Page 2
battery status signal strength network type encryption indicator key verification code caller id line type indicator caller number fast / robust indicator volume indicator delay indicator settings menu...
General Changing the volume Inserting SIM card & switching the phone on Mute during call Security Profile Manager General Mobile Phone Security Advice Security Profile Choices Power down Enter your PIN Cold Boot & Emergency Erase Charging Security Advice regarding Flash Storage Standby Using the headset Switching on/off...
General Your CryptoPhone G10i is based on generic quadband (850 / 900 / 1800 / 1900) GSM Smartphone hardware that is sold under different brand names. The phone’s firmware and operating system have been modi- fied to accommodate the CryptoPhone functionality and provide add-...
You need to insert a valid GSM card (SIM) into the GSMK CryptoPhone G10i in order to place calls. To insert the SIM, remove the back cover of the device by sliding the back cover downwards. You will see the SIM card slot in the lower middle of the device.
Security Profile Manager The CryptoPhone is based on the Windows Mobile 005 operating system which contains some potentially vulnerable, yet convenient features and applications. To reduce the risk of attacks against your CryptoPhone’s integrity, we recommend to disable some of these fea- tures.
Security Profile choices: No Added Security This setting leaves the CryptoPhone with very little protection against potential attacks on the operating system. Some mechanisms to prevent really stupid attacks are activated, but this creates only a base layer of protection that is not sufficient against a skilled adversary. New threats (against any operating system) are discovered from time to time, and we feel selecting “No Added Security”...
Page 8
Medium Security At this level of security, the CryptoPhone disables a number of functions which are likely vulnerable to attacks, but are not essential for most users. Once you select Medium Security, the following functionality is disabled: Picture Caller ID and Picture Contacts .NET compact framework Javascript MIDP and all other Java framework...
Page 9
High Security In High Security mode, internet functionality is no longer avaialble. GPRS, PPP data calls, the Internet Explorer and the Windows Media Player are disabled, in addition to the measures taken in Medium Se- curty setting. The following functionallity is disabled in High Security mode: Bluetooth OBEX...
Page 10
Note: Depending on how you obtained your CryptoPhone, not all Security Profiles might be available or the described choices might be different in detail. GSMK provides customized Security Pro- file configurations as part of volume purchases for larger companies and organizations. So if you received your CryptoPhone from your organization, please consult with the appropriate corporate security manager regarding the choice of Security Profiles available to you.
Enter your PIN Most GSM SIM cards require you to enter a PIN number. After you have switched on the CryptoPhone, you will be asked to enter your PIN. Af- ter you entered the PIN, press the “Done” button. The CryptoPhone will finish initialization and present the secure telephony mode interface.
Page 12
CryptoPhone with the power supply (recommended) or with the sup- plied USB sync cable on a computer. Charging over USB takes consid- erably more time and is dependent on your computers configuration and setup, so it may not work under some circumstances (e.g. if you have no synchronization software installed on your computer or the USB port is not powered up).
CryptoPhone is in ‘standby mode’. In standby mode, you can activate the device at any time by opening the lid. Now the screen will light up. To put the GSMK CryptoPhone G10i back in standby mode, simply close the lid. The GSMK CryptoPhone will still receive incoming calls when it is in standby mode.
Placing an Encrypted Call In order to place a secure call, the following conditions need to be met: GSMK • your partner has a CryptoPhone compatible device up and running CryptoPhone • there is sufficient GSM coverage + 49 700 27978835 •...
pleted you hear a »Ping« sound and can start talking to your partner. In order to verify the authenticity of the key, please take a look at the display and read the three letters under »you say« to your partner and SECURE verify the three letters under »partner says«.
“Call Secure”. To place the secure call, move the selection bar with the Navigation keys to the contact and press the “Call Secure” softkey. The CryptoPhone G10i now switches to the secure call mode and immedi- ately dials the selected contact number in secure mode.
Page 17
In general, you will achieve shorter delays by switching the call type to Fast (see Switching the Calltype, page 19). Reasons for longer than normal delay are usually either bad GSM cov- erage or network congestion. Network congestion can often be cir- cumvented by setting up the call again, sometimes you just get a »bad line«.
When no call is in progress, the delay indicator is shown grey. Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train, you may experience a degradation in call quality, periods of longer delay (especially in Robust call mode) and short dropouts during a call.
