special cellular phone sp7
play

SPECIAL CELLULAR PHONE SP7 WIRETAPPING PROTECTION www.ledbg.eu - PowerPoint PPT Presentation

SPECIAL CELLULAR PHONE SP7 WIRETAPPING PROTECTION www.ledbg.eu DEVICE DESCRIPTION NO MATTER WHERE YOU ARE, AT HOME OR ABROAD SPECIAL CELL PHONE SP7 GUARANTEES WIRETAPPING PROTECTION IN GSM MOBILE PROTECTION IN GSM MOBILE NETWORKS ANY


  1. SPECIAL CELLULAR PHONE SP7 WIRETAPPING PROTECTION www.ledbg.eu DEVICE DESCRIPTION

  2. NO MATTER WHERE YOU ARE, AT HOME OR ABROAD SPECIAL CELL PHONE SP7 GUARANTEES WIRETAPPING PROTECTION IN GSM MOBILE PROTECTION IN GSM MOBILE NETWORKS

  3. ANY CONVERSATION VIA STANDARD MOBILE PHONE CAN BE EASILY INTERCEPTED AND DECRYPTED

  4. NOWADAYS ON THE MARKET THERE ARE A LOT OF AVAILABLE CELL PHONE’S INTERCEPTION AND DECRYPTION SYSTEMS

  5. INDUSTRIAL ESPIONAGE YOU COMMERCIAL PLANS CAN BE EASILY LEARNED BY YOUR COMPETITORS

  6. PRIVATE DETECTIVES SUSPICIOUS SPOUSE CAN ARRANGE A SHADOWING

  7. criminal CRIMINALS CAN ENQUIRE EVERYTHING ABOUT YOU

  8. Some special services may be interested in you

  9. SP7 CELL PHONE IS FULLY PROTECTED FROM ALL KNOWN INTERCEPTION INTERCEPTION AND INTERPRETATION SYSTEMS TO COMPLETELY SECURE YOUR CALLS IT NEEDS AT LEAST TWO SP7 PHONES — LEAST TWO SP7 PHONES — FOR YOU AND FOR YOUR COMPANION

  10. TO MAKE YOUR PHONE PROTECTED PROTECTED : IT’S REQUIRED TO HAVE A SPECIAL CRYPTO PROCESSOR INSIDE WHICH NOT ONLY ENCRYPTS CALLS BUT ALSO PROTECTS YOUR ENVIRONMENT FROM AUDIO ENVIRONMENT FROM AUDIO MONITORING (WIRETAPPING AND RECORDING)

  11. TO MAKE YOUR PHONE PROTECTED PROTECTED : IT MUST NOT OPERATE UNDER ANY POPULAR OPERATING SYSTEMS LIKE IOS, ANDROID, WINDOWS, SYMBIAN ETC. BECAUSE OF GREAT NUMBER BECAUSE OF GREAT NUMBER OF VIRAL PROGRAMS MADE

  12. TO MAKE YOUR PHONE PROTECTED PROTECTED : A crypto-scheme with the length of the session key of at least 128 bits for «secret» and 256 bits for «top secret» should be used

  13. TO MAKE YOUR PHONE PROTECTED PROTECTED : ENCRYPTION KEY SHOULD BE PRODUCED EITHER BY THE PHONE OWNER OR BY ITS AUTHORIZED REPRESENTATIVE

  14. AMONG ALL SPECIAL PHONES AVAILABLE ON SECURITY TECHNOLOGY MARKET ONLY SP7 PROVIDES ALL PROVIDES ALL NECESSARY FEATURES

  15. SP7: • OWN EXCLUSIVE DEVELOPMENT • UNIQUE CRYPTOGRAPHIC SOFTWARE • • EXCLUSIVE SCHEMATIC DOES NOT ALLOW TO MAKE A “RADIO BUG” OF EXCLUSIVE SCHEMATIC DOES NOT ALLOW TO MAKE A “RADIO BUG” OF YOUR PHONE • BULGARIAN PRODUCTION. THERE ARE NO ANY FOREIGN “BUGS” OR “BEETLES” INSIDE • 100% VIRUS PROTECTION COMMUNICATION SESSION KEY 256 BITS LONG GUARANTEES • WIRETAPPING PROTECTION. IMPORTANT! SP7 CELL PHONE COMES IN COMPLEX WITH A “KEY GENERATION CENTER” APPLICATION. YOU ARE THE ONLY ENCRYPTION KEYS’ OWNER. YOUR KEYS ARE NOT KNOWN BY ANYONE ELSE

  16. SP7 FEATURES : • SYMMETRIC ENCRYPTION ALGORITHM • 256 BITS KEY LENGTH • PUBLIC KEY IS NEWLY GENERATED EVERY COMMUNICATION SESSION CALCULATING ELLIPTIC CURVES PARAMETERS 254 BITS LONG ACCORDING TO DIFFIE-HELLMAN PUBLIC KEY SCHEME ACCORDING TO DIFFIE-HELLMAN PUBLIC KEY SCHEME • COMMUNICATION SESSION KEY IS A COMBINATION OF PUBLIC KEY AND SECRET KEY CREATED BY USER (BY MEANS OF “KEY GENERATION CENTER” APPLICATION) AND INSTALLED INTO THE PHONE • MELPE 4800 BPS VOICE PROCESSING ALGORITHM (VOCODER) WORKING GSM RANGES: GSM 850, 900, 1800, 1900 MHZ • • • WEIGHT 140 G WEIGHT 140 G • OVERALL DIMENSIONS (HxWxS): 110x40x20 MM FEATURES: DETAILS: GSM NETWORK CHARACTERISTICS DON’T ALLOW TO IMPLEMENT POINT-TO-POINT ENCRYPTION SCHEME INTO STANDARD VOICE CHANNEL THEREFORE STANDARD GSM DATA CHANNEL CSD 9600 BPS IS USED. LOW SPEED DATA TRANSMISSION REQUIRES LOW SPEED VOICE PROCESSING ALGORITHM WITH RATE OF 4800 BPS.

  17. Encryption scheme WHILE ENCRYPTION KEYS ARE PREPARED BY THE PHONE’S OWNER ITSELF IT IS COMPLETELY IMPOSSIBLE TO WIRETAP TELEPHONE CALLS

  18. CONTACTS : LED TECHNOLOGIES BULGARIA Ltd. LED TECHNOLOGIES BULGARIA Ltd. 7700 Targovishte, № 10 Panagyurishte str., BC-BI, office 7 BULGARIA Mobile: +359 898 778 128 e-mail: office@ledbg.eu web: www.ledbg.eu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend