How secure is the Atlas cryptographic phone?

65
How secure is the Atlas cryptographic phone?

FSUE "Scientific and Technical Center" Atlas "solved the problem of secure communication for 115 000 rub., When any fool could solve it for 1 000 000.

Ensuring communication security for government agencies and enterprises of the military-industrial complex (DIC) is one of the most important components of a common system of measures to preserve state and military secrets.



This year, the Ministry of Defense of Russia joined the list of departments that use cell phones with cryptographic protection of information in their activities. For officers with access to documents of the highest category of secrecy, domestic M-633C Atlas codes were purchased at the price of 115 thousand rubles. News instantly spread through the media, causing controversial public reaction.

Some argue about the paramount importance of maintaining military secrets. Another part of the public expresses displeasure at the inexplicably high cost. “Shifrofon” is reproached for its primitive functionality (not a smartphone), forgetting that every telephone has one key function. The phone must be able to call. The cryptograph, in addition to the call, must be able to keep the confidentiality of conversations. And this is the main value and purpose of the Atlas device.

On the pages of the “Military Review”, there was already a discussion of a “chiffon” for 2 thousand dollars, but, in my opinion, that discussion was conducted in the wrong plane. The scandalous comparison with cheap Chinese “analog” did not make sense. Even if among the goods from China there is an externally similar model, the very purpose of the Atlas, like its manufacturer (before renaming, NTC Atlas of the FSB of Russia), clearly indicates non-standard hardware and software of the device.

The main question of all is: how high is the cryptostability of the domestic “chiffophone”? Is he able to perform the functions assigned to him related to the protection of especially sensitive information?

In 2012-13, when it was not related to the orders of the Ministry of Defense, the “chiffon” was focused on an order of magnitude less attention. In the open press periodically appeared interviews with developers and more detailed information about M-633С. At least, this designation is found in the news of the time.

In 2013, in an interview with the newspaper “Izvestia”, Deputy Director of FSUE “Atlas”, Alexander Alferov, commented on the decision to purchase encryption systems for Roscosmos enterprises. The most unexpected was the statement about the use of foreign electronics in devices designed to conduct secret negotiations of national importance.

- The phone works in regular GSM networks, equipped with a sapphire glass, a color display and even a mp3-player. At the same time, the hardware and the operating system are completely our own development. Although, we will not hide, we use foreign element base.

(The direct link is at the bottom of the article.)

Among other features: cryptographic protection is provided only for the voice channel, SMS is transmitted in clear text. Also from the publication it becomes clear that the M-633C is supplied to various security agencies, at least from the year 2012. What is confirmed by other, earlier information about the purchase of “spy cell phones” for the Investigative Committee of Russia (see the link).

In this regard, as a person who is inexperienced in the field of cryptographic protection and information security, I have two interrelated questions.

1. How safe is the use of foreign-made chips in domestic code numbers designed to negotiate secret topics?

2. If the "stuffing" does not matter, and it can be safely purchased in Taiwan, then what is the point of such a cipher phone? If cryptographic protection is provided by a special program, then why not install it as an application on any smartphone.

From the description of “Atlas” it is clear that it is not intended for making calls on the battlefield, where there is no mobile communications. Moreover, any mobile connection is not suitable - for the work of the “spy phone”, only “Megaphone” is required. M-633С is designed for daily use in conventional GSM networks. Any exceptional technical capabilities, signal strength, range of work or computational capabilities, it is not different. The only difference from other mobile phones and smartphones is call encryption.

In the civilian market there are many available (and free) applications for secure information sharing. Among the most famous are: Signal (rumored to be cooperating with the US authorities), Silent Phone (quiet phone, a hint is clear), WhatsApp (standard description: end-to-end encryption), domestic Telegram and a great variety of monotonous Chat Secure, SecureChat, etc. Available for any smartphones and working on any platforms.

(Not an advertisement!)

Most secure messengers use end-to-end encryption technology, in which the keys for decryption are available only on two devices on which the connection was made. Keys are used only once, and with each new session, new ones are automatically generated. The seriousness of the level of concealment of information in these programs is evidenced by the loud altercations of their creators with state structures around the world.

US authorities tried to bribe the creators of Telegram.

- News, 2017 year.

Obviously, the all-seeing and terrible NSA simply did not have enough capacity and computing power to decrypt messages.

