Home

User Manual - Cryptophone

image

Contents

1. 1go1d ut st uonx uuo5 mo s ay Joy ampaooid dnjas Aay ayy Fey NOA 0 s eu9rs yey punos mmp yrp DD e y IA nod Dua sty uo uonnq Ye 24 passaad sey au1gd mol Jayy SUL y 3 se d os speur st uono uuoo mo s ay 1oj q EULIOU ULP JaSUOC aye APU 1 oun Su ewou a Aq Dao Jayeads au ur srou 11ojuuoo Jo Vq e TEA PM NOA SYY 19V Doan pue p zr enrur aq 0 sp u 1ole1 u 8 JaquMuU utopuge1 IY se uoymq u 13 au ssaid mol Joye p etp aq 0 1 8uo aye JIM uy go dAr IP uo YOIMs no Jaye Teo ISTY Ad A U I puoo s e 10 uonnq 1270 Y Surssaid Aq udaIs ureu aUOYgoydAID a o YMS SEA ued NOX uonnq Usedd Y ssard pue Jaqumu palisap ayy 197U Note CryptoPhone SMS ame Theodor Tes encryption uses very long aaa 19123457890 keys 4096 bit Diffie Key OK Hellman 256 bit AES amp A key has been exchanged and verified for Twofish to provide your secure SMS communication with this person communications with the Date of last key exchange 23 05 2007 best protection available These long keys require substantial amounts of bits to Renew be exchanged between you and your partner during the key exchange One key exchange consists of six SMS sent by the inviting party and five SMS send by the invited party The key exchange needs to be conducted only the first time when you start communicating with a partner It can be renewed when required Sending CryptoPhone SMS To send an encrypted
2. JO Dueou Ul 10 pue Ju ur8p woupyoe Jod moy dred 1 10 Atzze yeu syuaudrys sampaooad qumo s pue Burddnys Jadoad SIWIA O9PIA pue SWW ysnd dy DO dv s m yoeqdeyd epou autos Saul ajqepeojumoqg soyepdn so Jow POL WIS Just 1 8u ss A SW Ia SOIAIAS euru STAT ydisosg A Zunds SW ylomaureyy EAR 1940 e pue AIN duzspagt yomaurey pedwo TAN syoequoZ SIT pue CH JayeD MPI p qestp st arTeuonounj SutAojjoj ayy mae UMPI PAPS NOA BUG sJasn ISO JO enu ss Jou are Mq SPLE ol qe1gumA AIS ap uorjA suonounj jo Jaqumu e s qestp suoygoydAr_D ayy mes Jo Aal STUD FW JLMI umrp l Storage and Handling The CryptoPhone is specified and designed for use in normal business home and other general conditions It is not reinforced or specially sealed against water and other harsh environmental conditions For reinforced versions of the CryptoPhone that comply with military specifications contact sales cryptophone de Submitting the CryptoPhone to excessively high or low temperatures like in the outside pocket of an overcoat in cold climates might temporarily or permanently damage the display and lead to accelerated battery aging affecting the ability of the battery to store power and thereby reducing the standby time of your CryptoPhone Sitting on the CryptoPhone or submitting the device to other heavy mechanical loads may damage parts of
3. Jeo au dn Sumas Aq pusuman aq Uayo UE uons Suo2 YOMJaN uons Suoo DOC IO aBRIBAOD WSD peq 194 ensn are Aejap euriou uep 1293U0 10 SUOSRAYT Tode un Suryoyms s 13se4 0 ad Teo ay SuryoMs q skejep 1 11ous AAY JIM Nod PI U 3 ul M220 SJOIJ9 uorssrtusuex 10 Suo Soe OM au JUO d IY 1940 30104 paydAsOUA aU JO uotsstuusuez I J 3 8uo 793 aw ST Jauyred Mod Eat 0 ad10A MOA 107 Saye BUI Jo ported arp saquosap Aejaq JSIOM Y par irenb Teo Js q Y S PITPUT U15 pal 0 MO 1940 u 8 UdaMjaq Sais AgJ UT 10107 s Sueuo 1oleorput e p fed AJL SEH mo s Surmp en UE e odor Test Your CryptoPhone will then generate a Phone 49123457890 public private key pair using the Diffie Raspond to Se Hellman algorithm and send an invitation This person wants to exchange encrypted SMS to your partner On the partners SMS with you To accept the invitation and to A x exchange the necessary encryption key phone a message is shown that informs A ef do not want H ou a renee Saa your partner that you want to start a key 7 exchange Your partner can then either on accept or decline the invitation If your partner accepts the invitation his phone will calculate its part of the key exchange and send your partners public key back to you by SMS In return your phone will automatically send the Diffie Hellman response to your partner After the key exchange calculation has been completed a wi
4. SAIS 10 YOM Jou saop V Fl ATUO qrenb TE Janaq Sau pouu 1seJ IY saduRJsUMOAID JSOU ul sIOyeJado auoyd tqour JuasayIp u wq d sI eO2 JO s e5 Jeuoneu3z lur utos UO d UE 7 YOM Jou saop JO sjnodosp jo 30 VA suonesi Auoo dn paddoyp asned ued J suontpuoo JIO0MJAU UJI JapUN S9A A0H doping depp ou pue Jett ss sey sny pue UOT9aII09 10119 STY asn JOU s op pouu qsej u 1 gt Howq u ay ut App Jo dnp mq pue suonrpuoo peq Japun Arjap 1asu0 sne ued Mq uones1 Auoo ay ut suondnas lur ous smodoIp ss Sasned YOM SHow u WSD au ut uono ioo2 10119 Jo ad4q erp ds e sasn pour Jsnqoy Iy Sup e ds eoruuo T nu redsue1 uoN 10 Jsnqoy pue qu rmedsueuT 1o 3sej1 WY p e5 am AOU TE Jo s d maa om s1ioddns Qog euoygoydArD ay ode ay Surysyimg styg armbag jou eu suone n8 1 POO JI UaAa papuauTUodad ABUTS ST SUIATIp M Jaspeay Pasopua un Jo asn ay Teo e SUTATIp af asn uoud j1 uO suonem8 1 pue smej eo UM Sut duuoo 10 qtsuods 1 are nox payiqnyoad Ajayayduroo Jo payemngai st SutAtdp apy sauoyd apiqou jo asn y s rmunoo ZOE uJ 3JON saoueqimsip zout Suisned Aqaiay pue SUTAOU u UA sI aopuey ueu UT SUTNSALI sjo Us Jo qisu p uru x Aqeard 4q sey oa aU seare ueqm ul seoueqIsIp ss pue sIaAopueyY JUenbay ss Changing the volume To change the audio volume during a Secure Call use the volume control slider on the left side of the phone An on screen indic
