Cryptophone protects calls, SMS and data. Voice encryption is secured end-to-end on voice over IP over any network (GSM, 3G, 4G, LTE, WLAN) using AES256 and Twofish, a 4096 bit Diffie-Hellman key exchange with a SHA256 hash function. Encryption keys are destroyed as soon as the call ends. Secure messaging is based on the same encryption used for voice.
Source code for Cryptophone is available for independent security assessments so that Cryptophone owners can be assured the code is free of backdoors, free of key escrow and free of centralised or operator owned key generation.
Cryptophone's Android operating system is hardened, built from source code by GSMK with granular security management and streamlined, security optimised components and communication stacks.
Baseband firewall 2.0 on Cryptophone provides unique protection:
Cryptophone's hardware module controller and permission enforcement module controls access to network, data and sensors (camera, microphone, etc) keeping you in control of your individual or enterprise security policies and requirements. The encrypted storage system on Cryptophone protects your contacts, messages and notes data at rest against unauthorised access.
Cryptophone mobile phones, desk phones and satellite phones protect private individuals, business, corporates and enterprise, and government organisations.
Aitchison Reid Consulting Pty Ltd (ARC) cares about people living and operating safer with information and communications technology in public life, in business life and at home.
ARC is the Cryptophone authorised reseller for its alliance partners ESD America/GSMK, in Australia, Aotearoa/New Zealand and the South Pacific.
Contact ARC anytime to arrange a private and confidential conversation about your requirements for Cryptophone or any of ARC’s other products and services across Australasia, Aotearoa/New Zealand and the South Pacific.
No products found in this collection