- Hardware + Software
GSMK CryptoPhones, the only secure phones that come with full source code available for independent review, are available now.
GSMK CryptoPhones, the only secure phones that come with full source code available for independent review, are available now. Finally, you can perform an independent assessment to ensure that there is no weak encryption and no backdoors in the device you entrust your telecommunications security to. You don’t have to believe us when we say it is secure – you can verify that claim yourself.
GSMK CryptoPhones are no black-box-devices with scarce technical information, like other products in the market. We will give you all the details of their inner workings – even before you buy. GSMK CryptoPhones enable you to put the trust where it belongs – in a trustworthy, open and scientific verification process.
GSMK CryptoPhone technology is based on well-researched algorithms for both encryption and voice processing: The strongest encryption available combined with key lengths that provide peace of mind today and in the... See More