Home
        GSMK CryptoPhone G10 User Manual
         Contents
1.    p ureza  e sey    e  e Suump ep aroa padnu   y  1Hodsuen  0  uoy goidArD   y  Aq p  sn    apow Je  erep WSS  ay   Pur peq lt  e jas 1sn  no souryowuos    utege pje   ayy dn Sumas Aq PAUAUMIID aq UYO ULI uons  Suoo5  YIOMJIN  uons  8uo2 YIOMJSU IO   881  A0D2 WSS peq  IOM ATensn   ze Aejap  euurou uey  198U0  10  SUOSPOY     moo  o SIOII   uotssrtuusuen  10    IaSUO  s   e1 YIOMJOU   uoud     1 IY  1  AO   3IOA  p  1d  pu     y  Jo uorssrtusuezn   u Jr 198U0  s1  9 owy  SIU   Toued nok year 0  MOA INOA 107 s  ye1    IUH  Jo ponad ayy saquosap Aejaq 1S1oA ay  per      enb preo  1s  q   t  SAJCIIPUL UIH    pai 0  MOTJEA JAAO U    18 UIM     q Sdajs   AJ ut IO OD soue 1oleorpur AkTap fe    UL    SED   rn      s Sump  eno ep       uones   IdAUOD ay  Suump Jouyred MOA YAM   po2 1  n      t Gr   1  A  1 ATTestpotied pno  no    uoye dyad Ady oy  Sutmp  uoneuos1oduur 104 poyedt stydos  3  A jsuTese opts  ayes ay  uo      l   duuo2 aq o I     S19 AY  STY spe    oy  u  uA 1  unled INOA JO   J3OA dy  0  uonu  ne   ed   se  jd     Ady wues   y  SUISN 89uneorunusuuo2 p    put are no  yey  ons ayeut nod    Toued Nok YIM Way  SUJUA    enuen osn O15 suoygoyd  r5       STe    mo    s SuDeld u  uA 1  spe  u paseq    M  amp  SUISN pUdWIWIODAI IM    UOTIa 0Id 1u  DuJns  Jayjo jou saop pue Aresiaape p  urtu3  l  p L 107 a_pANy  OU SI dlool  n g uA pasn uoydAIDuUA   ul    A Isea spe   INoA 0  Ud sT  pno  Jaydeye ue os qu  uudrnbD   payed   ystydos   j  tez  pouu YIM si  1  tu p  zpunu  eIaAas 1 
2.   affect the quality of the call  If the call quality is unac   ceptable  please try calling again  Call quality can also be  adversely affected when using certain GSM providers     If the Delay indicator becomes reddish or red  please  try to find a place with better GSM coverage  Use the  signal strength indicator on the right upper side of the  display to find a better spot  If the delay indicator turns  and stays solid red  please hang up and set up the call  again  When no call is in progress  the delay indicator is  shown grey     Switching the Calltype    Normally  the CryptoPhone uses the V 110 circuit  switched data  CSD    also called digital data call    bearer type to establish a secure connection  To call to  an analog landline or to a CryptoPhone on a satellite  network or a network with weird data call configuration    CryptoPhone Gro User Manual    Security Advice regarding Flash Mem   ory    With the GSMK CryptoPhone  various information is  stored in Flash Memory  Flash type storage is safe  against failure of the backup battery  You must how   ever be aware that there is no way to securely erase in   formation stored in flash memory in a way that it can   not be possibly reconstructed by sophisticated methods  of computer forensics  Even if you erase the informa   tion and overwrite it with other data  it cannot be con   sidered safely destroyed when stored on Flash Mem   ory  Flash memory uses its own way of managing files  thatis beyond the control of the
3.   aotstu JJe      0  Ssadde sey sUOYJoO dATD L    SUTLEPA    sry     rmbD  z1ou APU suone n98  1 ezo  JI UA    SUIALIP oym  1  spe  q p  sopu     y  Jo   sn ay  pu  urtuo2o  1    8uons    AN    TED e SUIALIP    ItqA asn   uoud     1 uo suone n8  1  pue smej eoo  yya Sur   duuo2 10  ajqrsuodsai are  noq    payiqryord   J  l   dtuuoo Jo paenga st SULALIP oym  s  uoyd    rqotu Jo asn ay  S  LYUNOD AUR UJ  31ON    enuen 219sn O15 suoygoyd  ry    14    CryptoPhone Gro User Manual    Mute during call    To mute the microphone during a call  press the soft   key labeled    Mute     To switch the microphone back on  again  press the    Mute    key again  The current status is  shown in the display with the Mute Unmute Icon     Secure Push to Talk    In certain situations  especially when you have a lot of  background noise or need a high speaker volume  you  can activate the Push to Talk mode  or PTT for short    to achieve good call results  This can be done either  during a Secure Call or before  To activate or deactivate  PTT  press the    Menu    Softkey  choose    Push to Talk     in the Settings screen  toggle the setting with the center  click and press the Done softkey to return to the main  screen  PTT works like a two way radio  When you  want to talk  you press the PTT button  When you fin   shed speaking  you release the button  The button used  for PTT on your CryptoPhone Gio is the Camera but   ton on the right side of the device  Please do not forget  to release the ta