Returning to the domestic cipher telephone with Taiwanese electronics, we note: really, the FSUE “Scientific and Technical Center Atlas” could not create a set of secure applications for negotiation and text messaging? Of course, without placing them in the public domain (AppStore). Access and download of such applications - only from secure servers of state structures.

As practice demonstrates, this is the most obvious, simple and quite effective solution.

Approximately the same opinion is shared by State Duma deputy, member of the security committee Ilya Kostylev. In his opinion, in modern conditions the protection of contextual analysis of conversations is more important. Foreign intelligence does not have the opportunity to listen to each one individually, but they are able to analyze thousands of keyword calls, getting a large-scale picture of what is happening. In this direction it is necessary to build protection.

“It is easier to use ordinary cell phones by checking their special equipment and installing encryption programs. So did the Ministry of Defense. It is much cheaper. And there will be many such phones to give out to a sufficiently large circle of employees. And in remote places it is better to use satellite communication in general ”, - expert stressed (2013 year).


In other words, five years ago, when Atlas was a "novelty" and only appeared on the market of secure communications, the Ministry of Defense was not interested in acquiring such devices. The expert speaks about the usual mobile phones with special programs. Now, after five years, the opinion of the Ministry of Defense has changed dramatically.

The production of the same model of a chiffon over at least 6 years can hardly contribute to maintaining the required level of security. Over the past years, US intelligence probably had the opportunity to study the element base, having received information and samples of "secret" chips directly from the manufacturer.

We do not deny the importance of conducting confidential negotiations, but the listed features and story the emergence of M-633 “Atlas” is alarming for the preservation of state secrets.

Links to materials:
https://iz.ru/news/553727
https://vpk.name/news/74355_sledstvennyii_komitet_pokupaet_shpionskie_mobilniki.html
65 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +14
    5 March 2018 06: 41
    It is always amusing to observe when a person who has no idea what the matter is trying to hide his denseness behind clever words wink
    1. +12
      5 March 2018 07: 23
      I agree. Who else would say to the author that in the world, in addition to smartphones, there are also phones, and, horror, not on an android. And on some there is not even Java, and applications are not installed. :)
      PS: I myself use an old "brick" that can’t call anything, but keeps charging - be healthy. And I have nothing more from phone Do not need. What is such a whatsap matsap ?! No, I don’t know, I haven’t seen :))))
      1. +3
        5 March 2018 07: 40
        I recalled the joke of Yulia Mikhalkova from Ural Dumplings: "What is your car? And I have a little red one" lol
    2. +3
      5 March 2018 12: 51
      the article says
      Obviously, the all-seeing and terrible NSA simply did not have enough capacity and computing power to decrypt messages.
      Returning to the domestic cipherphone with Taiwanese electronics, we note: were the Atlas Research and Technology Center FSUEs unable to create a set of secure applications for negotiating and exchanging text messages? Of course, without posting them in the public domain (AppStore). Access and downloading such applications - only from secure servers of government agencies

      complete nonsense about access "only with protected". sooner or later software will be taken
      but, if there is nothing besides the normal encryption algorithm in it, it is useless to download.
      there are some old ways of quite serious protection
      the first is banal table encryption. Previously, keys of 4-8 characters were suitable, now more or less resistant keys should be no shorter than 15-18.
      the second method is recursive sequence computation using tricky functions.
      the third method is the indirect storage of parameters and their implicit use, when there is some basic algorithm that only acts as a facade and on its basis a background algorithm works that uses implicit system changes. For instance,
      you make on sql some kind of query of type select * and then use the function of the number of lines of the result or other execution status.
      Options to make a persistent open mass algorithm.
      1. +2
        5 March 2018 13: 17
        Quote: yehat
        Options to make a persistent open mass algorithm.

        The problem is not to make an algorithm. The problem is to prove its resistance to compromise.
        There is a good book, Introduction to Cryptography, ed. V.V. Yashchenko. The basics that eliminate many illusions are there. By the way, there is also an excerpt from the classic article by Claude Shannon, "Theory of communication in secret systems."
        1. KCA
          +1
          6 March 2018 01: 25
          The Military Ticket is recorded as a ZAS T-219 specialist, but the ZAS specialist is small, but Starley talked about the Flywheel, a ring of 256 characters, a selection of one character, 256 characters on it, a selection of 1, 256 characters on it again , sampling by the 1st, and so you can loop any number, at least 100500 times, in the beginning of the 90s, flight missions for ICBMs were transferred to the R-161 via the Flywheel, the encryption period was a week, a month and forever, well, forever, probably , conditionally, just decryption took so much time that the data lost its relevance
          1. +3
            6 March 2018 04: 17
            A good illustration of the compromising algorithm is the story told by the famous hacker Kevin Mitnik in his book. The story of how a group of university-educated hackers cracked slot machines. The story dates back to the advent of handheld computers.

