Secure Phones: Not Secure, Wikileaks Hacked By TOP-SECRET Govt Implant, CryptoPhone IP-19

grarpamp grarpamp at gmail.com
Mon Apr 3 17:04:17 PDT 2023


#OpenFabs , #OpenHW , #OpenAudit , #FormalVerification ,
#CryptoCrowdFunding , #OpenTrust , #GuerrillaNets ,
#P2PFiber , #GNURadioRF , #PrivacyCoins , ...

Until then, the only thing you can trust is your own software [2+2=4],
and hope that the hardware it runs on isn't smart enough to
hide its interception and or modification of it.


https://www.cryptomuseum.com/crypto/gsmk/ip19/implant.htm
https://vk.com/wall-211958646_4238

https://www.cryptophone.com/en/products/landline/cp-ip19/
https://www.cryptophone.de/upload/files/33/original/CP_IP-19-Brochure_web.pdf
https://at-communication.com/en/crypto-gsm/na/cryptophone-ip19.pdf
https://cryptophoneau.com/product/cryptophone-ip-19/

https://www.reddit.com/r/espionage/comments/124rnow/cryptophone_ip19_implant_analysis_of_an_embedded/
https://www.reddit.com/r/craftofintelligence/comments/124rmkh/cryptophone_ip19_implant_analysis_of_an_embedded/

CryptoPhone IP-19 with bug
In 2018, this sophisticated bug was found inside a CryptoPhone used by
WikiLeaks in London between 2012 and 2016, around the time of the
Snowden Revelations. In this article we analyse the bug. Experts think
it was planted by the CIA.


More information about the cypherpunks mailing list