4.   ory aUOYgoidATD JWS I   UNA QO pue Jays   su  or      sTenuetu   uoudiretus eu   1810 ayy Ajddns     suose  r  n  o  s 10    guoudo1ld  ro  YNSD oY  uo    qe reAe jou are sauoydyieurs 19440  WOI  MOUY 1u8rtu noA yey  sgum JO Jaquinu e os    AYLI   no  s pappe apiaoid pue GQreuonounj   uoyqodA ayy  JJEPOWIWIOIIE 0  PaTfIpOw Usaq MLY uu  l1s  s Sune1     do pue   tewuug souoyd ay   s  tueu puerq 1u  1  grp  1  pun ppos st yey  auoYdyrews INS5  0061 00g1 006   pueq rn 3u9u  8 e uo p  seq st O15     uoudo1d   9 Mog    jeru    enuen osn OTD   uoyqoadAo     Ss  51A  D OZO Yad Jo gs   letu   L    VAS 10  p  uns  p si ey  AP  SuLAnq Aq p  urelqo Ajisea  aq   1zoJ  1z  u  UVI     dja seuu  lue  eu1   o    SPJ Ted    SIS   Iou ay  sUOYgodATD IMOA 10  SaLIOssad0e  euontppy   s  ureu puerq 1u  1  grp Japun p os    O LH Aq poinyoey   NULU MAP L uo p  seq st   uoyqodA YIWSD L    SILIOSSDDIV       saio s   uoud    tqotu 10 Wd  euuou ut    qe   jese are sonopeq 1u  uu  oe d  q    que1reA ay  Aq par     AOD JOU pue Ved re  1 pue Ie  A p st Uoyd ay   jo Arayeq a qeadsieyoal JawiAjog wintyy  JaMmod ysiy  JY     1oN  stu  usr  rzmb    Quno  s INOA yny 0  sn    qe   u    JIM STU  ATUO   ourts     s  mse  ur  tun2  s IY  o1 AY   pe o11s  z  lur UMO INOA ut st r ey  puelss  pun   se   d   p  1oustr aq pjm suoynev  rd  quno  s pue poyu  suiddrys pastape   y  Jo sueI0USI Ul 10 pue 1u  ur8p     Mope 101d mom redor 10  SALE PY siu  tudrus   s  rmp  oo1d Qumo  s pue Zurddrys 1  dord   y  moqe  nok pny
5.  AO  P  AI  2  1 aq ULI s eUSIS orpe1 yzoopnjg      uoudo1d  1o    y  ut     ur8u   uoydAnu     y  p  u2e    savy    t a10Jaq  sI e2 epu  pyuo INOA Jo siu  l1uo2 IY  1seo9peolaq prom  no   jaspesy ulool  ni g    UHA PY SI uose  1 IYL     sTTeD  paidAinua Suunp 1  spe  u ulool  niq e Sutsn pu  uutuo   3  11ou    Suomns am    sje    ououd p  1d  u  un  eurrou  SULJEUL 10  19spe  u yoong 2 asn o    jqrssod st y  MYM PAU YNJE L seu O1D auoygoydATD AL    1  spe  u ypoopnjg       auoygoydAry mo  ym p  r ddns   uo   y  uey  19440 sjaspeay Sursn Aq  p  sne2 sw  jqord 103 yzoddns aptaoid jou s  op YWSD       stA  p IY  JO   PIS FUSH JAMO  IY  UO ST 1  5pos JOPSUUOD       qe2 19spe  u   u L     8ue Jo Snyd 1  spe  u ay  ZunI  s   ur UYM  suonrpuo2 dos JapuN Je  SUIOSUO ue   leu   TUL19  APU NOA JaAaMoyY    Ted e SULINP 10 aiojaq Suy  Aue ut yt Snyd ued nox    auoygoydAry YINSD oy  YM  p  pnput st    spe  y Oaiajs e    UONeIado     zj spuey 104    jespeay   t Sutsr     enuen 219sn O15 suoygoyd  ry    OT    IO    CryptoPhone Gro User Manual    So even if the delay indicator is green  there is always a  certain noticeable delay  much like on some transcon   tinental phone calls  If the overall line quality becomes  bad  the delay rises and you may experience  gt drop  outs lt   Note that the quality on international calls might  not be as good as on domestic calls  The multiple op   erators involved in an international call often try to  minimize their costs by technical measures that can
6.  KLEA IPM L 10J UMOUY  are SaUade uS 1ofe lw      uoudold sS IMo lt  pus   1  A  N  p    sruroiduuoo se papsesdal aq 0  sey y    ulese  ypeq 4   puy   pue suoygoydArD ay   gt 13so  lt  aaey NOK JI     WOOL  a 0Y     y  Ul   uo e y aAea  1ou pue d    ls nok u  uA paq Tmo      pts  q 4 1nd    tuoolqteq Iy  o1 NOA uA 1 aye  pinous  nod       eumdo    sou  ye ye   J  rm    s nok YIM 19spueu  ay  d    y nok 0  yeq y aAes pue     uoudqo1d  1O ay  pare    ndruew ay Jaye syed nod OUI u  tst  0  ATesIaApe ue  MOTe prom y  spoot  enu  lod Jo KOMEA    st YI     p  sruroiduuo2o se papiesal aq 1snuu y       uoudo1d  1o    y JO uorss  ssod  e5tsKud Are1oduu  1 p  ure8 aaey p noo  Aresiaape ue     uO    uoudo1d 32 IY  1940  OIJUOD Ted   