Advertisement

Quick Links

IP
GSMK CryptoPhone 500
© 2013 GSMK mbH
Berlin, Germany

Quick Start Guide

http://www.cryptophone.com/

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CryptoPhone 500 and is the answer not in the manual?

Questions and answers

Summary of Contents for GSMK CryptoPhone 500

  • Page 1: Quick Start Guide

    GSMK CryptoPhone 500 © 2013 GSMK mbH Berlin, Germany Quick Start Guide http://www.cryptophone.com/...
  • Page 2 CryptoPhone 500 is tion by attackers gaining physi- built on a hardened Android- cal access to the device. The CryptoPhone 500 is a state based operating system and of the art encrypted telephone includes additional 360° security Installing any potentially mali-...
  • Page 3 1 Select Security Level the operating sys- and unknown attacks impacting read the description of each se- tem’s security level the security of your phone, the curity level carefully and choose The operating system of in the Security higher security levels disable the level most appropriate for your CryptoPhone has been Profile Manager...
  • Page 4 2 Set Passphrase for The strength of protection of the words of a poem secure storage con- Secure Storage the secure storage container or song text which you tainer in the settings. depends entirely on how diffi­ remember well and The secure storage subsystem cult it is to guess your pass­...
  • Page 5: Check Your Cryptophone Number

    3 Check your CryptoPhone 4 Data Connection you are not logged in at the in standby mode to keep the Number moment. Write down your required CryptoPhone connected. CryptoPhone number so that Your personal CryptoPhone you can give it to your contacts. Please note that the Crypto- Using the CP500 over a mobile number can be found in the...
  • Page 6 5 Connect to Secure To avoid such costs it is strongly Troubleshooting: If you experi- net. Alternatively, use Wireless recommended to use tariff ence difficulties in getting your LAN / WiFi to connect to the Network plans with data flat rates. data connection to work, set Internet.
  • Page 7 6 Store your Contacts If your CryptoPhone your own CryptoPhone numbers (+807) is connected to the CryptoPhone cannot be used to send secure secure network, Each contact stored in the number, it SMS messages. the icon will show a secure storage area consists of always stays checkmark.
  • Page 8 7 Make A Secure Call number that your communica- Enter the name and corre- Optionally, enter one or two tion partner might use while sponding CryptoPhone number GSM phone numbers of your traveling abroad. for the contact you want to call contact, if you also plan to ex- Press the “Contacts”...
  • Page 9 “Key Exchange” is shown on Once the call as shown under the label that with better network coverage. the display and you will hear has been es- reads “Partner says”. If it stays red and your call has a special tone sequence indi- tablished, read glitches or bad audio, change to cating that the cryptographic...
  • Page 10 8 Send a Secure Text highlight the name For each key exchange, Like in a secure Message of your contact and five SMS messages will phone call, the six keep it pressed, be sent and received, letters of the cryp- Before you can exchange then select “Show/ containing the public key...
  • Page 11 9 Timeline the letters your partner reads The SMS key material is kept an option in the CryptoPhone out are the same as shown un- inside the secure storage con- “Settings” menu. der “Partner says”. tainer and is used to generate The timeline shows individual message keys for your call and SMS...
  • Page 12: Lock/Unlock Secure Storage

    “Unlock” icon on important CryptoPhone 500 cy erase function to overwrite the CryptoPhone features directly from Android’s all key material as well as the main screen.
  • Page 13 13 Reset 14 Cold Boot tings” menu. Note that an logue and select “Cold Boot”, emergency erase will take sev- then follow the instructions on eral minutes. In case your phone behaves In order to switch your Cryp- the screen. unexpectedly or is getting slow, toPhone to a different security The longer the emergency erase...
  • Page 14 15 Baseband Firewall using the “emergency erase” will notify you if it detects too and notify you if such a situa- function and can possibly be many suspicious events and will tion occurs. reconstructed by forensic meth- The Baseband Firewall protects then reset the baseband chip to ods.
  • Page 15 Upon first start, an on-screen and rebooting options directly taining all detected suspicious tutorial will explain the usage from the Baseband Firewall events to GSMK for analysis by and functions of the Baseband screen by pressing the menu email. Firewall.
  • Page 16 To help you mitigate these see a list of all window will pop up, al- Google Play Store, risks, the CryptoPhone 500 installed apps and lowing you to precisely which might pose a contains a Permission En- system components.
  • Page 17 17 IP Firewall You can now set each permis- out receiving data from sources Note that the PEM is no guar- sion to Allow, generate Ran­ like GPS. With the custom value antee against malicious apps dom data, Custom value for option for GPS and network compromising your Crypto- Another component of the 360°...
  • Page 18: Firmware Update

    You can check for updates for wards your current version will will not be erased by a firm- for GSM/3G and WiFi. your CryptoPhone 500’s firm- be shown. ware update. ware from the CryptoPhone This prevents unauthorized “Settings”...

Table of Contents