Guest kjk Posted March 13, 2004 Report Posted March 13, 2004 ensuring your voice´s privacy Strongest and most secure algorithms available today AES256 and Twofish 4096 bit Diffie-Hellman key exchange with SHA256 hash function Readout-hash based key authentication 256 bit effective key length encryption key is destroyed as soon as the call ends Source code available online for independent security assessments also supports unencrypted calls, unencrypted SMS, address book, calendar etc. works in any 900/1800 GSM network that provides data call facilities Standby: 150 hours Talk time: Secure up to 3 hours 15 minutes / Unsecured up to 3 hours 30 minutesComing soon: GSMK CryptoPhone 100 US ensuring your voice's privacy same featureset and codebase as normal GSMK CryptoPhone 100 works in any GSM 1900 network that provides data call facilitiesphone1_case_vs.jpggsmk100frei.jpg
Guest [email protected] Posted March 14, 2004 Report Posted March 14, 2004 Cool! Version for Smartphone?
Guest Crispy Posted March 14, 2004 Report Posted March 14, 2004 Is that a phone or jsut a piece of software for Pocket PC?
Guest mcwarre Posted March 14, 2004 Report Posted March 14, 2004 Anyone who thinks that this is really secure is conning themselves. The NSA wouldn't let it be sold unless they had access to all the keys.........
Guest kjk Posted March 14, 2004 Report Posted March 14, 2004 Is that a phone or jsut a piece of software for Pocket PC? thhat is a new phone
Guest TSCRYPTO Posted March 15, 2004 Report Posted March 15, 2004 Anyone who thinks that this is really secure is conning themselves. The NSA wouldn't let it be sold unless they had access to all the keys......... You are 100% correct mate - hence the export restrictions on PGP from the US (It was classified as a weapon).
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now