ishyd paydniiayurun pue 1tu  uetusod aary nod se Suo   se   mo  s se popreSal aq ATUO ue  4     2dIAaP  DASWOD   AyLINDIS UOTJEIIUNWIWIOT   amp  st BUOY goIdAID INOA    Sur puerH pue IBLIS    Qum    s       Ayder   30 d  1 adios paystqnd jo sypou  q ay  uo Uoyeunoz   ur p   re1  p z  uln 10    uoo   uoudold ro AAA   dnu    lrtsq  A   y  UO  W290  uono  s sIaMsUY pue suons  nO  INO das   se   d    uoudo1d  3O AMOK olur   1eAXu1U SNOP   jeu posut 0  1dus  ne ue aq Aew sry  se    Ajoyerpourun    enuen 219sn O15 suoygoyd  ry    Vz    CryptoPhone Gro User Manual    ter    Security  Storage and Handling     we suggest you  keep the CryptoPhone with you at all times so that it is  under your permanent supervision  If the phone rings  or you need to place a call whi
7.  on Communication Security equipment like  the CryptoPhone is a grave security risk that you should  only take if it is absolutely necessary  Please be aware  that installing 3rd party software might irrevocably  compromise the security of your CryptoPhone or dam   age its functionality     GSMK does not provide any support for installing 3rd  party software and will not provide support for prob   lems caused by installing 3rd party software  Any and  all problems caused by 3rd party software are not cov   ered by warranty or support     You have been warned     If you require large number of custom CryptoPhones  that include certain software components of your  choice by default  please contact sales cryptophone de  to discuss your requirements     27    T  AO2 PIED WIS   t dn Yr     ad1Aap IY  JO 19u1o02 1I  MO     Y  ut 1o Ss PED WIS IY      s  M NOX  spTeAuAop 1  A0O2  dU  Surpys pue   pts oeq JAMO    u uo Ye  ayy Surss  1d  Aq   o5tA  p IY  JO 19A0D Ye IY    AOUI  1    WIS IY  1H  sur  OL  s Ie3     2e d o  1  p10 ut or5 auoygoidAID YWSD    y  ut  WIS  pIe  WSD PHA e posut o  p    u nog    uo   uoud  IP SUTUPIIMS 79 pled WIS Suru  sul       JOUUUL aides ATTesTYyde1s0ydA19  e ut nok 0  YS Aq paptaoid ATuo are s   epdn   uoud   01d  1   poH     AyUeITeEM MoA proa pue   1eAG11U  auoygoydArD   y   ons  p euu sty  se soyepdn uu  ls  s  Sune31  do yoso   sn 0  AT JOU OG  suose  1 Qumno    s  10  sn Aq p   qesrp u    q seu  tr euonounJj   tuos yey   STEME dq o1 p    u NOA qmq  
8.  operating system     So files that are no longer visible after deletion in the  file manager may still exist in some unused part of the  Flash memory  In addition  esoteric physical effects     memory burn in     make it possible for a forensic in   telligence laboratory to reconstruct the former content  of Flash memory  even if it has been erased or overwrit   ten once  The same problem holds true for  mini SD  memory cards  because they are also based on flash  memory technology  We therefore recommend that  any potentially compromising information is not stored  in the Flash Storage if there is a risk that the device may  fall into the wrong hands     I9    II    DALY FEY  si  quosqns o1 sje  eyep Surtuuoour mopje ATUO  Keu Japtaoid p s5 e mq    oter A Surse  pour 8urtuo5  q  st   9n5e1d ay      suoygoydA1 gt D   y  104 p  p    u se yons     Se  Bep INS gt  Jo uondaces   t Drns    si  ptAo1d IUOS    TIED   mn      s e  dn Sumas UHA stu   qoid       sues   d  Ted   y  Aq pop    Je JOU ale s  e5 SUTUOIU     zruoruou  Ks 0  SUT  IUOS  p    u suu  pouu   t  Sk    OTT A YIM Udy  198uo  Saye  TE A  UA dnjas  Ted ayy  Poran st ZEA Jt dn moys  IM  us sUoYgoydArD ay  ut uor   uoud doyysap pews y       utege UO pue Fo y Suys  Aq   uoyd   y  mezso1 pue yo ss  rd      o1r A sdq 0096   0      U     d e1 ed  OY  adUeY 0  nu  ui   tuss IY     sn    OITA 0  eq yams O    Urese uo pue JJo   uoud  JY  YMS       31Jos YO ay  ss  1d     zE A sdq 0096   O     1e1 LA  TOPUN Amu   I  YDJLIMS MO