5. UJ Sunoous qno1 oA go UO UT Sat IY UO 3sn 10 790d MOA ut S1 1 BTM Ap MOA 0 ss 20e SS 1IA UEZ ATTEQUa Od pimoo Azesi Ape ue P st su UEU Y I mln TI uoneuozur p 10 s mo Sutsruuoiduuoo sny aserydssed mod puy tu pue Areuoporp asny e woy suoneurquoo PJOM pue spioA mo s tn Ajeoneuogme yey 10Mduo e aen Aids ueo resI ape ue spiom jduns Jo uoneurquoo L 10 uo 13sn st Jey serydssed e asooyp noA 1 aserydssed Se SPIOM AY JO s1 n JSP 10 SI IY ATUO sn pue ou lu s qe1out uu L LI O SPPN Aua poos JayOUY si qumu ym s123 utos Zuynyysqns pue sadeds mo SutAe S1 A JO Waod L aen o gt aserydssed Zuons e daa o em Aska uy siogqumu pur s1 oe1euo prepueys UOU si n seoz Ao pue Jaddn Sutsn ssan o 1mogjmp AJAA SI JEY SIO OeIEY QT ISVLA Je Jo aserydssed e asooyp 0 p pu urutoo i uons st I aserydssed MOA Jo puns oy uo AIDS spu d p uonvuraojur p jerposse pue SWS Dad ua sem sa10 s YPTYM Se1o1S mo5 s MO Jo M S au 1006 JUONI MOA 0 ss ooe S798 TESIJAPL Ue JJ 8e1ol s m aseiydssed 1 l1u3 ay UT eyep p dap pue dl ous 0 pasn u un sr yey ay e ad ATeorude18o1d 0 pasn st aserydssed STULL 8deIO S aMdag ay 1oJ aserydssed e ma 0 payse aq JIM nok asn 3sig uodN BAUE e TEE seiudssed uuttjuoo offer sufficient protection A wire based headset is your best option when placing secure calls Sync Contacts a
6. quu sse 7 ATTeoneuIo Ne SWS dnmuau se Juas aq IM Aap AemAure sasessour Buoy adAq ued NOX 8ess ur un UT Yo SJoJOVIeYO Jo I QUMU IY SMOYS PPY JayUNOD OU ST IJL S SL Dau y Jo uo ut p ptAoid aq IM m Sur8ess tuu dno18 God ua qe1ioJuuoo TEIP ut Ao q p ure dx are s oroup AYO M AQEEL ay s Sum qumo s Jo Y IMOA JO payse aq TIM NOA yasayy pre Yowa Jayy ere arempzey uoud ayeredas gas Jasay PIEH e Surojad Aq Sumas a yorg 3tmo s ayy adueyo SEA ULI NOJ 3JON s1 sm JSOU 107 qtumo s pue ou ru Auoo Jo b2ue eq poos e s ptAo1d YM 3tm s umtrp l st SUNIas 1JneJ p QLL payoajas nok apyord ayy 0 Surpaoooe sju uoduuoo age Sune1 do y pasur TIM uoud y moy uS t uo UOYN YO IAP PIP epyorg Qtmo s e papajos au NOA 19y uorst9 p pouozur e yeur 0 suondo ay Te pear o sum MOA ye1 se q TEIP ut p ure dx are eut apyorg M au jo ssuNeas JUP IP SuULMOT OF al ul s nt qesz umaA Jo JS ay JE ayy qeu nod samyeay IIOU ayy s me J ma pue ALMDas UdaMjaq Dags o NOA sdjay 1 SeuelN YOI 3tumo as u r sanjeay s un JO utos qestp o pu uruuoo 1 st H Sam ssuouqold 3O MOA ysurese stoe Jo JSH a onp 1 oy suoneoydde pue s mve Jgu ru Auoo Jad S qez umA enqu lod uros sureJuoo YOTYM Waysds Sune1z do qow SAOoput A P uo p seq st uoudo1d O ay 1 SeucvA 9 UOid AU that installing 3rd party software
7. GSMK CryptoPhone 300 with SMS Encryption User Manual Version 1 00 build 129 U 12S ure FETTE HED amas spezuop DIE xoqu afessow man GE uoudo1d443 WWS9 General Inserting SIM card amp switching the phone on Security Profile Manager Enter your PIN Secure Storage Changing the Passphrase The Secure Contacts list Locking the Secure Storage Charging Standby Switching on off Key Verification Redialing Call Quality during Secure Calls Secure Calls while moving Switching the Calltype Switching the Linetype Problems with setting up a Secure Call Changing the volume nu 11 11 13 13 14 15 16 16 19 19 20 21 22 23 24 26 SD Ia Iv Iv Ov Ov 6 LE LE 9 SE SE VE CE TE oE LO LO 9G 97 sanss UMOUY aremyos ALR DIE S r1oss 25V saredayy SurlpueH pure Se1o1 ao1apy tna sayepdy qarm s Sunoous qno1 syuaunutoddy pur sjaejU0Z Su s J spe u Yoong J spe u oy Suisn ap IOo1e SEL SurpieS i ad1Apy tna aserq Aouas10Ury SWS eu0ygoydArD SUMA SWS 2u0ygoydAry Sutpuae SWS du0YygoydArZ 201 Sueupxq y SWS eu0ygoydAry soapy AWINDdag uoud aIGoy Ie19u D je Sump snp 10 11 12 13 44 During key exchange the calculation and verification of the Diffie Hellman parameters takes a while with the spinning ball wait cursor shown Just wait till it disappears Locking of Secure Storage on standby does not work rel
8. IMU UWY e Joye IZLIOJ mo JY OT 0 soouD UVI NOX u 15S UPW IAP ut uoor s8un1 S au JopuN qe 8e1ol1 s al utstueuo u Supjoo IYLUOME UL st Au Lana 11 ur Jep ay Sutsn uop are Nod Jaye u 15S UTEN IP ut uoorypo ay Suen Aq Arten y J20 NO sayy Shem OM ut paypoT aq ULI 8eJo1 s IMF AJL PAPO str u uA ATUO s J ceguo O mo s pue sasessaul p d sou shay SWS mo 01 uono 1oid s ptAoid Se1o1s mo S AL SuvJ1o1S mo y SUDPOT adueypxa Aay L 0 JORJUOD MAU AP AMUI 0 ZUI aTOJaq JALG ssaid pue splejap PLIU AP 1970F UBIIOS SPPLJUON IMI IYI UI NUJ IP WO JORJUOD MAN SOOYI 92eluoo L PPL OJ for the call is destroyed and permanently erased For CryptoPhone SMS key material is stored in the Secure Storage with a method that is called forward hashing meaning that only keys not yet used are kept Keys for CryptoPhone SMS that have already be sent or received and decrypted Security Advice regarding Flash Storage With the GSMK CryptoPhone a lot of information is stored in Flash Storage Flash type storage is safe against failure of the backup battery You must however be aware that except for the Emergency Erase there is no way to securely erase information stored in flash memory in a way that it cannot be possibly reconstructed by sophisticated methods of computer forensics Flash memory uses its own way of managing data that is beyond the control of the operating system This can
9. OIa pue Jaqumu NGSI INSD st Bue are nod Jaqumu e yey zruZo2 1 Jou Je sIaplAoid uto uoudqo1d 3O IP Yea 0 fed o Jaqumu uoud puodes eto ds e YIM s uroo yor tuondupsqns gyep eto ds e Aeu PY si qtaosqns 0 spre eyep Surtuoout MOTTE Ajuo keu z ptAoid IAJSD 6 mq ores Sutse our Suruuoo q sr d y uouqol1d io aU 10 p p u se upns se ep WSD JO uond o arp PYS si ptAo1d tuuos T amp D m s v dn Sunes uA sw jqord
