Voice Encryption
Secure Messaging
Device Protection
Baseband Firewall
Hardened Android OS
FIPS-140 Certified
GOVERNMENTS USE SILENTSMS & SS7 TO TRACKANYONE THEY WANT.
WITH A CRYPTOPHONE CP500iYOU CAN DETECT IT,ANYTIME YOU WANT.
The CryptoPhone 500 is a highly secure mobile phone that
comes with full source code available for independent review.
Finally, you can perform an independent assessment to ensure
that you can rely on strong encryption without any backdoors
in the communications device that you entrust with your
confidential data and telephone calls.
Featuring new Baseband Firewall v2.0Detect SS7 Paging Requests Detect ‘Silent SMS’ tracking
G S M K Cr y pto p h o n e Ma s te r D is trib uto r - N o r th A m e ric a
360° SecurityArmoured & Encrypted
THE MOST SECURE ANDROID AVAILABLE
Available from ESDCRYPTOPHONE.COM
ESD Cryptophone 500iSecure IP mobile phone with 360° mobile device security
AS SEEN ON
Voice EncryptionSecure end-to-end encrypted voice over IP calls on anynetwork
– GSM,3G,4G, WLAN • Strongest and most secure algorithms
available today – AES256 and Twofish • 4096 bit Diffie-Hell-
man key exchange with SHA256 hash function • Readout-hash
based key authentication • Encryption keys are destroyed as
soon as the call ends
Secure MessagingBased on the same strong encryption algorithms used for GSMK
CryptoPhone voice encryption – 4096 bit Diffie-Hellman initial
key exchange, AES256 and Twofish message encryption with
256 bit key length
Verifiable Source CodeGSMK CryptoPhones are the only secure mobile phones on the
market with source code available for independent security as-
sessments. They can be verified to be free of backdoors, free of
key escrow, free of centralized or operator- owned key genera-
tion, and they require no key registration.
Device ProtectionHardened operating system — Secure Android OS built from
source code with granular security management and stream-
lined, security-optimized components and communication
stacks
Baseband firewall 2.0 — Unique protection against over-the-air
attacks with constant monitoring of baseband processor activ-
ity • Baseband attack detection and initiation of countermeas-
ures • Detection of attempts to track the user’s location via SS7
or silent SMS
Configurable OS security profiles — Hardware module control-
ler and permission enforcement module control access to net-
work, data and sensors (camera, microphone, etc.), keeping you
in control of your individual security policies
Encrypted storage system for contacts, messages, and notes with
smart folders protects data at rest against unauthorized access
TECHNICAL SPECIFICATIONS
Take back your privacy with a Cryptophone 500i
RadioGSM quad-band 850/900/1800/1900 MHz • 3G UMTS HSDPA / W-CDMA 850/900/1900/2100 MHz with HSUPA and HSPA+ support • 4G LTE 800/850/ 900/1800/2100/2600 MHz • Data rates up to 150 Mbps supported
Operational FeaturesTalk time up to 21hours • fully compatible with all GSMK CryptoPhone IP mobile, satellite and fixed-line encryption products • high transmission protocol efficiency with 4.8kbps bidirectional data streams for easy deployment on 2G GSM and other networks with limited data throughput
ConnectivityIntegrated microUSB 3.0 / power connector • 3.5mm stereo audio jack • microSD memory card slot – microSDHC, Trans-Flash, microSDXC compatible • GPS • IEEE 802.11 a/b/g/n/ac Wireless LAN
Audio CodecsEncrypted calls: ACELP® VLBR4 codec, optimized for high-quality voice in low-bandwidth situations • Decoding & play-back: Qualcomm WCD9320 audio subystem with support for a wide range of audio and video codecs and polyphonic ring tones
Display5.1-inch sunlight-readable touch-sensitive HD Super AMOLED screen @ 1920 x 1080 pixels, 24 bit color depth • Corning Gorilla Glass 3
Digital CameraMain camera with 15.9 megapixels resolution (5.312 x 2.988) with auto focus, built-in flash and integrated 1D and 2D bar code decoding • front camera with 2.1 megapixels resolution (1.920 x 1.080) • cameras can be completely disabled by hard-ware module controller
Dimensions & Weight142 x 72.5 x 8.1 mm / 5.6 x 2.9 x 0.3 inches • 145 g / 5.1oz. incl. battery • integrated antenna
Standard Accessories100-240V AC adapter • USB sync cable
Optional Accessories12 / 24V vehicle charger • vehicle holder • USB docking station
Encryption Overview
Cry
pto
ph
on
e 5
00
i
Sect
era
Edge
Bo
ein
g B
alck
ph
on
e
Sile
nt
Cir
cle
Bla
ckp
ho
ne
AP
PS
Cel
lcry
pt
Ko
olS
pan
Secu
re M
ob
ile
Sign
al
Sile
nt
Cir
cle
Encrypted Calls
Encrypted Messages
No-VoIPVoip calls use specific protocols and ports.
A problem for truly global use.
App PermissionsDenying apps access to data stored on
the phone enhances privacy.
Fake App LocationDownload an app in China but make it think
you’re still at the hotel weeks later.
FIPS-140 CertifiedFIPS Certification shows a commitment to meet-
ing the desired standards for government use.
Covert DeviceTravelling internationally with a secure phone
can make you a target.
IMSI Catcher DetectionStingray type devices are used around the world
for tracking and monitoring.
Cell Jammer DetectionDid I just lose signal or am I being jammed?
SS7 Anytime Interogation DetectionPaging requests from the global SS7 network
used for tracking
Detect ‘Silent SMS’Someone using silent sms to check
my phones location
Country of Origin
For sale to public
7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
Some phones promise privacy...Cryptophone delivers intelligence.
Top Related