9. 15 suoygoydAry    QI    I2    CryptoPhone Gro User Manual    a special    data subscription     which comes with a special  second phone number to call to reach the Crypto   Phone  Some providers may not recognize that a num   ber you are calling is a GSM ISDN number  and erro   neously try to handle the call via a modem  This can be  recognized by the called party because he she hears a  modem sound when picking up the phone  Some pro   viders may not pass data calls to certain other providers  at all     Under certain circumstances  especially when roaming  in GSM networks that are not properly configured  the     never ending key setup    problem may occur  The  phenomenon is that the key setup phase takes longer  then 20 seconds and never comes to an end  The un   derlying technical problem resides in the GSM net   work  Data calls are sometimes set up but then fail to  transport any data     All of the above conditions may make it impossible to  use the CryptoPhone in one or both directions between  two CryptoPhones  To by pass this problem if you are  roaming try switching providers  If secure calling only  works in one direction  you could use an unencrypted  call to tell the other party to call you using Crypto   Phone  These problems are inherent to using the CSD  data call facility and apply to all encrypted telephony  over GSM     CryptoPhone Gro User Manual    General Mobile Phone Security Advice    The use of mobile phones and other radio transmis   sion equipmen
10. LMOT OJ   t     Te  andes L   5e d o1 1  p10 UJ     ep paidAnug ue Supejq       urese  NId 1Tno  1939 0  p  rmb     aq  JIM NOX   JJO   POIN  W314  Papas pue   rmp  oo1d oures ay  Moyo     urese uo  yPeq OIPeI IY  YAMS o I   JJO POYAS SI WSD oy  pue  SADIE ST IPOW JSF u  uA ToquiAS euu  lue Iy  0  Ix  u  x   M    99S MOU TIM noq    Ady  lt    y  Sutssaid Aq 4S1        enuen osn OTD   uoudo1d  ro    pue systu Sur81  uu   JsuTese guppy 1uelsuoo s  rmbD     ssadoid sty  puy    ssadoid e mq   tels L JOU st Qum      s     sloej UMOJ   U1  Te Ya nod   ptAo1d JTA    M os    s1s  1  1ur INA 0  adeUTEP  JeQuajod   uru     p 0  pains jsaq   uo ay  are no X     SIOUWIO SND INO YIM uoneoruntutruoo JUaTedsuey pue  uado st Ajiadoid way  sppuey o  Aem ATUO ay  aAaTiaq  aM    aq ued spnpord orude18o1d  D YM sw  jqord Qu   no  s se peq sy    pedutt Qumo  s    qtssod   y  uo yoda1  p  lre1  p e se     A se    oyepdn   IeAUU1U e aprAodd  IM    M      uoudo1d  uaO IY  ut MET  e SIAAOISIP   uoKue JUDAS    y  uj  oI5 auoydoydArD   y  Jo uonerodo Jo QtIenb  pue Gumno  s   y  aaordut 0  sy    s ATTeNUTUOD YWSD    s  iepdn  rm    s       AIOUISUL    1e oA Ul UOLUIT   1OJUL  Je XPP IAMO  LA SYL   OI aded     s      brA  p    y  100g POD ued nod    slsts1od us   qo1d e yons 1u  A    AJOYTUN ayy UJ    AIOWUIW IY Sutse1   NOY 1Ie1s  1 M  auoygoidA1D yIINS25 IL    Alayeq oy  SuLJasut o1 pue  SuIAOUJ  1 Aq 4 jase  J ombD ued nod    YIomjou INS5  p 0  IUD Jou s  op   uoud   y  10    p   po un aq Jou  UD YDO
11. Lid  I SeN   OLD AWNSD       jenuey sN  O15   uoudo1ld    19    AWSD    enuen osn O15   uoudo1d ro    gz    ueus g    AWS    Hq uoneyrunuuruoy  IQON IPPS M PEPSI  Cooz       wioo   suoydoydAr mam   dyy  uoneuudojur yung  XVALJAND OOL 6   xez   TALLAJAND 004 6t     uoud    p   uoudoid ro uoddns  Treuu       peu   se   d ed  r pue m  s 41oddns 104    pauo    enuen I  sn O15 suoygoyd  ry    CryptoPhone Gro User Manual    General   Inserting SIM card  amp  switching the phone on  Enter your PIN   Charging   Standby   Flight Mode   Placing an Encrypted Call   Key Verification   Call Quality during Secure Calls  Switching the Calltype   Problems with setting up a Secure Call  Changing the volume   Mute during call   Secure Push to Talk   Secure Calls while moving   Redialing   Calling from the Contacts list   General Mobile Phone Security Advice  Power down   Cold Boot  amp  Emergency Erase  Security Advice regarding Flash Memory  Using the headset   Bluetooth headset   Sync Contacts and Appointments  Troubleshooting   Security Updates   Security  Storage and Handling  Repairs   Accessories   3rd Party Software   Contact    ODO ON AAAA uwv    IO    CryptoPhone Gro User Manual    3rd Party Software    In theory it is possible to install Microsoft Smartphone  compatible 3rd party software on your GSMK Crypto   Phone device  You should know that 3rd party software  of any kind can be used to attack the integrity and secu   rity of your GSMK CryptoPhone  Installing additional  software