            They bought several of these machines and figured out their scheme. It turned out that a pseudo-random sequence of more than 2,5 billion combinations was used there. Those. after 2,5 billion combinations, card draws began to repeat. Further, the big-headed guys developed a program that, in a short sequence, determined where in the ring a particular machine is located at a given time. For the American model, the length of this sequence turned out to be 9, for the Japanese 11. A program was created for a handheld computer that solves a system of equations of this order. Next, the game with a gun was reduced to a simple scheme. 9 (11) times the machine was launched and the sequence of cards drawn was entered into the computer. He solved the system of equations within a few seconds, after which he gave out the exact one! a sequence of cards in this machine for any number of moves forward. How do you like playing blackjack (our name is “twenty one” or “point”), if you know which cards will be drawn next?
            1. KCA
              0
              6 March 2018 05: 24
              The biggest problem of electronics and programming is getting a truly random number, all options for getting a random number are pseudo-random, there is a dependence on the software algorithm and electronics, with sufficient desire, time and funding, this dependence can be calculated
              1. 0
                6 March 2018 07: 19
                Quote: KCA
                true random number

                The main random number generator is a person. In the algorithm for calculating the number, you can use the time between previous clicks, the trajectory of the mouse, etc.
                1. KCA
                  0
                  6 March 2018 08: 37
                  Yes, it’s not necessary at all, the RND operator can be used without any human intervention at all, a loop repeating after n seconds, where n is also RND, but still this is not pure random
                  1. +1
                    6 March 2018 08: 45
                    Quote: KCA
                    repetition after n seconds

                    RND can be done at least RND once every RND seconds. This will still be a pseudo-random number.
                    There are hardware random number generators (quantum for example), but this is a different level, something similar is probably used in this phone.
                    And using a person as a generator is the easiest and most affordable way.
                    1. KCA
                      +1
                      6 March 2018 08: 55
                      Yes, there is no random number generator so far, before quantum computers in the USSR there were three-digit computers, yes, no, or, but they did not give true randomness, this is a problem for everyone and everything, its solution is impossible
          2. +1
            6 March 2018 04: 43
            Quote: KCA
            The Military Ticket is recorded as a specialist of ZAS T-219, but a little specialist of ZAS

            It would be nice sometimes to turn on the brain and think what is possible and what is not worth telling on the Internet.
            1. KCA
              +1
              6 March 2018 05: 20
              T-219, I hope, has already been decommissioned everywhere, in 1992 it was a rare trash, but I just saw the Flywheel, I never even pressed a button, all I can say about it are just words
              1. 0
                7 March 2018 11: 16
                T-219 and T-217 machines are analog. Information is difficult to decipher when all combinations are equally probable.
  2. +1
    5 March 2018 07: 20
    And to whom is this Taiwanese manufacturer of chips ... a company owned?
  3. +7
    5 March 2018 07: 21
    The main question of interest to everyone is how high is the cryptographic stability of the domestic “cipherphone”? Is he capable of fulfilling the functions assigned to him related to the protection of sensitive information?
    Any hidden connection has such an indicator as guaranteed durability, and the higher it is, the higher the level of secret information on it can be transmitted. In any case, that the developers and the operators proceed from the fact that sooner or later, but the adversary will be able to read what they were talking about, but whether the information transmitted through such communications will be relevant by that time. So, in addition to protecting communication lines, a lot depends on who uses this connection and how. Whatever happens as in the first years of the war, when neglect of the basic rules of cipher correspondence at the middle headquarters of the Red Army helped the Germans break our code.
    1. 0
      5 March 2018 10: 53
      Whatever happens as in the first years of the war, when neglect of the basic rules of cipher correspondence at the middle headquarters of the Red Army helped the Germans break our code.

      What code did the Germans reveal? As far as I know, the Germans could not listen to special communications until the end of the war.
      1. +1
        5 March 2018 11: 50
        Quote: glory1974
        What code did the Germans reveal?

