SlideShare uma empresa Scribd logo
1 de 15
Encrypted Voice Calls on Smartphones Introducing  Cellcrypt Mobile™ for iPhone®
Cell phone calls are vulnerable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile Carrier Fixed Line Network
Cellcrypt secures your calls
Cellcrypt Mobile™ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cellcrypt Mobile™ for iPhone® As easy as making a normal call
To make a call click on the app icon
This opens your secure address book
Select the number you wish to call
Press the phone to start the call
Or dial the number on the key pad
Securing the channel with government-grade encryption
The channel is secured
An easy, encrypted voice call
Cellcrypt at-a-glance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*Running on the unmodified operating systems of off-the-shelf smartphones, such as BlackBerry® and Nokia® smartphones
Cellcrypt Mobile™ for iPhone® Thank you for watching  www.cellcrypt.com

Mais conteúdo relacionado

Mais procurados

PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
Marco Pissarello
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
riskis
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor Authentication
Ricardo Resnik
 

Mais procurados (20)

Voice over ip
Voice over ipVoice over ip
Voice over ip
 
PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
 
TELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDINGTELEPHONE CONVERSATION RECORDING
TELEPHONE CONVERSATION RECORDING
 
Panel interface connectors
Panel interface connectorsPanel interface connectors
Panel interface connectors
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
ZIPR_br[1]
ZIPR_br[1]ZIPR_br[1]
ZIPR_br[1]
 
*astTECS IP PBX
*astTECS IP PBX*astTECS IP PBX
*astTECS IP PBX
 
Iphone sip dialer
Iphone sip dialerIphone sip dialer
Iphone sip dialer
 
Lorex Security
Lorex SecurityLorex Security
Lorex Security
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
 
SecureCall - red phone for everyone (EN)
SecureCall - red phone for everyone (EN)SecureCall - red phone for everyone (EN)
SecureCall - red phone for everyone (EN)
 
ESET_MOBILE_SECURITY_for-android
ESET_MOBILE_SECURITY_for-androidESET_MOBILE_SECURITY_for-android
ESET_MOBILE_SECURITY_for-android
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Vega Econd En 1
Vega Econd En 1Vega Econd En 1
Vega Econd En 1
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor Authentication
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Asteriskpbx
AsteriskpbxAsteriskpbx
Asteriskpbx
 
TwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without BoundariesTwilioCon 2013 - Communications Without Boundaries
TwilioCon 2013 - Communications Without Boundaries
 

Semelhante a Cellcrypt Mobile for iPhone

FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015
Tom Malatesta
 
Blaze automation security alarms product profile may 2012
Blaze automation security alarms product profile may 2012Blaze automation security alarms product profile may 2012
Blaze automation security alarms product profile may 2012
Blaze_Hyd
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915
Tom Malatesta
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
mashiur
 

Semelhante a Cellcrypt Mobile for iPhone (20)

FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015FortressFone Technologies Leave Behind 01282015
FortressFone Technologies Leave Behind 01282015
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Blaze automation security alarms product profile may 2012
Blaze automation security alarms product profile may 2012Blaze automation security alarms product profile may 2012
Blaze automation security alarms product profile may 2012
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
 
Mogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud ServicesMogul Wave VoIP Cloud Services
Mogul Wave VoIP Cloud Services
 
Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)
 
Traditional or Hosted Phone: Which Is The Right Choice For Your Business?
Traditional or Hosted Phone: Which Is The Right Choice For Your Business? Traditional or Hosted Phone: Which Is The Right Choice For Your Business?
Traditional or Hosted Phone: Which Is The Right Choice For Your Business?
 
Ipdoor presentation
Ipdoor presentationIpdoor presentation
Ipdoor presentation
 
Webinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door PhonesWebinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door Phones
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Voip.v1(1)
Voip.v1(1)Voip.v1(1)
Voip.v1(1)
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
TeleVerus Business Opportunity
TeleVerus Business OpportunityTeleVerus Business Opportunity
TeleVerus Business Opportunity
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
TeleVerus
TeleVerusTeleVerus
TeleVerus
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Cellcrypt Mobile for iPhone

