On the GSMK CryptoPhone some information, such as contacts and SMS, is stored in Flash Storage. Flash type storage is safe against failure of the backup-battery. You must however be aware that there is no way to securely erase information stored in flash memory in a way that it cannot be possibly reconstructed by sophisticated methods of computer forensics. Even if you erase the information and overwrite it with other data,it cannot be considered safely destroyed when stored on Flash Storage. Flash memory uses its own way of managing files that is beyond the control of the operating system.
Your CryptoPhone G10i is based on generic quadband (850 /900 /1800 / 1900) GSM Smartphone hardware that is sold under different brand names. The phone ’s firmware and operating system have been modified to accommodate the CryptoPhone functionality and provide added security, so a number of things that you might know from other Smartphones are not available on the GSMK CryptoPhone for security reasons. We supply the original Smartphone manuals,license sticker and CD with the GSMK CryptoPhone G10i, but you need to be aware that some functionality has been disabled by us for security reasons and some functions have been changed to better integrate the Crypto-
Note: Do not try to use Microsoft operating system updates
as this may destroy the CryptoPhone firmware and void your
warranty. Certified CryptoPhone Updates are only provided by
GSMK via CARIBBEAN to you in a cryptographically secure manner.
Initiating a Cold Boot is recommended in
emergency situations, to erase data stored in volatile memory that might
compromise your security (like SMS,call history,notes,appointments etc.). Please
note that this is not a very secure erasure procedure. Traces of your data might
be reconstructed in memory by a skilled adversary by means of advanced computer
forensics. Cold Boot will not erase the contacts and SMS messages stored on your
SIM card. Also, a Cold Boot does not erase any information that you may have
stored on SD memory cards. To initiate a Cold Boot follow the following procedure:
Your CryptoPhone is a Communication Security (CCOMSEC) device. It can only be regarded as secure as long as you have
permanent and uninterrupted physical control
over the CryptoPhone. Once an adversary could have gained temporary physical possession of the CryptoPhone,
it must be regarded as compromised. There is a variety of potential methods that would allow an adversary to listen into your calls after
he manipulated the CryptoPhone and gave it back to you. Keep the handset with you securely at all times.You should take it with you to
the bathroom, put it beside your bed when you sleep and not leave it alone in the hotel
If you have »lost« the CryptoPhone and »find« it back again, it has to be regarded as compromised. Never lend your CryptoPhone. Major
intelligence agencies are known for a wide variety of high-tech manipulation methods that are impossible to detect without a massive
scientific effort (several months of analysis at the cost of several 100.000 Euros per device).. If in doubt and your security depends on it, consider
purchasing a fresh unit.