A new random key is generated for each Cryptophone call, and it is not
stored in the Cryptophone when the call ends. What your computer
might do is another matter.
Unlike all other secure phone products, Cyptophone's source code has
been available for peer-review examination for free for years, and no
one has yet publicly pointed out any backdoors.
-ed
Quoting Sol Weil <sol..._at_gmail.com>:
> Interesting links. I wonder if there is a linux livecd option for this
> kind of program. There would be less risk of keys and other sensitive
> info being saved in swap files and whatnot.
>
> On Sat, Jan 23, 2010 at 11:54 AM, ed <ber..._at_netaxs.com> wrote:
>> http://www.cryptophone.de/products/CP-WIN/index.html
>> http://www.cryptophone.de/products/CPPSTN1/index.html
>
> --
> You received this message because you are subscribed to the Granite
> Island Group "TSCM-L Professionals List" group which is the oldest,
> and the largest TSCM group on Earth. To post to this group, send
> E-Mail to TSCM-..._at_googlegroups.com, to contact the list owner and
> moderator please send an E-Mail message to jm..._at_tscm.com.
>
> This group is sponsored by Granite Island Group to improve the
> profession of hunting spies, and to educate the security industry in
> the craft of technical counter-intelligence. Granite Island Group
> performs bug sweeps like it's a full contact sport; we take no
> prisoners, we don't play fair, and we give no quarter. Our
> professional goal is to simply, and completely stop the spy.
>
> Granite Island Group Offers World Class, Professional, Ethical, and
> Competent Bug Sweeps, and Wiretap Detection using Sophisticated
> Laboratory Grade Test Equipment.
>
Received on Sat Mar 02 2024 - 00:57:25 CST