GSMK Cryptophones have encryption you can trust. Using 4096 bit Diffie-Hellmann (Key Exchange) and AES 256 and Twofish for Voice and Data. There are no backdoors, verifiable by independent researches.
The use of wiretapping has become so widespread, simple and uncontrolled that you must assume that records of your private calls and SMS end up in the wrong hands. Equipment for wireless interception of mobile phone calls and messages has become available at such low prices that it is deployed frequently even in comparatively small business conflicts. Encryption is approved by the National Institute of Standards and Technology (NIST) of the USA and is FIPS 140-2 Certified. Cryptophones are easy to use and a trustworthy solution for confidential phone calls and messages and includes a secure phone book container.
But protecting your information with strong and trustworthy encryption has become difficult. “Proprietary” or “secret” algorithms of dubious quality, and encryption that is too weak to protect against modern computing power are commonplace in the telecommunications market. These weaknesses are masked by marketing efforts, suggesting that you need to rely on “the secrecy of the algorithm” or “government classification” – certified by the same intelligence agencies that are actually in charge of telecommunications interception.