        Our army, division, regiment used in the unit, and not only them, thanks to the help of the Germans who sent them captured Polish specialists, the Japanese also succeeded.
        Thanks to joint actions, by 1940 the Communications Intelligence Group of the Kwantung Army was able to decrypt the Soviet four-digit codes used in the Red Army, and also effectively track the change of keys to codes and ciphers. In addition, by the spring of 1941, a specialized department of Air Force codes could decode the encrypted traffic of the Soviet Air Force during air maneuvers on Lake Baikal.

        So not only that:
        During the Soviet-Finnish War (1939-1940), Sweden successfully decrypted the messages of the USSR and helped Finland. So, for example, during the battle of Suomussalmi, the successful interception of messages about the advancement of the Soviet 44th Infantry Division helped Karl Mannerheim to send reinforcements in time, which became the guarantee of victory. The successful decoding of the bombing orders in Helsinki often enabled the air strike warning system to be turned on even before the aircraft started from the territory of Latvia and Estonia.
        1. +2
          5 March 2018 12: 39
          it was inevitable - the average level of education was too low in the Red Army even in the command staff.
          1. +2
            5 March 2018 12: 45
            Quote: yehat
            it was inevitable - the average level of education was too low in the Red Army even in the command staff.

            Well, the encoders did not type with two classes. During the investigation of the incident and on the basis of documents seized from the Germans, I concluded that in several cases the encryptors used the same code groups, although they had to change each time, thanks to this the Germans felt for the key. This is pure unprofessionalism and carelessness.
            1. +3
              5 March 2018 13: 03
              it is impossible to stupidly follow the instructions, to constantly follow them, if you do not understand what is happening. And understanding requires education. Let them not even understand the essence of encryption - to understand at least the importance of following instructions.
              therefore I say - a low level.
              If even direct orders from the center were not followed, what about instructions?
      2. 0
        7 March 2018 11: 39
        Then they thought that if they say “HF”, then it is impossible to eavesdrop on a conversation.
        1. 0
          7 March 2018 14: 20
          Then they thought that if they say “HF”, then it is impossible to eavesdrop on a conversation.

          It was so at that time.
  4. +5
    5 March 2018 07: 24
    If you talk on the phone using obscene language, then no decryption becomes absolutely not feasible task ...
    1. +8
      5 March 2018 07: 45
      Quote: Vard
      If you talk on the phone using obscene language, then no decryption becomes absolutely not feasible task ...

      http://militaryhistory.livejournal.com/23704.html
      "Order Transfer Rate
      military history
      January 15th, 2012
      When analyzing World War II, American military historians discovered a very interesting fact. Namely, in a sudden clash with the Japanese forces, Americans, as a rule, made decisions much faster - and, as a result, even superior enemy forces won. Having studied this pattern, scientists came to the conclusion that the average word length for Americans is 5.2 characters, while for the Japanese 10.8. Consequently, it takes 56% less time to issue orders, which plays an important role in a short battle. For the sake of "interest", they analyzed Russian speech - and it turned out that the length of a word in Russian is 7.2 characters per word (on average), but in critical situations, the Russian-speaking command personnel switches to profanity - and the word length is reduced to (!) 3.2 characters in the word. This is due to the fact that some phrases and even phrases are replaced with one word. For example, the phrase:
      32-oh - I order to immediately destroy the enemy tank firing at our positions -
      32nd - XXX for this XXX! "(Self-censorship laughing , original source)
      1. +4
        5 March 2018 13: 08
        the Japanese also have short and concise forms of communication.
        "shoot" - ute, hold on - oss, etc.
        there the problem was different - the failure to fulfill traditions or rituals - this is a setup that the Japanese could not allow. For example, sometimes to raise morale or to convey the meaning more fully, it is customary to pronounce words with howls - and a short phrase of 2 syllables turns into a half-minute and rather howling sound.
        not language prevented them.

        another example - an error occurred due to a misunderstood short context.
        for a Japanese, this means that he is careless in communication with his comrades and sucks,
        who is not worthy of friendship, trust, or some kind of sane communication
        with all the consequences. Therefore, the Japanese very often slides on clarifications.
        and again the speech lengthens.
        And in European culture tolerance for schools is higher.
      2. 0
        8 March 2018 12: 37
        mate in the army by order they say banned, how so? and how to fight now?
        1. 0
          28 June 2018 08: 12
          Yes, no order
          1. 0
            28 June 2018 17: 30
            not the right word, the level of combat readiness is declining :)
  5. 0
    5 March 2018 08: 29
    let's live in a world where no one will have secrets from others, science fiction? depends on ourselves, do you personally need stealth ??
    1. +3
      5 March 2018 09: 21
      Quote: Salute
      let's live in a world where no one will have secrets from others, science fiction? depends on ourselves, do you personally need stealth ??