10. SMS you need to have a valid key for the recipient meaning that you need to have performed the key exchange process outlined above successfully 30 Key Verification Reading the three letters and verifying what your partner says is meant to protect you against so called man in the middle attacks on the secret session key The session key is different for each call as no key material is re used between calls The letters are mathematically derived from the unique secret key that is generated for each call By reading and verifying them with your partner you make sure that you are indeed communicating using the same key Please pay attention to the voice of your partner when he reads his three letters To be completely on the safe side against very sophisticated voice impersonation during the key verification you could periodically reverify the letter code with your partner during the conversation Redialing The CryptoPhone has access to a call history comprising the last 10 outgoing calls You can redial a number by scrolling through the last dialed numbers pressing the up and down buttons in the CryptoPhone screen and press the green Talk button once the desired number is shown in the display 19 6T pe4109uT 3294409 EnD gt s es s uued Aes noA Andes Srudei18o1d Jo aler pappe Aan 0 1129 ue s ptAo1d ent 9STWHS uonouny ysey Su de18o1d 3o e Jo Aem Aq paatiap st Ady uolssas L UDIUA Wo Jo mad e se mq po u
11. UOYgoydAID jo uondAadap ayy 3 ujred mod YM amMpadoid asueypxa Aay ayy p l duuoo aaey o peau nod Pyp Surue ur soured uoneorunuruuoo MOA YIM S JO JS PILA L Ivey 0 p u NOX Howq u ay UT TELE st uoud ay 1IA u UA Data aq ULI SWS auOYgoydAID SWS 9uoudo1d so Sumy JEULIO poorun UT p poou are sasessau t se sIa OR TeYD asenSury eoo asn os e URS NOX SWS peureyp dnmui se Juas are yey sasessour suo syioddns S5 uoudo1d O a8essau mod 1rp pue soduro2 mou ued nox u 15s soduuoo asessaul ay ul usIdDay ppy lt nu lN sn qu tdro 1 e ppe oy Aayos adessay y puas y ss id pue 3st sjoeJUOD suoygoidArD ayy woy Justdial IP sas 0 st POU puoo s AI Juatdioay ppy lt NUS RIA uS asodur0o 8ess ur dU Ul qu rdr 1 p uits p dy Joos PUR u 1 s UTEUU IY WHOA UOT Sess A MON JY PAPS WI NOX SS uoudo1d O z ssarppe pue asoduioo 0 S LEM OM IT IIAL Eu poq uado e tw 198 ut UMOYS S1 H s urn 1940 Te SUMA p ustrqe1s sr feo amoas e u uA lqrSIA ATUO ST 1oTeorpur TAN DAS u 19 sy sdes JoujTed Japun si n np ayy Dan pue Jauzred Io 0 Aes NOA J pun SIAJ n IP pear pue Leider ay ye Yoo L aye se q KA IP jo onu unne ayy ra 0 Japso ul Jouzsed Mod 0 Zune yeys ue5 pue punos gt Sutq lt eB Eau nok p l duuo2 st dmas Lo ouO Aqyenb au uo Supuadap spuov s Omg mq spuodas 0 0 Wo ale Aetu dag Ady ss
12. acts and associated information like the keys for SMS encryption secured against unauthorized access The information in the Secure Storage is encrypted with the same strength of cryptography and the same key length as CryptoPhone Calls and CryptoPhone SMS However the ultimate strength of the protection is dependent on the quality and length of your passphrase 11 LE UOISIDAP p uuojur ue yeut 0 SPL UMOUY IP UE YIM p ptAo d aq TEM nod os s sazaqut mod 0 8eurep JeQua Od uruu1 l p 04 payMs 1s q IUO ay are nox s1 uuol1sno YIM uonvorumutuuoo Ju 1edsuen pue u do st AjJedord way pueu 0 Aem Tuo ay s A t q MNSD 20 ued sjonpord orude18o1d yy suu qoid Qrmo s se peq sy pedun mag jqtssod y uo oda p teg p L se Jom se ayepdn rewuug e ptAo1id TEM SINS uoudo1d O ary ut Mep e sI2402S1p uoKue JUAAd aU ul QOE uoudo1d 4do y Jo uogesedo Jo Ayyenb pue arm s ay Aoiduur 0 syj s 4Irenunuoo YASH sayepdy Aqum s ge1o1s mo IP Ul uoneurojutr e SUTPNPUT oa UT UOTPULIOFUT UE Gala JOU l p JOAIMOY IM SIU I 2AP ay PSI PIEH ued nod systssad weyqoid E Yons Wan joyrum ary Uy AIOWAU au BUISeIJA MOYPM 4187991 Wa aUOYgoydArD YIINSD 4L SNS ay UA 2443P ay JO apis Yo ay UO uonnq 49991 ay SuTysnd q 3130801 Appomb ued nok oe WSD L 0 1o uuoo Jou saop auoyd u 10 MO ra s utoo q asuodsaz otA p at ATpayoadxeun syjovar uoudo1d 1O arp yey Maa JYJ
13. ator will provide you with visual feedback regarding the volume you set The CryptoPhone 300 volume can be changed over a very wide range to accommodate for different sound characteristics of the CryptoPhone the other party uses When not in a CryptoPhone call the volume slider changes the CryptoPhone ring volume Mute during call To mute the microphone during a call press the button with the crossed out microphone in the screen To switch the microphone back on again press the button again General Mobile Phone Security Advice The use of mobile phones and other radio transmission equipment in certain areas is prohibited or restricted Because of the risk of interference with life support equipment the use of mobile phones is also banned in most hospitals Using a mobile phone in an airplane is a felony in most countries You are responsible for complying with local laws 26 To switch the call type in the Main Screen click the little icon in the upper left corner and choose Settings from the pulldown menu Now go to the Connections tab and click the CSD Line Type icon Here you can choose either Transparent or Non Transparent in the Connection element selection Press OK in the upper right corner to store the setting Switching the Linetype Normally the CryptoPhone uses the V 110 circuit switched data CSD also called digital data call bearer type to establish a secure connection To call to an analog landline or to a CryptoPhon
