and verifying what your part ner says is meant to protect you against so called man in the middle attacks on the secret session key The letters are mathematically derived from the unique se cret key that is used during each call By reading and Cr
15. ge the battery until full In order to do this you must connect the power supply to the CryptoPhone Depending on your location you may need a plug CryptoPhone Gro User Manual sive scientific effort several months of analysis at the cost of several 100 000 Euros per device If in doubt and your security depends on it consider purchasing a fresh unit The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh environmental conditions For reinforced versions of the CryptoPhone that comply with military specifications contact us at sales cryptophone de Submitting the CryptoPhone to excessively high or low temperatures like in the outside pocket of an overcoat in cold climates might temporarily or permanently damage the display and lead to accelerated battery ag ing affecting the ability of the battery to store power and thereby reducing the standby time of your Crypto Phone Sitting on the CryptoPhone or submitting the device to other heavy mechanical loads may damage parts of the phone especially the keyboard Damage to the keyboard battery and display as well as any kind of other mechanical damage is not covered by the war ranty Repairs Because of the manipulation risk we do not take back any CryptoPhones from customers except for repairs 25 dey y ut Jaye p ure dx suose umno s 10 4
16. ing cryptanalysis methods In case a firmware update is needed for secu rity reasons you will get notified either via the e mail address that you supplied when purchasing the Cryp toPhone online or directly by the distributor If you receive a notice about an upcoming security up date please verify it directly at our website http www cryptophone com to prevent attackers from slipping you a malicious update Please note that we will describe the details of the update procedure directly on the website The firmware update mechanism is cryptographically secured using a 4096 bit public key signature system which ensures only signed CryptoPhone updates will be accepted by your CryptoPhone If you receive suspicious communication regarding CryptoPhone updates such as an unannounced e mail with an update file as attachment please inform us 23 Jaqumu sy Suu lu Jaye uonndq eD u 19 ay ss 1d AWIaIIp erp pue Ady woy ay Sutss 1d Aq u s uoudo1ld d39 ay 0 PPMS UD NOA Jay 9INDIg eD Sseid pue pe UOD B PIAS SPEJUOD ISOOYD ULI NOA OSTY apts Ye y UO AdYYOS mo s eO IY ss 1d pue u ps tuou y Wo1 erp duss ued nox e5 1n2 3s e oe d oL ISD 10 Qq POPAS IID poe T eoruup l S ped eyep INS5 syoddns rtoje1ado WS5 ay ISCIOAOD WSD PPNS St 2Y Suruuni pue dn SIA p l qneduuo2 uoudo1d 32 e seu zoutred mo OU q o p u suonrpuo2 SU
17. le the phone is charging you can leave it plugged in while operating the phone Standby The GSMK CryptoPhone has four basic modes of op eration It can be either completely switched off in standby mode active or in flight mode In normal operation the CryptoPhone is in standby mode In standby mode you can switch the device on at any time by briefly pressing the left button right below the dis play and disabling the key lock Now the screen will light up To put the GSMK Cryp toPhone Gro back in standby mode simply wait until the the screen goes dark The GSMK CryptoPhone will still receive incoming calls when it is in Standby mode In other words standby mode will not disable the radio Flight Mode It is not safe to enter an airplane hospital or other no phone area with the GSMK CryptoPhone switched on or in standby mode To ensure the radio is off you need to enter flight mode To enter flight mode press the On Off button briefly and select Flight Mode in CryptoPhone Gro User Manual new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product Our ad visory board of distinguished cryptographers and secu rity researchers help us to identify and counter poten tial threats based on their intimate knowledge of the latest academic research and emerg
18. lk button when you finished talking CryptoPhone Gro User Manual Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degrada tion in call sound quality periods of longer delay and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tower also called GSM cell to the next During the handover the data connection is briefly interrupted To prevent important call contents from getting lost the GSMK Crypto Phone unlike other encrypted voice systems acceler ates the speed of decoding for a moment after the dropout to catch up with the lost transmission time This results in the voice of your partner rising in pitch the Mickey Mouse effect for a moment After a short time the pitch returns to normal The GSMK CryptoPhone Gio has been successfully tested travel ing at speeds of up to 180km h The frequency and intensity of disturbances is primarily determined by the GSM network In rural areas the network consists of fewer and bigger cells resulting in less frequent han dovers and less disturbances In urban areas the net work has typically a high density of small cells result ing in many handovers when moving and thereby causing more disturbances 15
