Securing mobile communications against eavesdropping
Is information that you communicate to your phone safe?
Certainly not, because all telephone calls recorded by mobile operators and maintained for at least 6 months. To those records can then be legally or illegally get virtually anyone.
Why consider encrypting communications:
- in the Czech Republic there are seven bodies that can legally prescribe interception
- GSM interceptor (ie., Agatha) is for private entities have become more accessible
- annually is directed over 30 000 of legal wiretaps
- Your communication is 6 months stored at the mobile operator from which it may be numerous subjetů legally or illegally gain
To tapping your phone the police, the mobile operator or other private entity to prevent, it is necessary to encrypt communications. There are several ways to secure your mobile phone.
1. The cryptographic chip micro SD card
Encryption using a special chip on the microSD card, one of the best options to encrypt communications. Because the encryption at the hardware level, and microSD card encryption offers the highest security level. MicroSD card is transferable to multiple phones and you're not limited by selecting a specific phone, like when taking special encryption phone.
+ One-time payment and no additional renewal fees
Show offer for encryption chips .
Second encryption phones
For encryption phones as well as the microSD card encryption takes place hardvarové encryption level, and offers security at the highest level. If you do not want to be limited by selecting a specific handset, you prefer to use encryption microSD card that can be used with conventional phones.
+ One-time payment and no (or minimal) renewal fees
- The need to change existing mobile phone
Show offer for encryption phones .
3rd encryption applications
Applications for encryption is increasingly popular, especially because of their comfortable use and a high level of security. The encryption application can be installed into almost any mobile phone, and you do not need to change your existing mobile phone. Unlike encryption, but encryption hardware, the applications are protected against attacks using Trojan horse in your mobile and is therefore suitable for the highest level of security to complement a mobile phone quality antivirus program.
+ Low cost
- Not protected against the Trojans inside your phone (can be solved by installing a quality antivirus)
View the menu for the application to encrypt communications
COMPARISON OF VARIOUS encryption solution
|FEATURES||GOLD-LOCK (application)||PHONEX (application)||CRYPTOPHONE 500 (encrypting phone)||VIP Call Chip (chip encryption)|
|Israeli Defense Ministry||X||X||EAL 5+|
|NUMBER encryption levels||3||2||2||2|
|REPLACING encryption key||every 4 seconds||unique key for each call||unique key for each call||unique key for each call|
|VERIFICATION AGAINST MAN IN THE MIDDLE ATTACKS||YEAR||YEAR||YEAR||YEAR|
|COMPATIBILITY||Android, iPhone, Symbian, BlackBerry, Windows XP / Vista / 7||Android||X||Android|
|Encrypted file transfer||YEAR||YEAR||NE||NE|
|Remote wipe APPLICATIONS||YEAR||NE||NE||NE|
|CALLS unilaterally encryption to unsecured PHONES||YEAR||NE||NE||NE|
|APPLICATIONS AND STORED CONTACTS password protected||YEAR||YEAR||YEAR||YEAR|
|PROTECTION AGAINST ATTACKS BY PHONE IN Trojan horse||NE||NE||NE||YEAR|
|TOTAL RATE COMMUNICATIONS SECURITY||10/10||9/10||9/10||10/10|