14. ay daat Nod Jey p pu ururoo2 1 ST 1 Surpuey pue adeioys M 1 1deuDp ayy ur Jaye p urte dx suoseal 3tumo s 104 3JON When you have unlocked the Secure Storage the SMS is automatically decrypted and stored in the CryptoPhone Inbox which resides in the encrypted Secure Storage This means that the SMS you received and decrypted can not be accessed by an attacker even if you loose your device as long as the attacker can not guess your passphrase A method to restrict the storage of messages is the Eyes Only option which can be set by the sender of the CryptoPhone SMS SMS with the Eyes Only flag can only be viewed immediately after decryption and will self destruct after you read it You can distinguish a Eyes Only SMS by its little flame symbol on the letter icon Emergency Erase To trigger an emergecny erase go from the main screen to Lock and click the button labeled Emergency Erase If the Secure Storage is locked unlock it first The Emergency Erase function has been designed for true emergency situations when the capture of your phone by an adversary is imminent and you would rather loose all your data then run any risk of your passphrase being compromised While the Secure Storage provides protection against data compromise this protection is only as strong as your passphrase is If the adversary can guess your passphrase or find it by systematic computerized try out brute force he will be able to brea
15. d yIIAJSD utr qoid AqtAno uuoo 1u lstsi d ou ut dx oym EIS pue Vuy YON SdomT9g ut si utolsn2 2071 scha u yo ose 1o e1 do PSH ay SUTYOIIMS 31s q SJIOM OTTA domq ut apy A 2q 0 sp u sempe Lea d q ur1 am Souuelsur 107 ven au ul uonenys oads ay Unom TIM Steg d q ur1 pue ad JO uonceutqtuuoo yor mo Ay nod Jey pu utuoo t ST HI sut qo1d yqzowq u sau pno YOM OJ WSD Jaao uoud p 1d pu fre o A dde pue Duer fed LIP ASD I Suen 0 matt are PC sut qoid s u1 auoygo dArZ_ Suen nod Ted 0 3red Jayjo AP e 0 eo paydAsoueun ue aen poo noA uono sp uo UT syIom ATUO Bureo mo s JI st ptAo1d Zunpyms n Surumeod are noA Jt us qoid sty ssed Aq of sauoygoydAr_D om u wq q suopo np oq Jo uo UT IUO yq dA ay asn 0 qtssodur yr aset APU SUOTIPUOD Aoqe a JO V eyep Aue 3todsuen 0 rey uay mq dn JAS s urn uuos are STL VA HoAq u WSD A ut s pts ut qo1d jeoruuo SurAjJapun u 1 PUA ue 0 s utoo A u pue spuoo s QE UAP 1 8uo soe aseyd dngas Lo IP Jeu St uou uou ud y M220 Je w jqord das Aay Surpu JaAau ayy pamsyuoo p doid Jou are Jey SOA WSD ut Sutureo1u uA J eto ds s cue sumoszmj urez IPUN S1 ptAO1d 19490 e 10 uuos 0 s e2 eyep ssed jou Je ssaptaoid awios auoyd au dn Suppid u uA punos uapou e sie u ays ay asnedaq qred Dale au Aq p ztuSoo 1 aq ULI stu 1 tu pout e PIA UE ay pueu o AI Ajsnoau
16. e USB port is not powered up Due to the higher power consumption of the built in powerful processor and the backlit display the standby and talk times in secure mode are slightly less than what you might expect from normal GSM phones Also please note that the standby and talk times may vary depending on your distance to the nearest GSM base station the further away the base station the more power your phone needs to use to reach it Spare batteries are available in normal electronic stores that sell mobile phones 15 EE Tenau Aay Te e2 mo s e Jo uon l dutoo uodn ostA p mod uo aa UE paio s st SEI uouqo1d O sed mod Jo ALMdas ay sruuoidutroo un y enropu Ady oN 3JON aserq Luzia ay Jaye suaddey yey 1ooq poo ay Aq PIPPP ISVLA W re s Sess tuu 22 S AS9AOH auoyd y ul Juasaid spreD CS aa JOU OSP TIM pue SOOT OOPNGO puou ayy UI p210 S s 8ess ur S PUL SJORJUOD dy 9ILIMIAO j mo s JOU ILM asery AUISIOUI Seat Jaynduroo paoueape Jo sues q Aresiaape p s e Aq papnysuo2 1 aq stAJ tno II Lyp MOA Jo sade sneo q ress 5 u st IOWU use TTE JO JLLAJ AO l duuoo Y J Adour uruse 4 ayy jo p ds ILIM MOJS au O INP SI SMT UaLIMI9A0 stad u q sey otA p ayy Jo Aua au PPYP IMS ILU 0 s nurutu ISLI Je 107 UNI o p u IM asery Aou S1 urg FEU NON eyep utopue1 YIM 00g BUOY goydA1D ay Jo La et EUJOJUT 9 qQeILIM dy Soa Jsnonunuoo uonoumJ Uu lqe1 9Aoo 1 uou pue eu
17. e on a satellite network or a network with improper data call configuration like most GSM carriers in the USA you can switch to the V 32 bearer mode To switch the call type in the Main Screen click the little icon in the upper left corner and choose Settings from the pulldown menu Now go to the Connections tab and click the CSD Line Type icon Here you can choose either 9600bps v 32 or 9600bps v 110 in the Data rate selection Press OK in the upper right corner to store the setting A small desktop phone icon in the CryptoPhone screen will show up if V 32 is activated The call setup with V 32 takes longer then with V 110 as the modems need some time to synchronize Incoming calls are not affected by the call type settings 23 Sc sdummas suoygo dArZ ay ut uonoun IED Jaye OPLA Jasayy IY ayeatoe UYO 1our w jqord sry aouatiedxa nod JI urese uo pue yo auoygoydArD ayy Buoys 3sn Aq Pex aq IWY IYJ Jo SOU ULI uonrpuoo SYI JOIARYaq pasapun Zoo Jo warqoid dm s Aan Sutpu 1943U IP sneo IST OsTe YM auoygoydAr_ ay Jo Ped WSD IP ur ayes SUTEUSIS TeapUN ue 0 peaj Jeu OO WSD I4 JO uonrpuoo ogto ds e sauTMaUIOS 8e1 AO2 eARINUT 10 ISH episno suonesado 10 qe teAe osje St s eurtu 1 ales JesTeVUU UTEZI 107 uonn jos suoYygoydArD V seare P3213402 PSH pts no uoneorumuutuo5 mo s qepioje Jo Jyoueq p ppe y s ptAoid H WSs S eXe mu un 1oJ uonn jos uouqo1d sO ay 190 ue
18. e tab You will need to enter your old passphrase first Note A lost passphrase can not be recovered The Secure Contacts list In addition to the standard contacts list in the operating system the CryptoPhone 300 is offering an encrypted CryptoPhone Contacts list that stores your contacts in the Secure Storage It is recommended to use the Secure Contacts to prevent an adversary who may get your phone into his hands from gaining knowledge whom you are communicating with To import the contacts from your SIM and the standard phone contacts go to Contacts from the Main Screen and select Import Contacts from the Menu You can also delete contacts from the Menu and change the sorting to display your contacts according to keying status To call a contact stored in the contact list select Contacts in the CryptoPhone main screen choose a contact Now you see the list of contacts stored in the Secure Storage Select the desired contact press Menu and chose Call Secure The encrypted call to the selected contact is then set up immediately 13 SE Jou saop pue AresJoape p uruus l p L 107 jpmu ou srunool n gq YIM pasn uond zou u r Apisea ste MoA 0 UAS PMO IPLE ue os qu uidmb payeonstydos Ajeyerapour YM p 1d J3o p pue Saa Datum e2 A s JOAO P A1 2 1 aq UVI s eUsIS OIPeI yoong auoygoydArD ayy ut au opd ua ay p upoe 1 aary y auto STL Jenu puuoo IMOA Jo slu luoo ay 3seopeo q POM noA Jaspeay tnool