Notas do Editor

  1. Cellcrypt is the leading provider of voice call encryption on off-the-shelf mobile phones – including Android™ BlackBerry®, iPhone® and Nokia® smartphones – that enables secure calling to mobile phones and office phone systems (PBXs) to allow landline calling as well as access to standard PBX features such as voicemail, conference calling and calling out to the public phone network. You may want this if you need to keep private and sensitive conversations protected from cell phone interception, especially if you travel abroad where this is common practice.
  2. Device Attacks: One method of interception that bypasses the call entirely is by placing a listening device (hardware or software) in the mobile phone, which monitors the microphone and speaker, and records or forwards the call to the eavesdropper. Active Attacks: This attack uses a radio scanner to intercept and manipulate the radio signal between the mobile phone and the cellular base station tower. It exploits a particular weakness of some cellular systems whereby mobile phones do not check the authenticity of base stations that they connect with. Because mobile phones continually scan radio waves and switch to base stations with the strongest signals, it is easy for a scanner that impersonates a base station to cause all mobile phones in an area log on to it simply by transmitting the strongest signal. Once a scanner has control of a connected mobile phone, it then manipulates communications in several different ways. First and most simply, it can redirect outgoing calls from the mobile phone through its own communication channel and record the call. If standard encryption (as deployed by carriers) is being used then this attack is able to instruct the mobile phone to turn its encryption off, thereby bypassing the normal encryption between the phone and the base station. The unencrypted call is then readily eavesdropped. Hackers have demonstrated simultaneous interception of hundreds of mobile phones in this way using a software defined radio transceiver costing less than $1,500, and also four hacked mobile phones as transceivers, each costing $15. The software is open source and free to download. Network Attacks: Exploits network hardware such as base stations or microwave repeaters where encryption is not used Passive attacks: This method also intercepts the radio signal between the mobile phone and the base station but simply decodes the signals without needing to interfere with them. Passive scanners contain advanced processing software that can be run on a laptop and a programmable radio receiver and antenna. Without disturbing the normal operations of the cellular network, the passive scanner listens to the radio waves of the mobile phone call and processes them. Depending on the sophistication of equipment used, individual calls can be targeted or multiple calls harvested. This attack is particularly dangerous because it is impossible to detect, however it is also challenging because it has to break the call encryption. Insider Attacks: One common method of interception exploits the internal infrastructure of telecommunication networks, which can often prove to be the most vulnerable part of the call path. These networks decrypt calls at the base station so that they are transmitted onwards across fixed lines as unencrypted calls and can be intercepted by internal staff who have been bribed, threatened, coerced or even joined the company specifically to make an attack. Alternatively, compromises have occurred at the bases stations and within repeater equipment that use unencrypted microwave signals. Additionally, internal systems – including lawful intercept systems – used to monitor and manage the calls may be subverted to illegally intercept calls.
  3. At the same time as the threat level increasing, the use of cell phones for discussing sensitive and confidential information has also increased, even among government employees, due to the ease of use, ubiquity and interoperability of mobile phones. This leads to an increased need for government-grade end-to-end protection that provides assurance that call security is controlled along all points of the call path between caller and recipient and risks are adequately mitigated in compliance with internal security policies.
  4. Cellcrypt Mobile provides encrypted voice calling for off-the-shelf cell phones using government-certified security in an easy-to-use downloadable application that makes highly secure calling as easy as making or placing a normal phone call. It is a software-only solution that uses the IP data channel of cellular (2G, 3G, 4G), Wi-Fi and satellite networks and can be deployed to personnel anywhere in the world in as little as 10 minutes.
  5. Cellcrypt has launched Cellcrypt Mobile™ for iPhone® , a version of its encrypted voice calling application that runs on iPhones operating over Wi-Fi™, GSM and CDMA wireless networks. Cellcrypt Mobile for iPhone is available immediately and is interoperable with Cellcrypt running on other devices such as Android™, BlackBerry®, and Nokia® smartphones on GSM networks.
  6. It’s a standard downloadable app. To make a call click on the app icon.
  7. This opens your secure address book
  8. Press on the contact name to make a call
  9. Press on the phone icon to make a call, or…
  10. … use the key pad to dial the number in the normal way.
  11. What is happening here is that the phones are authenticating each and generating a secret key that they share to encrypt and decrypt the voice call. Cellcrypt uses strong cryptographic protocols recommended by governments to do this including 2048-bit RSA and ECDSA for authentication and Elliptic Curve Diffie Hellman and RSA for key exchange. When the call connects the audio is encrypted on one phone using the secret key, sent across the internet as IP traffic, and decrypted on the other phone. The app is unique in that it first encrypts the voice with 256-bit AES and then re-encrypts it a second time using 256-bit RC4. Until the channel is secure the other phone will not start ringing.
  12. The other device is running Cellcrypt Mobile in idle mode but after the channel is secured then it wakes up and rings. To answer accept the call in the usual way.
  13. The call is encrypted end-to-end which is important because nothing else has access to the keys and even if the call were intercepted it could still not be decrypted and would remain unintelligible and secure.
  14. Founded in 2005, Cellcrypt's R&D innovation resulted in Encrypted Mobile Content Protocol (EMCP), an Internet Protocol (IP) based technology that optimizes delivery of encrypted data between mobile devices over wireless networks. EMCP solves the technical challenge of delivering reliable high-performance encryption of voice data over networks with low bandwidth and varying connectivity.
  15. For more information contact Cellcrypt today on www.cellcrypt.com. Copyright © 2011 Cellcrypt Inc. All rights reserved. All trademarks used herein are the property of their respective owners.