Advertisement

Quick Links

GSMK CRYPTOPHONE G10i
CRYPTOPHONE

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CRYPTOPHONE G10i and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for GSMK CRYPTOPHONE G10i

  • Page 1 GSMK CRYPTOPHONE G10i CRYPTOPHONE...
  • Page 2 battery status signal strength network type encryption indicator key verification code caller id line type indicator caller number fast / robust indicator volume indicator delay indicator settings menu...
  • Page 3: Table Of Contents

    General Changing the volume Inserting SIM card & switching the phone on Mute during call Security Profile Manager General Mobile Phone Security Advice Security Profile Choices Power down Enter your PIN Cold Boot & Emergency Erase Charging Security Advice regarding Flash Storage Standby Using the headset Switching on/off...
  • Page 4: General

    General Your CryptoPhone G10i is based on generic quadband (850 / 900 / 1800 / 1900) GSM Smartphone hardware that is sold under different brand names. The phone’s firmware and operating system have been modi- fied to accommodate the CryptoPhone functionality and provide add-...
  • Page 5: Inserting Sim Card & Switching The Phone On

    You need to insert a valid GSM card (SIM) into the GSMK CryptoPhone G10i in order to place calls. To insert the SIM, remove the back cover of the device by sliding the back cover downwards. You will see the SIM card slot in the lower middle of the device.
  • Page 6: Security Profile Manager

    Security Profile Manager The CryptoPhone is based on the Windows Mobile 005 operating system which contains some potentially vulnerable, yet convenient features and applications. To reduce the risk of attacks against your CryptoPhone’s integrity, we recommend to disable some of these fea- tures.
  • Page 7: Security Profile Choices

    Security Profile choices: No Added Security This setting leaves the CryptoPhone with very little protection against potential attacks on the operating system. Some mechanisms to prevent really stupid attacks are activated, but this creates only a base layer of protection that is not sufficient against a skilled adversary. New threats (against any operating system) are discovered from time to time, and we feel selecting “No Added Security”...
  • Page 8 Medium Security At this level of security, the CryptoPhone disables a number of functions which are likely vulnerable to attacks, but are not essential for most users. Once you select Medium Security, the following functionality is disabled: Picture Caller ID and Picture Contacts .NET compact framework Javascript MIDP and all other Java framework...
  • Page 9 High Security In High Security mode, internet functionality is no longer avaialble. GPRS, PPP data calls, the Internet Explorer and the Windows Media Player are disabled, in addition to the measures taken in Medium Se- curty setting. The following functionallity is disabled in High Security mode: Bluetooth OBEX...
  • Page 10 Note: Depending on how you obtained your CryptoPhone, not all Security Profiles might be available or the described choices might be different in detail. GSMK provides customized Security Pro- file configurations as part of volume purchases for larger companies and organizations. So if you received your CryptoPhone from your organization, please consult with the appropriate corporate security manager regarding the choice of Security Profiles available to you.
  • Page 11: Enter Your Pin

    Enter your PIN Most GSM SIM cards require you to enter a PIN number. After you have switched on the CryptoPhone, you will be asked to enter your PIN. Af- ter you entered the PIN, press the “Done” button. The CryptoPhone will finish initialization and present the secure telephony mode interface.
  • Page 12 CryptoPhone with the power supply (recommended) or with the sup- plied USB sync cable on a computer. Charging over USB takes consid- erably more time and is dependent on your computers configuration and setup, so it may not work under some circumstances (e.g. if you have no synchronization software installed on your computer or the USB port is not powered up).
  • Page 13: Standby

    CryptoPhone is in ‘standby mode’. In standby mode, you can activate the device at any time by opening the lid. Now the screen will light up. To put the GSMK CryptoPhone G10i back in standby mode, simply close the lid. The GSMK CryptoPhone will still receive incoming calls when it is in standby mode.
  • Page 14: Placing An Encrypted Call

    Placing an Encrypted Call In order to place a secure call, the following conditions need to be met: GSMK • your partner has a CryptoPhone compatible device up and running CryptoPhone • there is sufficient GSM coverage + 49 700 27978835 •...
  • Page 15: Key Verification

    pleted you hear a »Ping« sound and can start talking to your partner. In order to verify the authenticity of the key, please take a look at the display and read the three letters under »you say« to your partner and SECURE verify the three letters under »partner says«.
  • Page 16: Redialing

    “Call Secure”. To place the secure call, move the selection bar with the Navigation keys to the contact and press the “Call Secure” softkey. The CryptoPhone G10i now switches to the secure call mode and immedi- ately dials the selected contact number in secure mode.
  • Page 17 In general, you will achieve shorter delays by switching the call type to Fast (see Switching the Calltype, page 19). Reasons for longer than normal delay are usually either bad GSM cov- erage or network congestion. Network congestion can often be cir- cumvented by setting up the call again, sometimes you just get a »bad line«.
  • Page 18: Secure Calls While Moving

    When no call is in progress, the delay indicator is shown grey. Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train, you may experience a degradation in call quality, periods of longer delay (especially in Robust call mode) and short dropouts during a call.
  • Page 19: Switching The Call Type

