• Re: what are your thoughts about encrypted mobile-phone`s???

    From miklosjobbagy@gmail.com@1:0/0 to All on Tue Nov 26 08:30:00 2013
    Hi!
    These sites are always highly optimistic. However, there are some factors y=
    ou have to take into consideration when choosing an encrypted mobile commun= ication solution.
    1. Real eavesdrop-proof enrcypted mobile communication systems can be build=
    ONLY around special, unique hardware pieces (cryptocard, security card). H= owever, using this kind of hardware alone does NOT GUARANTEE eavesdrop-proo=
    f communication.
    2. Eavesdrop-proof communication can only be guaranteed with triple layer p= rotection: a hardware protects the encryption keys - cryptochip -, a softwa=
    re protects against malware and spyware, and a unique encryption solution (= non-standard!) provides eavesdrop-proof communication.
    Articles on encrypted mobile communication: http://encrypted-mobile.blogspo= t.com
    Solution with triple layer protection: http://secfone.co.uk

    Have a nice day,
    Mike

    2010. december 27., h=C3=A9tf=C5=91 23:25:05 UTC+1 id=C5=91pontban tuuttu..= ..@home.nl a k=C3=B6vetkez=C5=91t =C3=ADrta:
    Hey everyone!
    =20
    I am thinking of a GSMK phone to use it for company communications=20
    (higher management) in order to secure lines of communication about=20 sensitive info. The website itself is (of course) highly optimistic=20
    about the capabilities. I am wondering, does anyone have any experience=
    =20
    with this device?
    And how good/bad do you think this is?
    =20
    Website: http://www.cryptophone.de/en/
    =20
    TIA!
    =20
    P.S.
    I whish all of you a nice and secure 2011!!
    Tuut.
    =20
    P.P.S.
    No this is not #$%^&*-advertisement ;-)


    --- MBSE BBS v1.0.1 (GNU/Linux-i386)
    * Origin: The Kofo System II BBS telnet://fido2.kofobbs.
  • From Khelair@110:300/11 to miklosjobbagy on Sat Dec 14 16:03:47 2013
    To: miklosjobbagy

    To: miklosjobbagy
    Re: Re: what are your thoughts about encrypted mobile-phone`s???
    By: miklosjobbagy to comp.os.linux.security on Tue Nov 26 2013 00:30:00

    These sites are always highly optimistic. However, there are some factors
    y=
    ou have to take into consideration when choosing an encrypted mobile
    commun=
    ication solution.
    1. Real eavesdrop-proof enrcypted mobile communication systems can be
    build=
    ONLY around special, unique hardware pieces (cryptocard, security card).
    H=
    owever, using this kind of hardware alone does NOT GUARANTEE
    eavesdrop-proo=
    f communication.
    2. Eavesdrop-proof communication can only be guaranteed with triple layer
    p=
    rotection: a hardware protects the encryption keys - cryptochip -, a
    softwa=
    re protects against malware and spyware, and a unique encryption solution
    (=
    non-standard!) provides eavesdrop-proof communication.
    Articles on encrypted mobile communication:
    http://encrypted-mobile.blogspo=
    t.com
    Solution with triple layer protection: http://secfone.co.uk

    Let's not forget that the governments in the USA & UK are very much in bed with the industries that provide high tech devices through coercion and/or contractual bribery. You can check open-source software, yes, which I really doubt that this is. As far as hardware that it runs on, you'll never know if it's secure or if there are back doors built in, unless you know a hell of a lot about electronics and IC programming, testing, and diagnosis, or perhaps intercepting and testing encrypted communication uplinks from your device.
    If you want true security, you're going to have to build the hardware yourself. Don't be an idiot.

    --Damo
    - --- Synchronet 3.16a-OpenBSD NewsLink 1.102
    Tinfoil Tetrahedron: telnet://bismaninfo.hopto.org:8023/

    --- MBSE BBS v1.0.1 (GNU/Linux-i386)
    * Origin: Tinfoil Tetrahedron (110:300/11@linuxnet)