Encrypted Cell Phone Hits the Market 266
notshannon writes "Reuters
reports
about a new cell phone which automatically
encrypts communications. Of course, the
matching handset will decrypt the message.
Security doesn't come cheap, around $4000
per pair, but it's probably as reliable as anyone
in these parts could wish. Favorite quote:
'We allow everyone to check the security for themselves, because we're the only ones who publish the source code,' said Rop Gonggrijp at Amsterdam-based NAH6.
Amusingly, the article cites government.nl and not
nsa.gov as the world's most prolific phone tapper."
More information (Score:5, Informative)
Pictures of the phone.... (Score:3, Informative)
looks like one of those phone/PDA's in one.
Their concerns about Windows (from the FAQ) (Score:5, Informative)
I noticed that your CryptoPhone is based on Windows CE / PocketPC. Isn't this a security risk?
The current version of the CryptoPhone runs on top of a heavily modified and stripped down Microsoft PocketPC2002 ROM. The reason is that we wanted an affordable and well researched platform that offered sufficient performance for the speech encoding and crypto functions.A Pocket PC based system was chosen as the first platform for CryptoPhone because it was the only sufficiently fast device allowed us to do software integrity protection in ROM and the stripping of unnecessary functions.
The only commercially available alternative at the time of the necessary development decision was Symbian. Symbian is even more closed source (Windows CE is open source for developers in most parts) and was available only on a more expensive hardware platform. There was (and still is) no viable mass-market Embedded Linux based hardware with sufficient performance, stability, hardware integration and availability on the market at decision time, so we were not able to pursue this alternative.
We are aware that there are risks associated with using any Windows platform and we have taken a number of measures to mitigate these risks as best we could. We removed applications, communication stacks and system parts that are unnecessary for the CryptoPhone operation and which may cause potential security problems. You should not install third party software on the CryptoPhone to prevent software based attacks on the firmware integrity. The firmware update mechanism is cryptographically secured.
Re:Props to NAH6... (Score:4, Informative)
PGPi itself always had the PGPFone module, which can either encrypt a telephone line (your modem dials their modem) or handle internet calls (useful for people whose families are abroad)
Download it here [pgpi.org], including source-code.
Encryption (Score:4, Informative)
Re:Responsibility (Score:5, Informative)
Some quotes from Phil Zimmerman, author of PGP (emphasis mine):
OT: The FSB is only half of the former KGB (Score:4, Informative)
Re:How will you verify keys? (Score:3, Informative)
Not really. You will still be vulnerable to man-in-the-middle attacks.
1. Some one calls you.
2. Evil person intercepts it. Decodes it, reads plain text. Encodes it with his own key.
3. You recieve message encoded from Evil person. You decode it, read it, encode it with your own key. You send it to who you recieved it from, Evil person.
4. see step 2.
As you can see Evil person can read everything you are transmitting and recieving, not much privacy. Although I'm not 100% sure that this would apply here.
Re:Gotta start somewhere (Score:4, Informative)
For example, the RSA algorithim is available. But currently most people do not have the computing power necessary to decipher the keys to the transmission.
PGPFone. (Score:3, Informative)
Re:Responsibility (Score:4, Informative)
I am a little concerned, though, that this kind of technology might fall into the wrong hands. For instance, have the manufacturers considered the applications for which terrorists might use these? I hardly think that the NAH6 would like to see their products used to slaughter innocent Americans, or even Amsterdaminians. Encryption is certainly a worthwhile tool, but I think it's far more likely to be exploited by the wicked than the virtuous, as it's the bad guys who've got something to hind.
Real criminals have had access to, say, laptops connected to gsm phones that run speakfreely [speakfreely.org] or simply any voip product over-ssh/ipsec/pptp/whatever for years..
Most importantly though, this cryptophone does nothing to conceal traffic data; i.e. "who's calling who". This information is not much use in corporate espionage, but worth its weight in gold in criminal investigations (and much easier to sort through than voice calls).
Re:Wow! They invented GSM! (Score:3, Informative)
Not only that, but also a pseudo-random frequency hopping feature is also included in the scheme, so that recording a conversation from the radio waves in order to perform a later brute-force attack on it could be made impossible.
There are, however, several problems when coming down to reality in the application of the GSM standard:
So, in a real world where the operator could be trusted and there weren't political restrictions about it, GSM could give the user privacy, but the fact is that it doesn't.
If the devices in the article provide end-to-end, user-controlled crytography, then they have their value indeed.
Some details (Score:1, Informative)
Ofcourse those who watch netwerk (the dutch tv show that made all the fuss) more often know that it could not be bothered to verify this "First crypto phone" claim by, say, asking google [google.com] which reveals profesional stuff based on normal gsm`s instead of this big/exspensive pda hack (Just as the GSM spec is professionally developed) and even homebrew projects free of the same susspicion that surrounds the normal gsm crypto [cryptome.org] which ends at that base station and is no use for those afraid of telcos involved in snooping. Many are required to by goverments who dont feel like having to have people go around capturing calls on the radio end with the limited range of gsm sets.
Re:Available in U.S.? (Score:1, Informative)
Coming soon: GSMK CryptoPhone 100 US
But if you ask google nicely you might even find something cheaper.
Keep Secrets Secret (Score:2, Informative)
Actually, the algorithm might be secret, but in that case it has to be:
So in other words, if you have a secret algorithm you have to handle it just like the keys, i.e. distribution of such an algorithm as part of software package is absolutely unacceptable.
One could argue that a public algorithm plus the key is in fact a secret algorithm. That's true. But keeping the keys secret and easily replaceable is all one needs to do to make this algorithm+key combination secret, if the algorithm itself is designed competently, like AES or Twofish.
Just keep secrets secret---that's a no.1 rule of cryptology.