19. er also called GSM cell to the next During the handover the data connection is briefly interrupted The GSMK CryptoPhone 300 has been successfully tested traveling at speeds faster then 180km h The frequency and intensity of disturbances is primarily determined by the GSM network In rural areas the network consists of fewer and bigger cells resulting in 21 LC PAUI u 1zos I UO uomnq MAUJ y ssaid pue seguo esou auoygoidAry au woy mm Zeiss aduis 243 PEIS 0 SIAU Seid si unred mod dez jqnop 3514 paBueypxe aq 0 spasu Aen asueyoxe Ady un HLNIUI OJ e uosuad DA SWS p 1d upu Bueupx or i aBueyoxg Avy 0 DEIUuOH PAUI SWS auoyqordiry OSSZSbE7T 8U0Ud IO Sucupoxq se Joposy UWEN 9821075 mo s un ut Dall ua paiojs st Perayu Ady ayy Sueupx Aay ay 19V Daat Jo Ju s aq ULI SPS uoudo1d 31O em ay 2107 q parmbar ATWO st SINS BUOY Go dA I_ 10 8ueupox Aay au 1 JouZTed MOA tu 8ueupox Ady e UNI 0 p u AED nod ulred e YM SWS PIA uoneorunuuuuoo JIS o Sre gsuouqo1d 1O ay se uSu Ady pue sunpuose sues ayy ta Doidl ua are SWS ALL SIS 10 ga p eo os e sagessa JOYS p 1d 1ou are oog uouqo1d uO ay ur m Mou Jueyodun uy SINS uoudqo d so Tenue aremprey uoud ayeredas peu se jd pouu mm Dale ose pouu 2000 o auoyd ary yms o Moy UOTeULOFUT 104 suopEMBar pue c pour Jsnqoy 0 YOUIMS pmous nod SYNS A1oqoejsnesun
20. iably The storage locks automatically after the set number of minutes since the last unlock has passed not since the last activity on device as it should Graphics artifacts may remain for a few seconds when switching between landscape and portrait mode while the device is busy Emergency Erase does not delete everything outside the Secure Storage Normal SMS and Contacts in Outlook may remain There are Out of System Memory messages during Emergency Erase The counter forensics hardness of the Emergency Erase has not been severely tested for other things then the Secure Storage If you press Invite instead of Save for a new contact that you just have entered the invitation to key exchange is sent out but the contact is not saved Please always save a new contact before inviting it to key exchange General Your CryptoPhone 300 is based on a quadband 850 900 1800 1900 GSM PDA phone hardware that is sold under different brand names The phones firmware and operating system have been modified to accommodate the CryptoPhone functionality and provide added security so a number of things that you might know from other Smartphones are different on the GSMK CryptoPhone for security reasons The original Smartphone manuals license sticker and CD are supplied with the GSMK CryptoPhone 300 but you need to be aware that some functionality has been disabled for security reasons and some functions have been changed to better integrate the Cry
21. k into the secure storage and get access to your stored messages contacts information and the SMS encryption keys for 32 request will pop up asking you if you really want to switch off To switch it on again press power for two seconds You will be required to enter your PIN again For flight mode and other options to switch wireless components on and off please refer to the separate hardware manual After you switch your CryptoPhone on it will start directly into the secure phone call mode To get to the Main Screen minimize the secure phone screen by clicking the X icon in the upper right corner Placing an Encrypted Call In order to place a secure call the following conditions need to be met your partner has a CryptoPhone compatible device up and running e there is sufficient GSM coverage the GSM operator supports GSM data calls technically called 9600 bit s Circuit Switched Data or CSD To place a secure call choose Contacts in the CryptoPhone main screen select a contact and press the green button You can also dial directly by selecting the Call icon 17 TE 30 Dad oa ut Jauyred mod Aq 1u s u q seu 1 se ua Inun paio s aq PM SWS a0OudO r un NOA 201 Ju ru Auoo IWY E Je Jey OP ULI NOX 11 YoTUN 07 payse aq TPM NOA PAPOJ st 8e1o1 BINDS IY PUR ut SUMUOD st SWS pa dAroua ue It aa Dao are UONdAIDap IP Joy shay IJ se PAPOJ JOU ST Ee aINdag ay u uA l qtssod ATuO st SWS a
22. lead to information residue being left even after you deleted the file or information entry in the operating system So files that are no longer visible after deletion in the file manager may still exist in some unused part of the Flash memory In addition esoteric physical effects memory burn in may make it possible for a forensic intelligence laboratory to reconstruct the former content of Flash memory even if it has been erased or overwritten once The same problem holds true for mini SD memory cards because they are also based on flash memory technology 34 Charging Before using your CryptoPhone it is recommend that you charge the battery until full In order to do this you must connect the power supply to the CryptoPhone Depending on your location you may need a plug adaptor to use the power supply if the plug does not fit in your outlet The power supply is rated 100 240V which means it will accept your line voltage without conversion as long as it lies within this range The status LED will change color to orange while the device is being charged and to green when fully charged You can either charge the CryptoPhone with the power supply recommended or with the supplied USB sync cable on a computer Charging over USB takes considerably more time and is dependent on your computers configuration and setup so it may not work under some circumstances e g if you have no synchronization software installed on your computer or th