      Praemonitus praemunitus - “forewarned - means armed” (Winged Latin expression).
      In war as in war.
    2. +5
      5 March 2018 09: 37
      Quote: Salute
      let's live in a world where no one will have secrets from others, science fiction? depends on ourselves, do you personally need stealth ??

      In modern game theory, providing the enemy with any reliable information about themselves leads to weakening of their own positions. This is mathematically proven.
  6. +3
    5 March 2018 08: 36
    Not enough information. What can be distinguished. Only the speech signal is encrypted, it is encrypted directly in the device. The radio signal is no different from unencrypted. That means linking to only one operator looks strange - the detective drank it. It is encrypted directly in the device, no matter how severely this is done, but it must be decrypted on the fly with the same device. Which greatly limits the capabilities of the system. Even if the encryption / decryption device is not standard and can not be bought on Ali for $ 0,1, does it cost 114 p? The remaining 000 p is the device itself. Yes, it seems that even the patriotic Elbrus from Taiwan do not cost so much. Well, it means they sawed a little more.
    So what can really cost so much money? A certification from the FSB, etc. all sorts of. Well, it's legalized drank. But something is a bit much.
    A mobile phone is not a field walkie-talkie, therefore, to say that the information taken from it quickly becomes outdated is incorrect. In addition, somewhere in our logs still settle, so that we continue to have positioning, for example, and according to Yarovaya, the audio recording may settle. This creates the broadest opportunities for the work of all kinds of bad people.
    1. +2
      5 March 2018 09: 12
      This is an attempt to tell what the author has no idea of. Therefore, your attempt to isolate something failed. It was developed by specialists who are not a couple to us.
      Who can talk about the phone is his developers, but he. It is unlikely that they will chat.
      I wonder what kind of toys are there?
      1. +2
        5 March 2018 09: 25
        it was developed by specialists not like us
        But they did not develop the laws of physics (fortunately).
    2. +3
      5 March 2018 10: 12
      Quote: groks
      Only the speech signal is encrypted, it is encrypted directly in the device.

      The signal is encrypted in the device, encrypted on the fly. It is decrypted there. The cipher, of course, is strictly confidential. Only one operator can transmit an encrypted signal.
      What else? Oh yes, this is not a walkie-talkie, so the level of resistance is certainly less.
      Well, of course, all this pleasure works on an element base different from ordinary phones, they also cost not 5 kopecks. kilogram. The series are small, so the price tag is naturally large.
    3. +2
      5 March 2018 10: 28
      Quote: groks
      That means linking to only one operator looks strange - the detective drank it.

      Quote: groks
      In addition, somewhere in our logs still settle, so that we continue to have positioning, for example, and according to Yarovaya, the audio recording may settle.

      Any exclusive is worth the money. Because it requires costs from the operator. Including protected logs.
      Paying it to all operators is not particularly reasonable.
      1. +3
        5 March 2018 11: 39
        all this pleasure works on an element base different from ordinary phones
        Why's that? More precisely - why? This will not help in the matter of encrypting the audio signal. At the level of a mobile operator, the signal is completely normal. Otherwise, the mobile operator had to install additional equipment to work with this signal.
        Any exclusive is worth the money. Because it requires costs from the operator. Including protected logs
        Where does the assumption of protected logs come from? What is this all about?
        No assumptions needed. It is known that an audio signal is encoded in the device. How is this done technically? A device crashes into the sound path, which distorts the sound according to a certain law (not arbitrarily - we need to restore it later in the second apparatus). Only the key can be exclusive here, and everything else is just 5kop per bucket.
        1. +1
          5 March 2018 11: 48
          Quote: groks
          Where does the assumption of protected logs come from? What is this all about?

