Jump to content

Recommended Posts

Posted
ensuring your voice´s privacy  

Strongest and most secure algorithms available today  

AES256 and Twofish  

4096 bit Diffie-Hellman key exchange with SHA256 hash function  

Readout-hash based key authentication  

256 bit effective key length  

encryption key is destroyed as soon as the call ends  

Source code available online for independent security assessments  

also supports unencrypted calls, unencrypted SMS, address book, calendar etc.  

works in any 900/1800 GSM network that provides data call facilities  

Standby: 150 hours  

Talk time: Secure up to 3 hours 15 minutes

/ Unsecured up to 3 hours 30 minutes

Coming soon: GSMK CryptoPhone 100 US  

ensuring your voice's privacy  

same featureset and codebase as normal GSMK CryptoPhone 100  

works in any GSM 1900 network that provides data call facilities

phone1_case_vs.jpg

gsmk100frei.jpg

Guest Crispy
Posted

Is that a phone or jsut a piece of software for Pocket PC?

Guest mcwarre
Posted

Anyone who thinks that this is really secure is conning themselves. The NSA wouldn't let it be sold unless they had access to all the keys.........

Posted
Is that a phone or jsut a piece of software for Pocket PC?

thhat is a new phone

Guest TSCRYPTO
Posted
Anyone who thinks that this is really secure is conning themselves.  The NSA wouldn't let it be sold unless they had access to all the keys.........

You are 100% correct mate - hence the export restrictions on PGP from the US (It was classified as a weapon).

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.