Cryptophone 500i

360° Security Armored & Encrypted

SOME PHONES PROMISE PRIVACY…
CRYPTOPHONE DELIVERS
INTELLIGENCE.

Featuring the new Baseband Firewall 2.0

Detect SS7 Paging Requests & ‘Silent SMS’ Tracking Attempts

CP500i 3 phones header
By combining GSMK’s renowned end-to-end voice and message encryption with a highly sophisticated approach towards mobile device protection, the Cryptophone 500i offers a defence-grade mobile phone security solution with true 360° mobile device security

GOVERNMENTS USE SILENT SMS & SS7 TO TRACK ANYONE THEY WANT

WITH A CRYPTOPHONE CP500i YOU CAN DETECT IT, ANYTIME YOU WANT

Cryptophone vs The Competition

Do the other encrypted phones have all the features that really matter?

Protect your contacts and call history from unauthorized access

Secure Contacts

Secure Contacts

Keep your contacts list secure
Secure History

Secure Call History

The need to protect ‘when you called’ is just as important as ‘who you called’
CP500i Secure Contacts
Permission Enforcement Module

Permission Enforcement Module

Detects application interactions with the device

Be informed about what apps really have access to

List all functions accessed by an application

Don’t be fooled by apps that want more access than you’re prepared to give

Allows you to block or spoof specific requests

Download an app in China but make it think you’re still at the hotel weeks later

Technical Specifications

Secure IP mobile phone with 360° mobile device security

Voice Encryption

Secure end-to-end encrypted voice over IP calls on any network – GSM, 3G, 4G, WLAN • Strongest and most secure algorithms available today – AES256 and Twofish • 4096 bit Diffie-Hellman key exchange with SHA256 hash function • Readout-hash based key authentication • Encryption keys are destroyed as soon as the call ends

Secure Messaging

Based on the same strong encryption algorithms used for GSMK CryptoPhone voice encryption – 4096 bit Diffie-Hellman initial key exchange, AES256 and Twofish message encryption with 256 bit key length

Verifiable Source Code

GSMK CryptoPhones are the only secure mobile phones on the market with source code available for independent security as- sessments. They can be verified to be free of backdoors, free of key escrow, free of centralized or operator- owned key generation, and they require no key registration.

Device Protection

Hardened Operating System
Secure Android OS built from source code with granular security management and stream- lined, security optimized components and communication stacks.

Baseband Firewall 2.0
Unique protection against over-the-air attacks with constant monitoring of baseband processor activity • Baseband attack detection and initiation of countermeasures • Detection of attempts to track the user’s location via SS7 or silent SMS.

Configurable OS Security Profiles
Hardware module controller and permission enforcement module control access to network, data and sensors (camera, microphone, etc.), keeping you in control of your individual security policies.

Encrypted Storage System
For contacts, messages, and notes with smart folders protects data at rest against unauthorized access.

Take control of your privacy today

Secure calls and messages on any network – GSM, 3G, 4G, LTE, WLAN

Menu