          There is a law, there are logs. Any call or message is registered there defaulted.
          If you want phones with NNNNNNNNN numbers not to be registered in the logs, or these logs should be protected so that "silent-silent" could catch spies, then you will have to pay for it.
          Quote: groks
          No assumptions needed. It is known that the audio signal is encoded in the device

          What does it have to do with it? As far as I know, the place where the call was made and its duration is recorded in the logs. If you do not want this information to be available to anyone other than specialists, pay.
          1. 0
            5 March 2018 12: 11
            1. Are we ourselves trying to merge the base of secure phones? Or has the base already been stolen by default and now we are raking logs into a corner?
            2. Spies from where all of a sudden? Do they give these phones forcibly?
            3. How is the price of the apparatus and the services of a mobile operator related?
            1. 0
              6 March 2018 12: 19
              The signal is protected in all sections of the channel.
              The price of the device is not related to the services of the operator.
              1. 0
                6 March 2018 12: 25
                The signal is protected in all sections of the channel.
                Therefore, only the voice is encrypted, but the text is not?
                1. 0
                  6 March 2018 13: 23
                  Quote: groks
                  Therefore, only the voice is encrypted, but the text is not?

                  There are other ways to encrypt text.
                  I say again: the price tag is associated with a small series of production.
                  1. 0
                    6 March 2018 13: 47
                    When encrypting a radio channel, it’s almost all the same what kind of information goes there.
                    The price tag is justified by a drink. The device is standard, produced in millions of pieces, slightly damped.
                    1. +1
                      6 March 2018 15: 25
                      Oleg, what do you smoke? I tell you for the fifth time:
                      Quote: groks
                      The price tag is justified by a drink.

                      The price tag is justified by a small party.
                      Quote: groks
                      The device is standard, produced in millions of pieces, slightly damped.

                      The device is non-standard, it is produced by a couple of hundred pieces per year.
                      Do you seriously think that Atlas is the only such device produced in the world? Yes, he is not the only one even in our country. And they all have such a price tag. And the main reason for the price tag is a small batch.
                      1. 0
                        6 March 2018 18: 07
                        The device is completely standard, otherwise a mobile operator could not work with it.
                        Since we do not produce accessories for phones, the phone can only be Chinese. Therefore, the price bullied 100 times - drank. Its non-standard in a simple scrambler embedded in the audio channel. Weaning is carried out in a completely legal way - “for certification”.
                      2. +1
                        7 March 2018 09: 04
                        Quote: groks
                        The device is completely standard, otherwise a mobile operator could not work with it.

                        The phone is non-standard. In closed mode, it can work with only one operator.
                        Quote: groks
                        Since we do not produce accessories for phones, the phone can only be Chinese.

                        The phone is made in Russia.
                        Quote: groks
                        Therefore, the price bullied 100 times - drank.

                        This is a small party.
                        Quote: groks
                        Its non-standard in a simple scrambler embedded in the audio channel.

                        Not easy. Are you a design engineer designing ciphers that have such aplomb?
                        Quote: groks
                        Weaning is carried out in a completely legal way - “for certification”.

                        Weaning money is a robbery. And everyone takes certification.
                        Before shouting "hold the thief", you should at least a little get acquainted with the so-called "object")
    4. 0
      8 March 2018 12: 42
      the signal is encrypted in a GSM phone, and decrypted in the base station, because it goes further by wire and can come to a regular fixed-line telephone, if it goes to a mobile phone, it is encrypted again in the base station. and the use of only a megaphone is due to the fact that only a megaphone received a license for a special signal encryption algorithm (which is broadcast) ....
  7. +5
    5 March 2018 11: 00
    Atlas phones have been used since the beginning of the 2000's. I remember before they cost 3 000 dollars. With our money it was 90 000 rubles. Now they have fallen in price, only 2000 bucks, in rubles have become more expensive, but not critical.
    In 2005, when the militants tried to capture Nalchik, they disconnected all cellular communications. Nothing worked except the Atlas phones, which were controlled. The militants were deprived of cellular communications, and you won’t especially talk to VHF radio stations in the city. This was probably the first example of the successful use of these phones.
  8. 0
    5 March 2018 11: 45
    Is he on android or iOS?
    Can I go out into the YouTube?

    Or is it the Nokia 3310 2018 model year? For 115. thousand.
    1. 0
      6 March 2018 12: 09
      Quote: win9090
      Is he on android or iOS?

      Own system.
      Quote: win9090
      Can I go out into the YouTube?

      No.
      Quote: win9090
      Or is it the Nokia 3310 2018 model year? For 115. thousand.

      This is not Nokia.
      Any more silly questions?
      1. 0
        6 March 2018 17: 45
        Thank you, it means useless trash.
        1. 0
          7 March 2018 09: 07
          Quote: win9090
          Thank you, it means useless trash.

