• GSMK CryptoPhone

    From warmfuzzy@700:100/0 to All on Fri May 25 19:11:58 2018
    Over the past two decades, telecommunications interception has developed into
    a major industry. Intelligence agencies and private organizations in all countries regularly intercept calls that may reveal sensitive political, military, or economic information.

    The use of wiretapping has become so wide-spread that you must assume that records of your private calls and SMS end up in the wrong hands. Equipment
    for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently even in comparitively small business conflicts. So using encryption to protect your privacy is the prudent choice.

    But encrypting your information with strong and trustworthy encryption has become difficult. "Proprietary" or "secret" algorithms of dubious quality,
    and encryption that is too weak to protect against modern computing power are commonplace in the telecommunications market. These weaknesses are masked by marketing efforts suggesting you need to rely on the "secrecy of the @[algorithm" or "government classification." -- certified by the intelligence agencies that are actually in charge of telecommunications interception.

    Now there is a solution that you can trust, because it can be verified by you or by your experts. GSMK CryptoPhones, the only secure phones that come with full source-code available for independent review, are available now.
    Finally, you can perform an independent assessment to ensure that there is no weak encryption and no backdoors in the device you entrust your
    communications security to. You don't have to believe us when we say it is secure -- you can verify that claim yourself.

    GSMK CryptoPhones are no black-box-devices with scarce technical information, like other products in the market. We will give you all the details of their inner workings--even before you buy. GSMK CryptoPhones enable you to put
    the trust where it belongs -- in a trustworthy, open and scientific verification process.

    GSMK CryptoPhone technology is based on well-researched algorithms for both encryption and voice processing: The strongest encryption available combined with key lengths that provide for peace of mind today and in the future.
    GSMK CryptoPhones encrypt your calls with the two algorithms that are
    regarded as strongest by the cryptographic community -- AES and TwoFish.

    source: www.cryptophone.de/en/background/

    --- Mystic BBS v1.12 A39 2018/04/21 (Linux/64)
    * Origin: Sp00knet Master Hub [PHATstar] (700:100/0)