23. might irrevocably compromise the security of your CryptoPhone or damage its functionality GSMK does not provide any support for installing 3rd party software and will not provide support for problems caused by installing 3rd party software Any and all problems caused by 3rd party software are not covered by warranty or support You have been warned If you require large number of custom CryptoPhones that include certain software components of your choice by default please contact sales cryptophone de to discuss your requirements Known Issues The following issues and problems are known for the GSMK CryptoPhone 300 Version 1 00 built 129 Some issues may have been solved already in the firmware version on your phone You can check your firmware version under Settings gt About 1 Encrypted SMS can only have one recipient at this time If you need to send the same SMS to multiple persons save the message to Drafts Menu gt Save to Drafts before sending and send it multiple times from the Drafts Folder An 42 No Added Security This setting leaves the CryptoPhone with very little protection against potential attacks on the operating system Some mechanisms to prevent really stupid attacks are activated but this creates only a base layer of protection that is not sufficient against a skilled adversary New threats against any operating system are discovered from time to time selecting No Added Security exposes the Crypt
24. n g L ULM PUY SI uose 1 ALL tte paydAsoua Sump 1 spe u ulool n q e Sutsn pu uruuoo 1ou ATSUO s st 1 s un1 s Jaseueyy qumo s JaMoy y ut STe suoud p d sou un eULIOU Sue JO Jaspeay oan asn 0 qtssod st 1 AYM 28u ugoon n q L sey 00E uouqo1d O AL J spe u unool n q uouqo1d 3O mod ym p tlddns auo y uey Jayjo sjaspeay Zursn Aq pasned sus jqoid Joy odds ptAoid Jou s op YASH 214p IP Jo apis 3USt ay UO stq ypos 1olp uuoo qed Jaspeay ay 8ue JJo Sn d 3 spe u ayy SunJasul u uA SUOTIPUOD wos I pun UE SutoSuo ue ljeurtud E NOA 19A MOY ed e Sutmp 10 arojaq Sur Aue ur u Snyd ued nox auoygoydAry ISH IP WM papnput sr3 spe u 0213s e uone1odo aay spuey 104 J spe u Ip Sursn st serudssed mol se mo s se are SWS uoudo1d io pue SEO uoudo1d O ayy fe os woz Dad roue ut ATUO Gott s 1ols pue puru ut sut qoid asou WLM 1 mq st 00E uouqo1d 3O ayy Jo 8e1o1S m2o S ay vl slajoRreyp oLeumueydye 91 Us L M st aserydssed mod gt 10 sanyiqedes eoruuo 1 psoueape YIM Azesaaape ue q auoyd y jo amjdeo lerp urtur te J nol Jr asp Aou S1 uuq ue J9ptsuoO 382I0 S mo S IP xo p omb 0 u s UTEN AP ut UOT DOT IP asn Scu 81 uu Ue UJ SOU Sun1 8 orA p MOA Jo JSH ay MOqL UIJ A qeuosead aq UPD nod aJayM suonenys Ul p yoo un ATWO st aBe 10 S aMdag IP Jey ms yetu DIDOUS nox Domp se ay outs passed u q seu Som o JaqU
25. nd Appointments The CryptoPhone supports in principle the sync of contact and calendar entries with a computer You need to be aware that in theory it might be possible to attack the operating system of the CryptoPhone by supplying manipulated data to your PC or exploiting unknown problems in ActiveSync GSMK does not recommend to sync your CryptoPhone with a PC especially if the PC is connected to a network for security reasons If you have high security demands and need to calculate with a very sophisticated adversary avoid to sync your CryptoPhone with a PC The CryptoPhone ships with de activated Active Sync functionality You need to re activate the sync option manually in the CryptoPhone to use it To initiate a sync connect the CryptoPhone with the computer using the enclosed USB cable When you sync your CryptoPhone with a PC your should physically disconnect the PC from any network connection as a precautionary measure Note Sync over IrDa Infrared and Bluetooth has been deactivated on the CryptoPhone as a precautionary security measure You may re activate it if desired when you need to sync you r phone with a PC While GSMK is currently not aware of actual problems with these sync options there is a very strong likelihood that such problems will arise in the 36 Changing the Passphrase To change the passphrase for the secure storage use the Settings icon in the Main Screen and select the Change Passphrase button in the Storag
26. ndow pops up Name Theodor Test asking you to verify the key Phone 49123457890 Verify Key You can either verify the key with a A key has been exchanged with this person It needs to be authenticated phone call or by other means like when you are meeting with your partner anyway Choose either Call to Verify or Other Verify Cancel Press Verify to verify that you and your partner have the same key 28 the quality of the call If the call quality is unacceptable please try calling again Call quality can also be adversely affected when using certain GSM providers It often helps to switch the GSM provider to achieve better secure call quality As a rule of thumb the larger operators tend to work better then the small ones If the Delay indicator becomes reddish or red please try to find a place with better GSM coverage Use the signal strength indicator on the right upper side of the display to find a better spot If the delay indicator turns and stays solid red please hang up and set up the call again When no call is in progress the delay indicator is shown grey Secure Calls while moving When using the GSMK CryptoPhone while moving fast in a car or a train you may experience a degradation in call quality periods of longer delay especially in Robust call mode and short dropouts during a call These effects are the result of a so called handover that occurs when you move from the coverage zone of one GSM tow
