CRYPTOPHONE Cp500i YOU CAN DETECT IT, ANYTIME YOU WANT

CRYPTOPHONE Cp500i YOU CAN DETECT IT, ANYTIME YOU WANT

GOVERNMENTS USE SILENT SMS & SS7 TO TRACK ANYONE THEY WANT. WITH A CRYPTOPHONE CP500i YOU CAN DETECT IT, ANYTIME YOU WANT. Featuring new Baseband Firewall v2.0 Detect SS7 Paging Requests Detect ‘Silent SMS’ tracking Voice Encryption 360° Security Secure Messaging Armoured & Encrypted The CryptoPhone 500 is a highly secure mobile phone that Device Protection comes with full source code available for independent review. Finally, you can perform an independent assessment to ensure Baseband Firewall that you can rely on strong encryption without any backdoors in the communications device that you entrust with your Hardened Android OS confidential data and telephone calls. FIPS-140 Certified THE MOST SECURE ANDROID AVAILABLE GSMK Cryptophone Master Distributor - North America ESD Cryptophone 500i Secure IP mobile phone with 360° mobile device security AS SEEN ON TECHNICAL SPECIFICATIONS Voice Encryption Device Protection Secure end-to-end encrypted voice over IP calls on anynetwork Hardened operating system — Secure Android OS built from – GSM,3G,4G, WLAN • Strongest and most secure algorithms source code with granular security management and stream- available today – AES256 and Twofish • 4096 bit Diffie-Hell- lined, security-optimized components and communication man key exchange with SHA256 hash function • Readout-hash stacks based key authentication • Encryption keys are destroyed as soon as the call ends Baseband firewall 2.0 — Unique protection against over-the-air attacks with constant monitoring of baseband processor activ- Secure Messaging ity • Baseband attack detection and initiation of countermeas- Based on the same strong encryption algorithms used for GSMK ures • Detection of attempts to track the user’s location via SS7 CryptoPhone voice encryption – 4096 bit Diffie-Hellman initial or silent SMS key exchange, AES256 and Twofish message encryption with 256 bit key length Configurable OS security profiles — Hardware module control- ler and permission enforcement module control access to net- Verifiable Source Code work, data and sensors (camera, microphone, etc.), keeping you GSMK CryptoPhones are the only secure mobile phones on the in control of your individual security policies market with source code available for independent security as- sessments. They can be verified to be free of backdoors, free of Encrypted storage system for contacts, messages, and notes with key escrow, free of centralized or operator- owned key genera- smart folders protects data at rest against unauthorized access tion, and they require no key registration. Available from ESDCRYPTOPHONE.COM Take back your privacy with a Cryptophone 500i Radio Display GSM quad-band 850/900/1800/1900 MHz • 3G UMTS HSDPA 5.1-inch sunlight-readable touch-sensitive HD Super AMOLED / W-CDMA 850/900/1900/2100 MHz with HSUPA and HSPA+ screen @ 1920 x 1080 pixels, 24 bit color depth • Corning support • 4G LTE 800/850/ 900/1800/2100/2600 MHz • Data Gorilla Glass 3 rates up to 150 Mbps supported Digital Camera Operational Features Main camera with 15.9 megapixels resolution (5.312 x 2.988) Talk time up to 21hours • fully compatible with all GSMK with auto focus, built-in flash and integrated 1D and 2D bar CryptoPhone IP mobile, satellite and fixed-line encryption code decoding • front camera with 2.1 megapixels resolution products • high transmission protocol efficiency with 4.8kbps (1.920 x 1.080) • cameras can be completely disabled by hard- bidirectional data streams for easy deployment on 2G GSM and ware module controller other networks with limited data throughput Dimensions & Weight Connectivity 142 x 72.5 x 8.1 mm / 5.6 x 2.9 x 0.3 inches • 145 g / 5.1oz. incl. Integrated microUSB 3.0 / power connector • 3.5mm stereo battery • integrated antenna audio jack • microSD memory card slot – microSDHC, Trans- Flash, microSDXC compatible • GPS • IEEE 802.11 a/b/g/n/ac Standard Accessories Wireless LAN 100-240V AC adapter • USB sync cable Audio Codecs Optional Accessories Encrypted calls: ACELP® VLBR4 codec, optimized for high- 12 / 24V vehicle charger • vehicle holder • USB docking station quality voice in low-bandwidth situations • Decoding & play- back: Qualcomm WCD9320 audio subystem with support for a wide range of audio and video codecs and polyphonic ring tones Encryption Overview Some phones promise privacy... Cryptophone delivers intelligence. Cryptophone 500i Edge Sectera Boeing Balckphone Silent Circle Blackphone APPS Cellcrypt KoolSpan Secure Mobile Signal Silent Circle Encrypted Calls Encrypted Messages No-VoIP Voip calls use specific protocols and ports. A problem for truly global use. App Permissions Denying apps access to data stored on the phone enhances privacy. Fake App Location Download an app in China but make it think you’re still at the hotel weeks later. FIPS-140 Certified FIPS Certification shows a commitment to meet- ing the desired standards for government use. Covert Device Travelling internationally with a secure phone can make you a target. IMSI Catcher Detection Stingray type devices are used around the world for tracking and monitoring. Cell Jammer Detection Did I just lose signal or am I being jammed? SS7 Anytime Interogation Detection Paging requests from the global SS7 network used for tracking Detect ‘Silent SMS’ Someone using silent sms to check my phones location Country of Origin For sale to public 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128 [email protected].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us