12. MA     p SY  JO APIs Ya  IY  uo suolnq  oruo2   tun oA IY     sn  ED   m    s e SULINp   urnoA orpne sy    8ueu2 OJ     SUINJOA   t  SUISUY          uoudold  o  oy  Suniels  1 Aq POX   q s  uun  uuos ULI uonrpuo2 st IL     IOLARYaq parrsopun Jayjo 10 tu   qoid   dni1  s Ady Sur   pu   1  A  u     Y    sne2 1u8ttu ospe prym    auoygoidArD    y  Jo wed WS ay  Jo ayejs    qelsun ue 0  pe    Leur  YIOMIIU WISH IY  JO uonrpuo2 dyfIDEds e s  tun  tuos       Stale PIIA WSH   pts1no uoneoruntuuuoo2 IMS     qepioje Jo 1J  u  q p  ppe   y  aptaoid 0  tu  1s  s A   J  tes eAeINY   dy  s  sn yey  uonnos S L I ooz   uoud   o d  10 INO pu  uruuo2  1 aM Sstu   qo1d yns u    dx    OYM etsy pue BLY YON    domy ut si  uuolsno 104    enuen osn O15 suoygoydAr15       pour SINS ut Jaq   UNU JEU p  lo     s dy  serp  J  terp  tuuur pue spout  JE  aANDas   Y 0  SOYDIIMS MOU OTD aUoYygoydATD ay      Ad 91ND  eO     ss  1d pue 1oe1uoo   y  0  3ons o   dU  YIM Teq uon2o     s IY  Aout    Ted   rn2  s ay  Jd  OJ     m    s eD p  l  qe  Mou st    yos YA oy      uoud    y  UO pue WIS INOA uo paiojs s1oe1uo2 Jo IST   Y      s  nok MON    SPeWOD p  j   qe  uns   tuou   y  ut Ady IOS  JS   y  ss  1d 4ST  1peluo2 dy  ut p  zols JEJUOD L  JED OT     JST  SPEJUO oy  Woy SULD       Aejdstp   y  ut UMOYS SI JaquINU parisap Iy  U0  uopnq Ye   U22183 ay  ss  1d pue umop dn ypysdol ayy  Sulaout Aq si  qtunu p   erp Ise  oyp YSsnosyy Sut  oz25s Aq  1  quunu t  eIp  1 UD NOX    spe  SUIOSINO ot sej oy  Sut   suuduuo2
13. N  SZUWP  S  Ted  gep ASD 10  nuou uoyerngyuo dy  0  Jos   IA nog     s  ocue1suunorD 1sotu 1  pun    3194498 0  TV66  lt    1215  shay   y      d   osje ued nod    d   I   ur1 ASD  lt    suon   PINSIJUOD  lt    IION  lt      1olW US  pue L  MJOS 414S    y  ssoid    u    ps   ruou ay  OS    od q   e2 IY  DIAS oL       pout Jareaq TE A I  0  Uys ULI Nok     YSN I  UT SIMILI WSD 1souu NH     enuen osn OTD   uoudo1d   S       yo Grotstu  Ted    SINS    sioe1uoo     s  1ou AI    351A  p IY  uo Pai0js eyep IYO 0  s  le     ATUO  suonentrs AUASIOWI9 ut 400g POD 2 10  uonepu  urtuo   291   u L  p  se1    nu  uetusod pue p  X ons  p ST  Jed   y   10   eug  1euu Ady  Te    e2   rno  s e Jo uon   duuoo uodn     5tA    p INOA uo aTaYMAUP D  1O8S SI syed 1sed o   Jo Qu   no  s dU    srtuo1duuoo yru yey   eu  l1euu   y OU    JON       aT e Jaye urese dn 1ooq p        uoud    y  pue aoejd saye  ss  d201d uonezr enIur 31 24  MON  ossaid      Ajsnoaueynuris s     gos  dU    se       u  u1    Yep s  uro5  q UDS ay   HR eM    VY       s 1  uonnq Jamod ayy  K  gp  uq Sutssoid    ruA  z  pue  r  shoyjJos   y  poy E    ovens yey e uo   uoud   t  oed  z     G  neq oY  u  sur        Alayeq OY  SAOWIAL    I       amnpacoid SULMOT OF Iy  MOT OF 1oog p oO     HLYTU OJ        spied AIOUISUW GS UO 10    8e1ols  use 4 Ul poTos  Ley Leu nok yey  UOTJeUTIOFUI AU aSe1a JOU s  op  1oog POD        OST    pred WIS o   uo parojs sadessout  SIS pue s1oel1uo2 IY    SLI   JOU  JIM 1oog p oO    Ares    enuen 19sn O
14. T AdY    MOTS  39A s  uro5  q   suods  1 BILASP       I  K   p  1o  dx  un si1os  1 suoYydoydArD ay  Fey  JAAS   Y  ul    Sunoous   qno1l     enuen 19sn O15 suoygoydAry     lt  lt     you say   CTQ    CryptoPhone Gro User Manual    You will hear a bit of comfort noise in the speaker  fol   lowed by the normal ringing tone  It may take a bit  longer than normal before the connection is made  so  please let it ring  After your partner has pressed the  Talk button on his end  you will hear a ditt dutt ditt dutt  sound that signals to you that the key setup  procedure  for the secure connection is in progress  Key setup may  take from 3 to 3o seconds  but typically 8 seconds  de   pending on line quality  Once key setup is completed  you hear a  gt Ping lt  sound and can start talking to your  partner  In order to verify the authenticity of the key   Please take a look at the display and read the three let   ters under  gt you say lt  to your partner and verify the  three letters under  gt partner says lt   The green SECURE  indicator is only visible when a secure call is estab   lished  During all other times it is shown in grey with a  open lock     Key Verification    partner says     DGA    Reading the three letters and verifying what your part   ner says is meant to protect you against so called    man   in the middle attacks    on the secret session key  The  letters are mathematically derived from the unique se   cret key that is used during each call  By reading and    Cr