27. oPhone to non necessary risk Choose this setting only if you really need one of the services that would otherwise be disabled in the Medium security setting and if doing so matches your risk profile The following functionality has been disabled even in No Added Security mode because the risk is too high e MMS receiving SIM Toolkit Iv areme aq SLA Aressaoau J MJOSQE st 4 Jt ae ATUO pimous nod TED ysis J M S aaess e stauoygoydAry ayy ayy Ju urdmb ALMdag Oe uo TeMYOS eUOTIppe Stee auoygoydArD YASH Mod Jo atm s pue qu lut ay JILE 0 pasn aq ued puny Aue jo aremyos Lued pig Tetun mouy poys nox adtAap auoygoydArD yIIASD MoA uo aremyos Ayred pag qneduuoo uoydy eus VUosotta esu 0 lqtssod st yt Ato un UJ dIVMOS US PIE och Ch DLH 10 pounsap gt Py yUourdmba Zur nq Aq poureygo ATisea aq roj 1 un UVI CO SID Ted SIASTOY AM suouqold 1O MOA 101 sayJOssaooe euonrppvy Soe puesq Waat Jepun DOS gt Aq pamjoemueul 21A p L uo p seq st ououdqo1ld O yIINSD 4L SOLIOSSIDDV saioys uoud afiqouw 10 Wd IEuuOu ut a0EIEAG are Soa quouraorday Auesrem IY Aq Daa Jou pur pd re 1 pue Ie A e st uouqold io ay jo Late lqe S1euo 1 1gur joq umnprT Jamod ysny ay 40N syuawarmbar AQuMdes MOA JM 0 yIIAJSD qeu TIM sn ATuo sours samseaur qumo s ay 0 aJaYpe 07 1s s9Jur UMO MOA UT ST 1 Jey puelsi pun Spa Dat aq ITA suoynedaid Ayumdas pue Gout Sutddrus pastape y
28. ptoPhone functionality Do not try to use Microsoft or HTC system updates as this will destroy the CryptoPhone firmware and void your warranty Certified CryptoPhone Updates are only provided by GSMK to you in a cryptographically secure manner Inserting SIM card amp switching the phone on On the lower small side of the phone is a small lock unlock latch Move it to the open lock symbol Now you can flip open the back cover of the phone Remove the battery by flipping it on the small handle to the right side Then click down the SIM holder as indicated by the arrow and insert the SIM Close the SIM holder and insert the battery Now reattach the back cover and switch the back cover latch to the locked position Switch on the phone pressing the power button on the upper small side of the phone EP quoygo dA1D ayy JO mata adeospury ut UMOYS JOU are sJOyeoIpUT ZE A pue aN ox Jou TEM SWS uoudo1d 3aD2 ospe Amas aam Sunjes Jaseueyy aum s ay UT SWS Doll aa Aq stteap PLU pu s 0 Dous OU RUM sr IIL Sunaodun 1oJ q 19qumu JJO IY se mo s Ted 10 0 SIS pu s 0 JULM NOA PY 1 unred ay Jo I qumu ay 2107s NOA Jey ms yeur se q 1 qumu fqou ay u un Joyo s1 qumu Sunioduu suu qo1d uros seu uonoun yodu sJoeluoo u Teurndo jou Tju 1mo st uorss iduuoo 8ess lA pts sJu rdro i ay ye s 8ess uu 1otu I0 OM SE uMmoys are s 8ess ur Sort J19doid ou Jou s op sasessour Buoj Jo
29. r y234 43 Jo JITLA IPM amp JO UMOUY are s rpu 8e DUSTU 10fe Q uouqo1d 1O MoA pug 1 4 N pastuosduroo se p p1e3 1 aq 0 sey y ure8e y eq y puy pue auoygo dArD y gt 3so lt aaey NOA JI WOO Ou ay UT uo e I aaa JOU pue d js nod u ym Dad mod pts q 1 md uoonneq IP 0 NOA YIM 1 aye pmous nok ATPeuMdO s uun e W Lauras nod pm Jaspuey ay daay Nod 0 yoeq V 2423 pue suoygoydArD y p le ndrueur ay Jaye STEI mod olur UASI 0 TESI APE ue MOTTE plnom Jey spoun u eru lod Jo AURA p SI ABU pasTuo1dwioo se papresar aq 3snuu 7 S Suoudo1d O ay Jo uorssassod Teors ud Aresodura paures aapu poo Aressaape ue DUQ auoYygo dAID ayy 1940 Jomuoo Jeorsdyd paydnaszayurun pue yusueuLad aaey Nod se SUC se ams se papsesaI aq uo ww 1 btA p O4dSIWOO AWMdag uonvorumurtuoO L St aUOYgo dArD MOK otApy AWEMD9g Ayde130 dA39 somos p usriqnd Jo SyJouaq ay UO uoneuozur parreyop 124m A0 uoxz 9 uoudold Ap MMM dA a ISqaM at UO W29d uono s sIamsuy pue suons nO ay aas se q auoygoydAry MOA oyur rewuug SNOT sur 0 duraye ue aq Leu sp se AJoyeTPSTTUT oT Juauoduroo sp Jo AypqeI uma p umsse ATTeUISLIO au 1941y e arput Jeun lqe teAe Saa UOEULIOFUT Jt UOTETTeISUT HEI IY WO7 sJu uoduroo UJI AOWAI POU MOIM etu YASH OSTY Nod 0 lqe reAe SAJOI 3tm2 S Jo OY IP Surpresa Jaseueul qtumo s aye10d 109 ayersdosdde y y m JNsuod se jd uoyezr
30. s you will get notified either via the e mail address that you supplied when purchasing the CryptoPhone online or directly by your local authorized CryptoPhone distributor If you receive a notice about an upcoming security update please verify it by contacting GSMK directly The contact details are listed on the website http www cryptophone com to prevent attackers from slipping you a malicious update The firmware update mechanism is cryptographically secured using a 4096 bit public key signature system which ensures only signed CryptoPhone updates will be accepted by your CryptoPhone If you receive suspicious communication regarding CryptoPhone updates such as an unannounced e mail with an update file as attachment please inform GSMK 38 Enter your PIN Most GSM SIM cards require you to enter a PIN number After you have switched on the CryptoPhone you will be asked to enter your PIN After you entered the PIN press the Done button The CryptoPhone will finish initialization and provide the secure telephony mode If your GSM SIM does not require a PIN the secure telephony mode will be enabled right away Note It is recommend that a PIN number is used as it makes the extraction of information stored on the SIM more difficult for an attacker and prevents you from incurring charges to your account if the phone is stolen Secure Storage The CryptoPhone 300 provides an encrypted storage system to store all cont
