SOME PHONES PROMISE PRIVACY…
CRYPTOPHONE delivers smart security!

48 - mdpiCreated with Sketch.

Secure Calls & Messaging

Secure on any network including 2G GSM, 3G UMTS/W-CDMA, LTE, and Wireless LAN

48 - mdpiCreated with Sketch.

Detect Location Tracking

Detect IMSI Catcher activity plus tracking attempts via ‘Silent SMS’ & SS7 Paging Requests

Tamper Resistant

New tamper-resistant, tamper-evident hardware design

Unique Protection Against Over-The-Air Attacks

Automatic discovery of IMSI Catchers and rogue base stations • Detection of attempts to track user location via SS7 or silent SMS

CP600G

By combining GSMK’s renowned end-to-end voice and message encryption with a highly sophisticated approach towards mobile device protection, the Cryptophone 600G provides users with a hardened operating system, Baseband Firewall, and tamper-resistant hardware for true 360° mobile device security.

GOVERNMENTS, foreign intelligence services, private detectives —USE SILENT SMS & SS7 TO TRACK ANYONE THEY WANT.

WITH A CRYPTOPHONE CP600G YOU CAN DETECT IT, ANYTIME YOU WANT!

Tamper-resistant, tamper-evident hardware design

Dedicated hardware security modules

CPU supervisor, watchdog timer, on-chip temperature sensor and removal-resistant coating

Shield removal detection circuitry

With Environmental Failure Protection (EFP) for temperature, voltage, internal clock frequency, and duty cycle provided by immediate reset circuitry

Security Certified

Supports the highest FIPS 140-2 and Common Criteria security level requirements

CP600G

Permission Enforcement Module

Detects application interactions with the device

Be informed about what apps really have access to

List all functions accessed by an application

Don’t be fooled by apps that want more access than you’re prepared to give

Allows you to block or spoof specific requests

Download an app in China but make it think you’re still at the hotel weeks later

CP600G

Protect your contacts and call history from unauthorized access

48 - mdpiCreated with Sketch.

Secure Contacts

Keep your contacts list secure

48 - mdpiCreated with Sketch.

Secure Call History

The need to protect ‘when you called’ is just as important as ‘who you called’

Secure Messages Folder

Keep secure messaging history and messages content secure

Svg Vector Icons : http://www.onlinewebfonts.com/icon

Secure Notes

Keep your notes content secure

CP600G

Technical Specifications

SECURE IP MOBILE PHONE WITH 360° MOBILE DEVICE SECURITY

Secure Calls

Secure end-to-end encrypted voice over IP calls on any network – 2G, 3G, 4G, WLAN • Strongest andmost secure algorithms available today – AES256 and Twofish • 4096 bit Diffie-Hellman key exchange with SHA-256 hash function • Readout-hash basedkey authentication • Autonomous key generation, no pre-installed key material • Encryption keys securely and immediately erased from the device after each call

Secure Messaging

Based on the same strong encryption algorithms used for GSMK CryptoPhone voice encryption –4096 bit Diffie-Hellman initial key exchange, AES256and Twofish message encryption with 256 bit keys

Device Protection

Hardened operating system with secure boot and device runtime integrity checks
Secure Android OS built from source code with granular security management and streamlined, security-optimized components and communication stacks • Seamless secure boot chain featuring secure boot, kernel, recovery, kernel object and APK signature keys • Runtime checks of core applications and services ensure that only signed and trusted code is loaded on the device

Configurable OS security profiles

Hardware module controller and permission enforcement module control access to network, data and sensors (camera, microphone, etc.), keeping you in control of your individual security policies

Encrypted Storage

Encrypted storage system for contacts, messages,and notes with smart folders protects data at rest against unauthorized access

Baseband Firewall 2.0

Unique protection against over-the-air attacks with constant monitoring of baseband processor activity • Baseband attack detection and initiation of counter-measures • Automatic discovery of IMSI Catchers and rogue base stations • Detection of attempts to track user location via SS7 or silent SMS

Tamper-resistant, tamper-evident hardware design

Dedicated hardware security modules with CPU supervisor, watchdog timer, on-chip temperature sensor and removal-resistant coating • Shield removal detection circuitry and Environmental Failure Protection (EFP) for temperature, voltage, internal clock frequency, and duty cycle provided by immediate reset circuitry • Supports the highest FIPS 140-2 and Common Criteria security level requirements

Trusted Platform Module (TPM) for platform measurement and attestation

Trusted Computing Group (TCG) TPM specifications level 2 version 1.2, revision 116 • Active shield and environmental sensors • Memory Protection Unit (MPU) • Hardware and software protection against fault injection

Verifiable Source Code

GSMK CryptoPhones are the only secure mobile phones on the market with source code available for independent security assessments. This permits individual source code audits in accordance with national and international verification and certification standards designed to verify device integrity mechanisms, correct implementation of all encryption algorithms, and the absence of backdoors

Take control of your privacy today

Secure calls and messages on any network – GSM, 3G, 4G, LTE, WLAN

SPECIFICATIONS

Compatibility

Fully compatible with all GSMK CryptoPhone IP Secure mobile, desktop and satellite phones, including all GSMK CryptoPhone 400, 450, 500/500i and IP19 series secure phones as well as GSMK CryptoPhone IP PBX Gateways

Technical Data

Quad–core Krait CPU 2.3GHz
Graphics accelerator
QDSP
microSD card slot

Radio

GSM/GPRS/EDGE (850/900/1800/1900 MHz)
UMTS/HSDPA+ (B1, B2, B4, B5, B8)
LTE advanced (3GPP, FDD, IMS, VoLTE, Carrier Aggregation, B2, B3, B4 , B5, B7, B13, B14, B17, B20)

Connectivity

USB 3.0 (fast charging)
Wi-Fi 802.11 a/b/g/n/ac
Accessory interface for connecting custom extension modules, such as sensor accessories, TETRA or tactical radio modules, docking station, car charger and satellite modules

Audio

High-performance speakers
Multi-microphone ANC

Display

5″ Full HD (1080*1920) LCD
Glove-usable capacitive touch
Functional in wet conditions

Camera

8 MP with Autofocus and LED Flash
2 MP for front facing applications
Full HD video capture and playback
Both cameras can be disabled

Mechanical

Dimensions 141mm x 75,5mm x 13,5mm
Weight 180g
IP67 rating
MIL-STD-810G shock resistant
Temperature range -20°C to +55°C (-4°F to 131°F)

UAB Darseta Logo

UAB “Darseta” is a defense & law enforcement technology provider based in Kaunas, Lithuania.

UAB "Darseta"

Address: Žiemių g. 4-28,

Kaunas, Lithuania

Phone: +370 685 38839

Email: darseta[@]darseta.lt

Business hours: 9h-18h