© 2019 Aitchison Reid Consulting Pty Ltd, a company incorporated in Australia. Trading as ARC Solutions and Aitchison Reid Consulting. ACN 158 303 774. ABN 56 347 951 609.

 

Disclaimer: The commentary and information on this website is not legal advice, IT, risk, management or general advice. Seek advice on matters of interest arising from the commentary and information on this website. Any reference made on this website to law practice Aitchison Reid Pty Ltd or Aitchison Reid Consulting Pty Ltd does not imply any warranty or any guarantee from Aitchison Reid Pty Ltd or Aitchison Reid Consulting Pty Ltd for the reference made. 

 

 

Terms of Use & Privacy Policy | News & Publications | About Us | Contact

 

.

    • Twitter Clean Grey
    • Facebook Clean Grey
    • LinkedIn Clean Grey

    Cryptophone - The market's most secure mobile phone

    Cryptophone protects calls, SMS and data.

     

    Voice encryption is secured end-to-end on voice over IP over any network (GSM, 3G, 4G, LTE, WLAN) using AES256 and Twofish, a 4096 bit Diffie-Hellman key exchange with a SHA256 hash function.

     

    Encryption keys are destroyed as soon as the call ends.

     

    Secure messaging is based on the same encryption used for voice.

    Source code for Cryptophone is available for independent security assessments so that Cryptophone owners can be assured the code is free of backdoors, free of key escrow and free of centralised or operator owned key generation.

    Cryptophone's Android operating system is hardened, built from source code by GSMK Cryptophone with granular security management and streamlined, security optimised components and communication stacks.

    Baseband firewall 2.0 on Cryptophone provides unique protection:
     

    • constant monitoring of baseband processor activity to mitigate over-the-air attacks;
       

    • baseband attack detection and initiation of countermeasures;
       

    • detection of attempts to track the user's location via SS7 or silent SMS;
       

    • detection of IMSI catchers and their attempts to force down to 2G, deactivation of encryption, jamming and other cellular interference.

    Cryptophone's hardware module controller and permission enforcement module controls access to network, data and sensors (camera, microphone, etc) keeping you in control of your individual or enterprise security policies and requirements.

     

    The encrypted storage system on Cryptophone protects your contacts, messages and notes data at rest against unauthorised access.

    Cryptophone mobile phones, desk phones and satellite phones can be used to protect private individuals, business, corporates and enterprise, and government organisations.

    ARC Solutions is ESD America's authorised reseller of ESD Oversight (SS7 vulnerability mitigation)ESD Overwatch (detection and geolocation of IMSI catchers) and ESD/GSMK Cryptophone (encrypted phones).

     

    Contact ARC Solutions anytime to place an order, to request more information or to arrange a private, confidential, encrypted and secure conversation about your encrypted phone requirements.