          It's not the same for everybody wink
      2. 0
        8 March 2018 17: 51
        In fact, Nokia is no longer there, but there is a Chinese fake. How can we talk about Nokia 3310 if there is only a name left from Nokia, and so much the same as that of an electric lamp and a kerosene lamp?
    2. 0
      8 March 2018 12: 43
      without OSes, just a phone!
  9. +2
    5 March 2018 11: 47
    In the civilian market there are many available (and free) applications for secure information sharing. Among the most famous are: Signal (rumored to be cooperating with the US authorities), Silent Phone (quiet phone, a hint is clear), WhatsApp (standard description: end-to-end encryption), domestic Telegram and a great variety of monotonous Chat Secure, SecureChat, etc. Available for any smartphones and working on any platforms.
    Unfortunately, the platforms themselves are vulnerable to hacking and may have spy bookmarks.
    There is a similar commercial product from Kaspersky on the market. They thoroughly "peralapati" the android, making it as safe as possible. The phone price from Kaspersky is even higher.
  10. +2
    5 March 2018 14: 59
    As for me, the main question is which systems to use to protect the information space from penetration from such articles and such authors.
  11. +2
    8 March 2018 17: 43
    marline,
    In our country there is no production of electronic components. None at all. And even more so - for cellular communications. Take Chinese ICs, put them on Chinese boards we have manually - cheating and popip. Already for this it is necessary to plant. Because in which case it will stop working, regardless of the place of assembly. This is a crime, for this it is necessary to shoot.
    I’m just an electronic engineer with over 30 years of experience, so that's it. Yes - certification is robbery. Phone with a primitive scramble for 115t.r. - drank the budget.
    Who introduces it - scum and the enemy. By analogy, a delegation of the military comes to Stalin in the year 40 and offers to buy a cryptographic machine from the Swedes, such as the famous Enigma, happily reporting that the Germans have already bought it.
    1. 0
      9 March 2018 16: 11
      Quote: groks
      I’m just an electronic engineer with over 30 years of experience, so that's it. Phone with a primitive scramble for 115t.r. - drank the budget.

      There is no primitive scrambler.
      I understand that you have 30 years of experience. However, you are unlikely to design and build devices with secure communications, so stupidly do not know the specifics. At the same time, your aplomb is simply amazing.
      Yes, the cost of iron, of course, is not 115 tr. - this is absolutely understandable (but not 5 kopecks., as you say, this is not a standard and the protection system there is better than a “primitive scrambler”).
      And now, if a couple of hundred phones are produced, and a couple of dozen people are engaged in production, then why are you going to pay them s / n? And the cuts have nothing to do with it.
      1. +1
        9 March 2018 16: 41
        There is no primitive scrambler.
        There can be nothing serious about energy. There is no suitcase with batteries and a system unit for processing? No. That's all stupidly specific.
        Again. In our country there is no production of electronic components for the SS. And indeed, almost nothing remained. No one also makes boards for them. The Chinese can sell the loose powder, but what for manually sculpt it on a Chinese board to get a Chinese board with Chinese components five times more expensive ?! This is a crime. If we take a ready-made phone, then installing a scrambler consists in installing it in a gap in two places and soldering the two ends of the power supply. But this is again a crime, since we also do not produce scramblers and it’s cheaper to order everything at once in China.
        Total Main thought. Manually collect at least 100, at least 100, nothing. Instead of collecting the Chinese, the Chinese apparatus was already drunk.
        1. 0
          26 March 2018 08: 41
          Quote: groks
          There can be nothing serious about energy.

          Not so much in energy.
          Quote: groks
          No one also makes boards for them.

          Boards do with us. Some of the components for sure, too.
          Quote: groks
          Main thought. Manually collect at least 100, at least 100, nothing. Instead of collecting the Chinese, the Chinese apparatus was already drunk.

          The device is similar to Chinese only in appearance.
  12. 0
    8 March 2018 17: 43
    Quote: realist
    mate in the army by order they say banned, how so? and how to fight now?

    Thank God we have a peaceful environment, but about: "how to fight now," but reality itself will show
    How many orders were often forgotten by the publishers themselves
  13. +1
    8 March 2018 17: 52
    Quote: Curious
    As for me, the main question is which systems to use to protect the information space from penetration from such articles and such authors.

    It is said
  14. 0
    8 March 2018 17: 54
    Quote: realist
    without OSes, just a phone!

    The phone’s task: to transmit speech over a long distance, but as another question