15. ge the battery until full  In order to do this  you  must connect the power supply to the CryptoPhone   Depending on your location  you may need a plug    CryptoPhone Gro User Manual    sive scientific effort  several months of analysis at the  cost of several 100 000 Euros per device   If in doubt  and your security depends on it  consider purchasing a  fresh unit     The CryptoPhone is specified and designed for use in  normal business  home and other general conditions   It is not reinforced or specially sealed against water and  other harsh environmental conditions   For reinforced  versions of the CryptoPhone that comply with military  specifications  contact us at sales cryptophone de    Submitting the CryptoPhone to excessively high or low  temperatures  like in the outside pocket of an overcoat  in cold climates  might temporarily or permanently  damage the display and lead to accelerated battery ag   ing  affecting the ability of the battery to store power  and thereby reducing the standby time of your Crypto   Phone  Sitting on the CryptoPhone or submitting the  device to other heavy mechanical loads may damage  parts of the phone  especially the keyboard  Damage to  the keyboard  battery and display as well as any kind of  other mechanical damage is not covered by the war   ranty     Repairs    Because of the manipulation risk  we do not take back  any CryptoPhones from customers  except for repairs     25     dey   y  ut Jaye  p  ure dx   suose     umno  s 10 4   
16. ing cryptanalysis  methods  In case a firmware update is needed for secu   rity reasons  you will get notified either via the e mail  address that you supplied when purchasing the Cryp   toPhone online  or directly by the distributor     If you receive a notice about an upcoming security up   date  please verify it directly at our website  http   www cryptophone com  to prevent attackers  from slipping you a malicious   update    Please note  that we will describe the details of the update procedure  directly on the website     The firmware update mechanism is cryptographically  secured using a 4096 bit public key signature system   which ensures only signed CryptoPhone updates will  be accepted by your CryptoPhone     If you receive suspicious communication regarding  CryptoPhone updates  such as an unannounced e mail  with an update file as attachment   please inform us    23       Jaqumu sy   Suu  lu   Jaye uonndq   eD u    19 ay  ss  1d  AWIaIIp  erp  pue Ady   woy ay  Sutss  1d Aq u    s     uoudo1ld  d39 ay   0  PPMS UD NOA Jay   9INDIg   eD   Sseid pue pe    UOD B PIAS     SPEJUOD   ISOOYD ULI NOA OSTY    apts Ye     y  UO AdYYOS    mo    s  eO  IY  ss  1d pue u    ps   tuou    y  Wo1   erp    duss ued nox     e5   1n2  3s e     oe  d oL     ISD  10 Qq POPAS IID poe    T eoruup  l   S ped eyep INS5  syoddns rtoje1ado WS5 ay        ISCIOAOD WSD PPNS St 2Y        Suruuni pue dn    SIA    p   l qneduuo2   uoudo1d 32 e seu zoutred mo          OU   q o  p    u  suonrpuo2 SU
17. le the phone is charging   you can leave it plugged in while operating the phone     Standby    The GSMK CryptoPhone has four basic modes of op   eration  It can be either completely switched off  in     standby mode     active  or in    flight mode     In normal  operation the CryptoPhone is in    standby mode     In  standby mode  you can switch the device on at any time  by briefly pressing the left button right below the dis   play and disabling the key lock     Now the screen will light up  To put the GSMK Cryp   toPhone Gro back in standby mode  simply wait until  the the screen goes dark  The GSMK CryptoPhone will  still receive incoming calls when it is in Standby mode   In other words  standby mode will not disable the radio     Flight Mode    It is not safe to enter an airplane  hospital or other no   phone