31. smp pasn jou st asueypoxe Ady ay uros Aay ay Jouzred mod WIM asueyoxe SWS 3d 3o p pue dr ua 0 pasn pue a8ei0 s amdas ayy ut Dada paio s u un st Ady u O68ZSrEZTE gt u0ud mal sopoay SEN p zmooo sey Pepe pprtu tn ur ueu ou pue y aures ay UO SuNeJedo p pur are Jauyred mod pue nod yey ams s yeur ampsooid sty Nod 0 spear au MOA s1 T 04 YPU pg SAS 1 un1eq sapo eo au ut Saal 2010 ayy PYP AFLIOA u ur Dia LS nox un Ul SIA a y W 0 peas pue Jauyred mod ym 390 WEL ECH Surss 1id rzoj q si n l XIS EE tie IYI UMOP uA 0 IMS IEW p lenrur EE aes SMILES DEE IED aq JM Joujzed mod 0 eo uoud OsS sbeztet uoud e uonnq JD a ssaid nod ua ye sopoay OWEN oz pape ULI PYY s mse uu eOruuo Aq Sie 2 ZTUMUTU o I UJO e5 EUONLUIIJUT ue ut p AJoAut siolez do ajdymu y sfe 2 ns uuop uo se poo8 se aq OU IST sje Teuoneusajut uo AED arp yey NON smo dorp vu r dx eu NOA pue s su Aejap ay peq s uuoo q Qlenb au e1240 au Jl STe uoud egu unuoosuez Iwos UO ay uonuu Kepp l qe onou UPJ e S EAIE SI III UIS st JOyeoTpUT Aejpp IY Jl UA OS SUOTSSTUISURT 320A UE UOT IAIION 1IO11 Seat pue od 19M0 YIM LFP s pueu ytoAq u WSD AL HOA WSH ay Jo amjoaynyore au Aq p sneo epp UPH L seu eo e Sump ep otoA paydAsoua ay 11odsuezn o uouqo1d O ayy Aq pasn Spouu Je VP WSD 4L za peq e 398 ysnf no s um uuos urese
32. the phone especially the keyboard Damage to the keyboard battery and display as well as any kind of other mechanical damage is not covered by the warranty Repairs Because of the manipulation risk GSMK does not take back any CryptoPhones from customers except for repairs There is no such thing as a restocked refurbished or second hand CryptoPhone All sales are final If your CryptoPhone is defective GSMK will either repair it or swap the electronics for a new factory fresh device No parts that have been in the hands of other customers will be used in repairs If you need a repair please mail to service cryptophone de You will then receive instructions about the 40 High Security In the High Security mode internet functionality is no longer avaialble GPRS PPP data calls the Internet Explorer and the Windows Media Player are disabled in addition to the measures taken with Medium Securty The following functionallity is disabled in High Security mode Bluetooth OBEX WLAN GPRS all TCP IP funcitonality Mediaplayer Internet Explorer Video Telephony some email functionality ActiveSync Infrared some SD card functionality e e e e e e e e e e e 6 qun ysayj e Sutseuomd Japisuod 41 uo spuadap AqLMdas Mod pue yqnop ut Jy o1A p 1 d Som 000 001 TEIAS JO SOO aU W SISATeUR JO SYJUOUL TEIAS JO IJYUIS Ate E MOM PAP 0 qtssoduur are yey Spoo uone ndrueu
33. uegIo Mod woy suoygo ddr MOA p AI 2 1 NOA FI OS suOTeZIURSIO pue s rueduroo A AO s seyomd umoA jo wed se suonemSguoo apyoig AWMdasg p zrtuolsno saplaoid YWSD TEPP ut UAP aq ZTU s paqlosap ay 10 qe teAe aq Sru s goiq mae e Jou auoYygo dA1_ nod pautejgo nod Moy uo Surpu d q 3 0N poumsse aq 0 sey Aressaape p s ATuSru e 39UA SUOTENIIS 10 pu uruuo2o st SUAS SM pout AYLMIas u8rH ur u ye SaMseoU ay o uonrppe ut BuTMas sty ut p qestp are SOOT ay pue suds at SutAI9031 pue Surpu s SWS SloonnO1 pod O d doyysap L YIM uonezruorupu s Iy JO s 8ess uu SWS Sutsn Douuotad aq pmo ATTenuajod yey syoene 3sure8e uono lo d SIAO Aal M S SYI p lqestp uoneorumuuutuoo Jo SULIAU 1970 UE aAey O1 UstA Mq Qilpuonoun Teo m sum Teo pue su0ygo dArZy ayy aen uo OYM S1 utolsno 10 papuagut st SUTIAS SLL AUS us nxq Security is not a state but a process And this process requires constant checking against emerging risks and new attack methods Since the CryptoPhone comes with full published source code the chances are much higher for a flaw to be discovered and fixed quickly than with any closed source cryptographic product An advisory board of distinguished cryptographers and security researchers helps to identify and counter potential threats based on their intimate knowledge of the latest academic research and emerging cryptanalysis methods In case a firmware update is needed for security reason
34. y st asery Aouaszewry ayy atm s mod sruroiduuoo m r mun 8e1o1S mo S IY ut Dag yep e SLI fM asery Aou S1 urq pausisap u q sey se1q Aula IY UOTeNyIs Jo puny sn ut shay pue ggep Mod 301d o uondo ue tw nod aptAoad or sue uu eBay 10 e8 Aq aserydssed Mod 1340 puRY 0 padioy aq ABUT NOA suonemis IUOS UJ paatadaz J JOU sasessoul 91 V spuodas maj e Joy uonnq Jamod ayy Sutss 1id Aq QOE uouqold 3O MOA Fo upltwS 0 p u nod Jo st orpe1 ay msu 07 spout Aqpur s ut 10 UO payoyIMs suoYy go dA SINS 24 WIM kare suoyd ou 19470 Jo peydsoy suede ue 1 1u 0 ayes JOU ST J Jo uo SUMS yo Aeydstp ayy sous pue d s 0 10ss 201d ayy sind ent 1 Orped IY lqesrp 1ou IM pour Aqpur s spioA 1970 ul pouu Aqpue1s ut S141 u UA sje SUTLUOOUT AI 02 1 TIS IM au0Y go dATD Net ey uee uonnq Jemod ayy ssaid spou Aqpur s ut Jq 00E eUDYgoIdAID YASH oy nd oj dn wn IM users oy MON AjJ tiaq uonnq Jamod au Surtss 1d Aq au Aue Je IA p IP ayeator ued nod Spouu qpueys ul pou Aqpur s ur st su0Ygo dArZD ay UoHeIado euurou ul IAN 10 pOu Aqpurys ut JJO pays J duuoo 12442 aq ueo y uone1 do Jo s pouu otseq samy sey aUOYgo dATD JWS N L Aqpur s auoyd y Sunesado apy ur passnjd 71 Ae ued nod Bursreyp st auoyd au IPM TPV e al 0 p u nod Jo S uoud ay J UoTsIAJadns yuaUeULIEd mod J1 pun ST 1 JEY OS s uun UE W NOA WIM uoudo1d JO

Download Pdf Manuals

image

Related Search

Related Contents

II Morrow Inc. 618C User's Manual  Case Logic BUA-12  ALO Duo Roll DMX LED barrel scanner with dual light - Bax  Manual de instrucciones Itaca 100 Calefactora  K195 - カーメイト  User Manual - Kyoto Kagaku America Inc.  Dakota® 10 e 20  シートはり名人 NK-1000 PAT. 取扱説明書  

Copyright © All rights reserved.
Failed to retrieve file