19. pe 1 Aiayjeq zeds pasieyp e aaey 10 1 u8ru L13949 uoud 0 d 10 YINSD INOA adIeYD 0 PUSWIWIOIAI M 1ON s uoud rqouu Jas yey s 1ols JUON eULIOU ut qe IeAe are s ur lneq red I UD8 1 0 SN 0 sp u uoud nok 1 mod a10W ay UOLS aseq IY AeMe 194 INJ Y UOVS aseq WSD 1s re u t 0 o uelstp INOA uo Surpu d p Area Leu SOUT yje pue Aqpur s oy y lou se d osTy souoyd s5 euudou ur pedxe 1u8rtu nod 1eUA ueq SS 1e SPOUT rn2 s ur s tun Ye pue Aqpurys t el dsrp yppeq oy pue Joyndutoo pyziomod ur 1 mma sy Jo uonduunsuo2o JaMod 194814 ay ol Nq dn paiamod jou st od gsr ay 10 Jayndutos Mok uo p l e1sur aremyos UOTezTUOIYIUAS OU sey noA Jr 6 SOUEISUINDALD tuos JapuN 34oA jou Aew 1 os dnyjas pue uonem9uuoo si 1nduuoo nod uo 1tu pusd p st pue ouy aio qe1 ptsuo2 saye g Sn 1940 Suey Iaynduiod e uo qe2 dus gsn p rddns y YIM 10 p pu uruuroo z jddns 1 mod ay ym uoudo1ld rp y adie IYMO UD NOX Pogy ATTN usyM u 18 0 pue pogreyp Suq St IA p dy AYM AoJ K 0 10702 asueyp JIM au0ygoydAI5 1NnoA Jo eare Jaddn ay ut CA u I 8ue1 STY UTYLM Sal 1 Se BUOJ Se uorsIgAuo5 oyy a3e OA our Mok 1d 22e TIM 4 SURAT DIA AOVT OO po st Ajddns 1 mod ay pno Inok ut x 10u saop Snld y Ft Ajddns 1 mod ayy asn 0 1o1depe enuen osn O15 uoudo1d ro SEU NOM PAP 0 qtssoduur are yey spoyjout uorendiuew u2 1 u8ru JO
20. sur uv am os p uoudo1dAro orA3 s ye sn peu se jd Ired r e posu nod JI s red r ur p sn aq ILA si uuolsno 19440 Jo SpueY u ut u q Ly Pyy sed oN 3tA p YS 1J IOPELJ MOU L IO SUOM Y dems JO 1t edor 104 JIM A SAnD J p st suOYygoydArD NO JI euyy ose safes Ty suoygoidA1D puey puoo s lt 10 gt p ustrqimjJ r lt gt p xyools 1 lt amp se Surtn YONs ou st AL enuen 19sn O15 suoygoyd ry 9c CryptoPhone Gro User Manual by pushing it in the direction marked Open and in sert the SIM Then click the SIM card cover down so that it is firmly closed Now insert the battery which is stored stored separately in the shipping box Replace the back cover by sliding it gently upwards onto the device Now push the power button on the top of the device The screen will light up and the GSMK CryptoPhone Gio begins its firmware initialization This may take up to two minutes Enter your PIN Most GSM SIM cards require you to enter a PIN num ber After you have switched on the CryptoPhone you will be asked to enter your PIN After you entered the PIN press the Done button The CryptoPhone will finish initialization and provide the secure telephony mode If your GSM SIM does not require a PIN the secure telephony mode will be enabled right away We recommend that a PIN number is used to enhance individual security Charging Before using your CryptoPhone we recommend that you char
21. t in certain areas is prohibited or re stricted Because of the risk of interference with life support equipment the use of mobile phones is also banned in most hospitals Using a mobile phone in an airplane is a felony in most countries You are respon sible for complying with local laws and regulations Power down Simply press the power button for three seconds and the phone switches off The GSMK CryptoPhone firmware is unaffected by a power down as it resides in non volatile memory It is recommended to store the CryptoPhone with the battery removed if it is not used for prolonged periods of time e g several weeks Cold Boot amp Emergency Erase Initiating a Cold Boot is recommended in emergency situations to erase data stored in volatile memory that might compromise your security like SMS call his tory notes appointments etc Please note that this is not a very secure erasure procedure Traces of your data might be reconstructed in memory by a skilled adver 17 I qer ptsuoo Grrenb Ted Inok sonpar UED Pyy SPOP YPeqpse pue SUONIOJSIp 0 pes ACU Ye 0 usnd 10 jospeoy e SUISN ou tUA Wu Sutsou O poui je o1 usnd dy 10 l spe q e tA p sn aq o pausisap ATUO are pad Ao 1oleorpur SY uo u 19 Aoqe SPA urn oA Y eY JOU se d JAS NOA tun oA t Surpre8 1 peq p J enstA YIM nok apraoid TIM pue u ps IY Jo JU 102 1J T AO IU ut PLIO SI 1oleorpur SULINJOA V O
22. yptoPhone Gro User Manual Sync Contacts and Appointments The CryptoPhone supports in principle the sync of con tact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not recommend to sync your CryptoPhone with a PC especially if the PC is connected to a network for security reasons If you have high security demands and need to calculate with a very sophisticated adversary avoid to sync your CryptoPhone with a PC The CryptoPhone ships with de activated Active Sync functionality You need to re activate the sync option manually in the CryptoPhone to use it To initiate a sync connect the CryptoPhone with the computer using the enclosed USB cable Note Sync over IrDa Infrared and Bluetooth has been disabled on the CryptoPhone as a precautionary secu rity measure While we are currently not aware of ac tual problems with these sync options there is a very strong likelihood that such problems will arise in the future The main risk is that an adversary could poten tially gain wireless access to your device while it is in your pocket or just on the desk in front of you 21 alja gt a a gt EE Q SUOISSILUSUET 3010A Ue quoud I MOJ YIM LFEp s pueu JIOMPU WSI AL YIomMpU WSD 24 Jo 1m lruoze Y q pasned e

Download Pdf Manuals

image

Related Search

Related Contents

HP Z24x User's Manual  Stereotaxis / Navigant manual  Bedienungsanleitungen  5366_ auditoria-especial-pagamento-spoa    

Copyright © All rights reserved.
Failed to retrieve file