Switching the Call Type The CryptoPhone G10i supports two different types of call. We call Call Type Fast them “Fast” and “Robust”. Technically speaking, the Robust mode uses a special type of error cor-...
softkey, choose Settings, and use the Navigation Control and Enter but- ton to change the Calltype to the desired mode. Then leave the Set- tings page by pressing the softkey labelled “Done”. The icon between the volume indicator and the delay indicator will switch according to the chosen Call type to indicate Fast or Robust mode.
Problems with setting up a Secure Call Your GSMK CryptoPhone G10i is designed to provide you with intui- tive, easy-to-use strong voice encryption on GSM networks - out of the box without requiring any configuration. In some countries and on some GSM networks, however, problems might occur which may re- quire some configuration and/or special procedures.
Page 22
provider may only allow incoming data calls to subscribers that have a special ‘data subscription’, which comes with a special second phone number to call in order to reach the CryptoPhone in encrypted mode. If your local GSM provider and/or call plan requires such an additional data subcription, you need to order this service from your local GSM provider.
Page 23
[Never ending key setup] Under certain circumstances, a similar signal- ing issue at the GSM provider may also result in the “never ending key setup” problem, especially when roaming on GSM networks that are not properly configured. The phenomenon in this case is that the key setup phase takes longer than 0 seconds and never comes to an end.
An on-screen indicator will pro- vide you with visual feedback regarding the volume you set. The CryptoPhone G10i volume can be changed over a very wide range to accomodate for different sound characteristics of the CryptoPhone the other party uses.
Power down Simply press the power/hangup button for three seconds and the phone switches off. The GSMK CryptoPhone firmware is unaffected by a power-down as it resides in non-volatile memory. It is recommended to store the CryptoPhone with the battery removed if it is not used for...
Cold Boot & Emergency Erase Initiating a Cold Boot is recommended in emergency situations, to erase data stored in volatile memory that might compromise your security (like SMS, call history, notes, appointments etc.). Please note that this is not a very secure erasure procedure. Traces of your data might be reconstructed in memory by a skilled adversary by means of advanced computer forensics.
Security Advice regarding Flash Storage On the GSMK CryptoPhone some information, such as contacts and SMS, is stored in Flash Storage. Flash type storage is safe against fail- ure of the backup-battery. You must however be aware that there is...
The headset cable connector sock- et is on the right side of the device. GSMK does not provide support for problems caused by using headsets other than the one supplied with your CryptoPhone.
Cryp- toPhone by supplying manipulated data to your PC or exploiting un- known problems in ActiveSync. GSMK does not recommend to sync your CryptoPhone with a PC, especially if the PC is connected to a net- work, for security reasons.
Security Updates GSMK continually seeks to improve the security and quality of opera- tion of the CryptoPhone G10i. In the event anyone discovers a flaw in the CryptoPhone, we will provide a firmware update, as well as a de- tailed report on the possible security impact. As bad as security prob-...
Page 31
much higher for a flaw to be discovered and fixed quickly than with any closed-source cryptographic product. Our advisory board of distin- guished cryptographers and security researchers helps us to identify and counter potential threats based on their intimate knowledge of the latest academic research and emerging cryptanalysis methods.
phone.com/ for further detailed information on the benefits of pub- lished source cryptography. Security Advice Your CryptoPhone is a Communication Security (COMSEC) device. It can only be regarded as secure as long as you have permanent and unin- terrupted physical control over the CryptoPhone. Once an adversary could have gained temporary physical possession of the CryptoPhone, it must be regarded as compromised.
Storage and Handling The CryptoPhone is specified and designed for use in normal busi- ness, home and other general conditions. It is not reinforced or spe- cially sealed against water and other harsh environmental conditions. (For ruggedized versions of the CryptoPhone that comply with military specifications, contact us at sales@cryptophone.de).
Replacement batteries are available in normal PDA or mobile phone stores. Accessories The GSMK CryptoPhone is based on a device manufactured by HTC, sold under different brand names. Additional accessories for your Cryp- toPhone (like holsters, car kits etc.) can therefore be easily obtained by...
rd party software might irrevocably compro- mise the security of your CryptoPhone or damage its functionality. GSMK does not provide any support for installing rd party software and will not provide support for problems caused by installing rd par- ty software.
Need help?
Do you have a question about the CRYPTOPHONE G10i and is the answer not in the manual?
Questions and answers