    Switching the Call Type The CryptoPhone G10i supports two different types of call. We call Call Type Fast them “Fast” and “Robust”. Technically speaking, the Robust mode uses a special type of error cor-...
  • Page 20: Switching The Linetype 0

    softkey, choose Settings, and use the Navigation Control and Enter but- ton to change the Calltype to the desired mode. Then leave the Set- tings page by pressing the softkey labelled “Done”. The icon between the volume indicator and the delay indicator will switch according to the chosen Call type to indicate Fast or Robust mode.
  • Page 21: Problems With Setting Up A Secure Call 1

    Problems with setting up a Secure Call Your GSMK CryptoPhone G10i is designed to provide you with intui- tive, easy-to-use strong voice encryption on GSM networks - out of the box without requiring any configuration. In some countries and on some GSM networks, however, problems might occur which may re- quire some configuration and/or special procedures.
  • Page 22 provider may only allow incoming data calls to subscribers that have a special ‘data subscription’, which comes with a special second phone number to call in order to reach the CryptoPhone in encrypted mode. If your local GSM provider and/or call plan requires such an additional data subcription, you need to order this service from your local GSM provider.
  • Page 23 [Never ending key setup] Under certain circumstances, a similar signal- ing issue at the GSM provider may also result in the “never ending key setup” problem, especially when roaming on GSM networks that are not properly configured. The phenomenon in this case is that the key setup phase takes longer than 0 seconds and never comes to an end.
  • Page 24: Changing The Volume 4

    An on-screen indicator will pro- vide you with visual feedback regarding the volume you set. The CryptoPhone G10i volume can be changed over a very wide range to accomodate for different sound characteristics of the CryptoPhone the other party uses.
  • Page 25: General Mobile Phone Security Advice 5

    Power down Simply press the power/hangup button for three seconds and the phone switches off. The GSMK CryptoPhone firmware is unaffected by a power-down as it resides in non-volatile memory. It is recommended to store the CryptoPhone with the battery removed if it is not used for...
  • Page 26: Cold Boot & Emergency Erase 6

    Cold Boot & Emergency Erase Initiating a Cold Boot is recommended in emergency situations, to erase data stored in volatile memory that might compromise your security (like SMS, call history, notes, appointments etc.). Please note that this is not a very secure erasure procedure. Traces of your data might be reconstructed in memory by a skilled adversary by means of advanced computer forensics.
  • Page 27: Security Advice Regarding Flash Storage 7

    Security Advice regarding Flash Storage On the GSMK CryptoPhone some information, such as contacts and SMS, is stored in Flash Storage. Flash type storage is safe against fail- ure of the backup-battery. You must however be aware that there is...
  • Page 28: Using The Headset 8

    The headset cable connector sock- et is on the right side of the device. GSMK does not provide support for problems caused by using headsets other than the one supplied with your CryptoPhone.
  • Page 29: Sync Contacts And Appointments 9

    Cryp- toPhone by supplying manipulated data to your PC or exploiting un- known problems in ActiveSync. GSMK does not recommend to sync your CryptoPhone with a PC, especially if the PC is connected to a net- work, for security reasons.
  • Page 30: Troubleshooting 0

    Security Updates GSMK continually seeks to improve the security and quality of opera- tion of the CryptoPhone G10i. In the event anyone discovers a flaw in the CryptoPhone, we will provide a firmware update, as well as a de- tailed report on the possible security impact. As bad as security prob-...
  • Page 31 much higher for a flaw to be discovered and fixed quickly than with any closed-source cryptographic product. Our advisory board of distin- guished cryptographers and security researchers helps us to identify and counter potential threats based on their intimate knowledge of the latest academic research and emerging cryptanalysis methods.
  • Page 32: Security Advice

    phone.com/ for further detailed information on the benefits of pub- lished source cryptography. Security Advice Your CryptoPhone is a Communication Security (COMSEC) device. It can only be regarded as secure as long as you have permanent and unin- terrupted physical control over the CryptoPhone. Once an adversary could have gained temporary physical possession of the CryptoPhone, it must be regarded as compromised.
  • Page 33: Storage And Handling

    Storage and Handling The CryptoPhone is specified and designed for use in normal busi- ness, home and other general conditions. It is not reinforced or spe- cially sealed against water and other harsh environmental conditions. (For ruggedized versions of the CryptoPhone that comply with military specifications, contact us at sales@cryptophone.de).
  • Page 34: Accessories 4

    Replacement batteries are available in normal PDA or mobile phone stores. Accessories The GSMK CryptoPhone is based on a device manufactured by HTC, sold under different brand names. Additional accessories for your Cryp- toPhone (like holsters, car kits etc.) can therefore be easily obtained by...
  • Page 35: Rd Party Software 5

    rd party software might irrevocably compro- mise the security of your CryptoPhone or damage its functionality. GSMK does not provide any support for installing rd party software and will not provide support for problems caused by installing rd par- ty software.

Table of Contents