Language: Slovenščina English Hrvatski Српски Bosanski 

Company INFO

Jupiterus d.o.o.
Čampova 2
1000 Ljubljana,
Slovenia,
Europe

Jupiterus, Stegne 21, 1000 Ljubljana, Sloveniam Europe


T.:+386 (0)30 333 330
E: info@jupiterus.si

 

GSM INSECURITY

The use of wiretapping has become so widespread, simple and uncontrolled that you must assume that records of your private calls and SMS end up in the wrong hands. Equipment for wireless interception of mobile phone calls and messages has become available at suchlow prices that it is deployed frequently even in comparatively small business conflicts. So using encryption to protect your privacy is the prudent choice. But protecting your information with strong and trustworthy encryption has become difficult.

 

TELECOMMUNICATION INTERCEPTION

Over the past two decades, telecommunications interception has developed into a major industry. Intelligence agencies and private organizations within all countries routinely intercept calls that may yield sensitive political, military or economic information. The use of wiretapping has become so widespread, simple and uncontrolled that you must assume that records of your private calls and SMS end up in the wrong hands. Equipment for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently even in comparatively small business conflicts. So using encryption to protect your privacy is the prudent choice.

read more...

 

ENCRYPTION

GSMK CryptoPhone technology is based on published and well researched algorithms for both encryption and voice processing. All GSMK CryptoPhones use the same encryption engine with very long keys, resulting in products that provide peace of mind today and in the future.

read more...

 

Active GSM Interception

Active GSM interception systems allow an attacker to actively interfere in communications between mobile phones and base stations by means of a so-called IMSI-catcher, in essence a transmitter and receiver that simulates the functionality of a GSM base station. Recent attack methods involve spoofing so-called femtocells to feign that you are the user's mobile network provider, while in fact you are taking over his network traffic.