area with the GSMK CryptoPhone switched on  or in standby mode  To ensure the radio is off  you  need to enter    flight mode     To enter flight mode  press  the On Off button briefly and select    Flight Mode    in    CryptoPhone Gro User Manual    new attack methods  Since the CryptoPhone comes  with full published source code  the chances are much  higher for a flaw to be discovered and fixed quickly than  with any closed source cryptographic product  Our ad   visory board of distinguished cryptographers and secu   rity researchers help us to identify and counter poten   tial threats based on their intimate knowledge of the  latest academic research and emerg
18. lk button when you finished talking     CryptoPhone Gro User Manual    Secure Calls while moving    When using the GSMK CryptoPhone while moving  fast in a car or a train  you may experience a degrada   tion in call sound quality  periods of longer delay and  short dropouts during a call  These effects are the result  of a so called handover that occurs when you move  from the coverage zone of one GSM tower  also called     GSM cell     to the next  During the handover the data  connection is briefly interrupted  To prevent important  call contents from getting lost  the GSMK Crypto   Phone  unlike other encrypted voice systems  acceler   ates the speed of decoding for a moment after the  dropout  to catch up with the lost transmission time   This results in the voice of your partner rising in pitch   the   Mickey Mouse effect    for a moment  After a  short time the pitch returns to normal  The GSMK  CryptoPhone Gio has been successfully tested travel   ing at speeds of up to 180km h  The frequency and  intensity of disturbances is primarily determined by the  GSM network  In rural areas  the network consists of  fewer and bigger cells  resulting in less frequent han   dovers and less disturbances  In urban areas the net   work has typically a high density of small cells  result   ing in many handovers when moving and thereby  causing more disturbances     15    
19. pe  1  Aiayjeq   zeds pasieyp e aaey 10 1  u8ru L13949     uoud   0 d  10 YINSD INOA adIeYD 0  PUSWIWIOIAI   M    1ON     s  uoud    rqouu  Jas yey  s  1ols JUON  eULIOU  ut    qe IeAe are s  ur  lneq   red      I UD8  1 0    SN 0  sp    u    uoud nok 1  mod a10W ay     UOLS aseq IY  AeMe 194    INJ   Y  UOVS aseq WSD 1s  re  u   t 0    o  uelstp INOA  uo Surpu  d  p Area Leu SOUT  yje  pue Aqpur s oy  y    lou   se   d osTy    souoyd s5  euudou ur pedxe 1u8rtu  nod 1eUA ueq  SS      1e SPOUT   rn2  s ur s  tun Ye  pue  Aqpurys   t     el dsrp yppeq oy  pue Joyndutoo pyziomod  ur 1 mma sy  Jo uonduunsuo2o JaMod 194814 ay  ol Nq        dn paiamod jou st od gsr ay  10 Jayndutos Mok uo  p  l e1sur aremyos UOTezTUOIYIUAS OU sey noA Jr  6      SOUEISUINDALD   tuos JapuN 34oA jou Aew 1 os    dnyjas  pue uonem9uuoo si  1nduuoo nod uo 1tu  pusd  p st  pue ouy aio    qe1  ptsuo2 saye  g  Sn 1940 Suey     Iaynduiod e uo    qe2 dus gsn p  rddns   y  YIM 10   p  pu  uruuroo  z    jddns 1  mod ay  ym   uoudo1ld  rp    y  adie IYMO UD NOX Pogy ATTN  usyM u    18  0  pue    pogreyp Suq St     IA  p dy  AYM AoJ   K 0  10702  asueyp  JIM au0ygoydAI5 1NnoA Jo eare Jaddn ay  ut  CA    u I    8ue1 STY  UTYLM Sal  1 Se BUOJ Se uorsIgAuo5  oyy a3e OA our Mok 1d  22e TIM 4 SURAT  DIA     AOVT OO  po st Ajddns 1  mod ay     pno Inok ut  x 10u saop Snld   y  Ft Ajddns 1  mod ayy asn 0  1o1depe    enuen osn O15   uoudo1d ro     SEU    NOM PAP 0     qtssoduur are yey  spoyjout  uorendiuew u2  1 u8ru JO
