Postingan

Menampilkan postingan dengan label UMTS

Highly secure mobile phones

Gambar
(Updated: April 9, 2016) In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Therefore, special devices are designed to keep conversations safe. Here we will list a range of mobile phones, which offer a high level of security and are therefore suited for top level telecommunications. The following information is gathered from the internet, only to provide a general overview. For more information, provided by the manufacturer, please click the yellow section title or the fact sheet. - for government and military use - General Dynamics: Sectéra Wireless GSM Phone - Produced from 2002-2012 by the American company General Dynamics Corp. - For GSM and GPRS networks. - Ordinary Motorola Timeport GSM phone, with a special Security Module attached at the back side of the phone, replacing the battery cover. - Approved by the NSA for conversations up to the level of TOP SECRET * and by NATO for up to COSMIC TOP SECRET. This phone is als...

Swiss video on mobile phone security

Gambar
This is an informative video from the Swiss television program Einstein , about the potential threats and risks of mobile cell phones: The phone shown in this report is the Secure Mobile Phone Omnisec 230 (fact sheet in PDF) , made by the Swiss firm Omnisec AG . This is a modified HTC smart phone, with a hardened Android operating system, and with all risk providing applications (like bluetooth and GPS) removed. The microSD Security Module provides encryption with 256-bits key length to secure communication for classification levels up to Top Secret. But, the cost for two of such phones is said to be around 50.000,- Swiss Franks. UMTS For most people, a far more affordable way to get better security for cell phone communication is just to use the UMTS or 3G mobile network, instead of GSM. Where GSM only has authentication of the user to the network, UMTS uses mutual authentication, which means the mobile user and the network authenticate each other. This prevents a so called "man...