20. sur uv am os      p   uoudo1dAro   orA3  s ye sn  peu   se  jd    Ired  r e posu nod JI  s  red  r ur p  sn aq  ILA  si  uuolsno 19440 Jo SpueY   u ut u    q Ly Pyy sed  oN    3tA  p YS  1J   IOPELJ MOU L IO  SUOM   Y  dems  JO 1t edor 104  JIM   A SAnD  J  p st suOYygoydArD NO  JI  euyy ose safes  Ty       suoygoidA1D   puey puoo  s lt  10   gt p  ustrqimjJ  r lt   gt p  xyools  1 lt   amp  se Surtn YONs ou st AL    enuen 19sn O15 suoygoyd  ry    9c    CryptoPhone Gro User Manual    by pushing it in the direction marked    Open    and in   sert the SIM  Then click the SIM card cover down so  that it is firmly closed  Now insert the battery  which is  stored stored separately in the shipping box      Replace the back cover by sliding it gently upwards  onto the device  Now push the power button on the top  of the device  The screen will light up and the GSMK  CryptoPhone Gio begins its firmware initialization   This may take up to two minutes     Enter your PIN    Most GSM SIM cards require you to enter a PIN num   ber  After you have switched on the CryptoPhone  you  will be asked to enter your PIN  After you entered the  PIN  press the    Done    button  The CryptoPhone will  finish initialization and provide the secure telephony  mode  If your GSM SIM does not require a PIN  the  secure telephony mode will be enabled right away  We  recommend that a PIN number is used to enhance  individual security     Charging    Before using your CryptoPhone  we recommend that  you char
21. t in certain areas is prohibited or re   stricted  Because of the risk of interference with life   support equipment  the use of mobile phones is also  banned in most hospitals  Using a mobile phone in an  airplane is a felony in most countries  You are respon   sible for complying with local laws and regulations     Power down    Simply press the power button for three seconds and  the phone switches off  The GSMK CryptoPhone  firmware is unaffected by a power down as it resides in  non volatile memory  It is recommended to store the  CryptoPhone with the battery removed if it is not used  for prolonged periods of time  e g  several weeks      Cold Boot  amp   Emergency Erase    Initiating a Cold Boot is recommended in emergency  situations  to erase data stored in volatile memory that  might compromise your security  like SMS  call his   tory  notes  appointments etc    Please note that this is  not a very secure erasure procedure  Traces of your data  might be reconstructed in memory by a skilled adver     17      I        qer  ptsuoo Grrenb Ted Inok sonpar UED Pyy SPOP  YPeqpse  pue SUONIOJSIp 0  pes  ACU Ye   0  usnd 10  jospeoy e SUISN ou    tUA Wu  Sutsou O    poui je   o1  usnd dy  10 l  spe  q e tA p  sn aq o  pausisap ATUO are   pad    Ao        1oleorpur SY  uo u    19   Aoqe SPA   urn oA  Y  eY  JOU   se   d    JAS NOA   tun oA   t  Surpre8  1 peq   p    J  enstA YIM nok apraoid TIM pue u    ps IY  Jo JU   102 1J    T  AO  IU  ut PLIO  SI 1oleorpur SULINJOA V    O
22. yptoPhone Gro User Manual    Sync Contacts and  Appointments    The CryptoPhone supports in principle the sync of con   tact and calendar entries with a computer  You need to  be aware that in theory it might be possible to attack the  operating system of the CryptoPhone by supplying  manipulated data to your PC or exploiting unknown  problems in ActiveSync  GSMK does not recommend  to sync your CryptoPhone with a PC  especially if the  PC is connected to a network  for security reasons  If  you have high security demands and need to calculate  with a very sophisticated adversary  avoid to sync your  CryptoPhone with a PC  The CryptoPhone ships with  de activated Active Sync functionality  You need to re   activate the sync option manually in the CryptoPhone  to use it  To initiate a sync  connect the CryptoPhone  with the computer using the enclosed USB cable     Note  Sync over IrDa  Infrared  and Bluetooth has been  disabled on the CryptoPhone as a precautionary secu   rity measure  While we are currently not aware of ac   tual problems with these sync options  there is a very  strong likelihood that such problems will arise in the  future  The main risk is that an adversary could poten   tially gain wireless access to your device while it is in  your pocket or just on the desk in front of you     21        alja     gt   a  a     gt   EE  Q       SUOISSILUSUET  3010A Ue   quoud  I  MOJ YIM LFEp s   pueu JIOMPU WSI AL YIomMpU  WSD 24  Jo   1m   lruoze   Y    q pasned      e
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
HP Z24x User's Manual  Stereotaxis / Navigant manual  Bedienungsanleitungen  5366_ auditoria-especial-pagamento-spoa      Copyright © All rights reserved. 
   Failed to retrieve file