SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
PrivateGSM Demo
Quick Start Guide for iPhone




Demo version for evaluation only
NOT FOR SALE: the PrivateGSM version you can purchase
is sold within the Enterprise VoIP Security Suite solution.




© 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
PrivateGSM Demo                                          1



Summary




1. Some advice before you begin!                             2



2. Activation... in 2 easy steps!                            3


1 Install PrivateGSM Professional                            3
2 Launch the Automatic Setup                                 3



3. How it works                                              4


1   Invite your contacts                                     4
2   Make a secure call using PrivateGSM                      4
3   Receive a secure call using PrivateGSM                   5
4   Call phases                                              5
5   Call quality level                                       6
6   Check your security                                      6
7   Receive Only mode                                        7



4. Contacts                                                  8



                                             Quick Start Guide
PrivateGSM Demo                                                                                         2



1. Some advice before you begin!


=   Your phone calls’ security is granted by using the VoIP data line instead of the voice one.
    Under particular events, due to the VoIP network condition, it could be present a little latency.
    In the presence of a WiFi internet connection, consider to use it for a better communication quality.

= As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling.
  To save your money consider to subscribe an unlimited mobile internet data plan with your mobile
  operator.

= When making a secure call, before being connected to your contact, the system needs to exchange
  and verify the security keys. It takes a while, so you need to wait some seconds before starting the
  conversation.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                          3



2. Activation... in 2 easy steps!


1   Install PrivateGSM Professional


                                      You can download PrivateGSM Professional on
                                      your mobile from the Apple App Store.




                                         !
                                               In order to use PrivateGSM Professional,
                                               you need to have an active internet con-
                                               nection.




2   Launch the Automatic Setup


                                      After the installation, you have to choose the Auto-
                                      matic Setup in order to start making phone calls.

                                      Choose the “Automatic” mode and send the activa-
                                      tion SMS. Then, follow all the suggested steps till the
                                      “Activation successful” message.




                                         !
                                               We strongly encourage automatic set-
                                               up. Manual setup is only recommended
                                               for expert users. Some automations,
                                               designed to simplify product use, will be
                                               lost with manual setup.




                                                                              Quick Start Guide
PrivateGSM Demo                                                                       4



3. How it works


1   Invite your contacts


                                   Using your mobile address book, you can invite your
                                   contacts to join PrivateGSM.

                                   Launch PrivateGSM, tap the “Invite” icon and choose
                                   the contacts to whom you want to make secure calls.
                                   They will receive a text message including the instal-
                                   lation link.

                                   Your contacts can also download the software from
                                   the Apple App Store.




2   Make a secure call using PrivateGSM


                                   Calling using PrivateGSM is very easy; you only need to
                                   run the application, insert the number and press the
                                   green “Call” button as you would do with the official
                                   “Phone” app.

                                   It is also possible to call a contact from the address
                                   book, just tapping the “Contacts” icon at the bottom
                                   of the screen and choosing a number from the list.




                                      !
                                            To make a secure call, you and the called
                                            party must be running PrivateGSM soft-
                                            ware and be connected to the Internet.


                                                                           Quick Start Guide
PrivateGSM Demo                                                                                         5




3   Receive a secure call using PrivateGSM


                                                     Once PrivateGSM is installed, you are able to receive
                                                     a secure call.

                                                     When an incoming secure call is ringing on your
                                                     phone, PrivateGSM displays a pop up.

                                                     Once in PrivateGSM, you only need to press “Accept”
                                                     to allow the connection. The system exchanges and
                                                     verifies the security keys and then the conversation
                                                     can start.




                                                        !
                                                              To receive a secure call, you must be run-
                                                              ning PrivateGSM software and be con-
                                                              nected to the Internet.




4   Call phases

    To establish a call, PrivateGSM completes three phases, shown by three icons:




                    1. Red light: the connection is starting. This step may take several seconds.




                    2. Yellow light: ZRTP keys are being exchanged to secure the call.




                    3. Green light: secure call is established. Now it is possible to speak in a secure way.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                                    6




5   Call quality level

    Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes,
    roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above,
    changes to display the current quality level:




                   Poor connection quality.




                   Average connection quality.




                   Good connection quality.




6   Check your security


                                                  A PrivateGSM phone call is always encrypted.

                                                  When you call a contact, to verify that there are no
                                                  intrusions, PrivateGSM displays a security code, con-
                                                  sisting of two random words, to both parties.

                                                  Check the two words with your contact: if you see
                                                  the same security code, then the call is secure.

                                                  The security code is different each time you make or
                                                  receive a new secure call.




                                                                                        Quick Start Guide
PrivateGSM Demo                                                            7




7   Receive Only mode


                        As the trial period expires, PrivateGSM turns in Re-
                        ceive Only mode.

                        In this mode PrivateGSM still allows you to receive
                        secure calls for as long as the software is installed on
                        your phone, but it’s no more possible to call other
                        PrivateGSM users.




                                                                Quick Start Guide
PrivateGSM Demo                                                                                       8



4. Contacts


For additional help and more information, please visit the support section at:

http://www.privatewave.com

To contact our technical support:

Tel: +39 02 911 930 891
E-mail: support@privatewave.com

Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1)




We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the
software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed-
mobile encryption in a company network.

For more information or technical details on the Enterprise VoIP Security Suite, get in contact with
our sales team:

E-mail: sales@privatewave.com




                                                                                           Quick Start Guide

Más contenido relacionado

Destacado

Movt patterns in holding a rugby ball
Movt patterns in holding a rugby ballMovt patterns in holding a rugby ball
Movt patterns in holding a rugby ballrrajanpt
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Pointmichael foxwell
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens házkleila83
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
BlackHat by Joclar
BlackHat by JoclarBlackHat by Joclar
BlackHat by JoclarJosep Claret
 
Primera Gala de Alumnas
Primera Gala de AlumnasPrimera Gala de Alumnas
Primera Gala de AlumnasPaula Velozo
 
These Citadel smiles are infectious!
These Citadel smiles are infectious! These Citadel smiles are infectious!
These Citadel smiles are infectious! Page Tisdale
 
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...Sabina Renshof
 
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónSEDIC
 

Destacado (19)

Intranet homepage competition
Intranet homepage competitionIntranet homepage competition
Intranet homepage competition
 
Business Coaching Cagliari In
Business Coaching Cagliari InBusiness Coaching Cagliari In
Business Coaching Cagliari In
 
Movt patterns in holding a rugby ball
Movt patterns in holding a rugby ballMovt patterns in holding a rugby ball
Movt patterns in holding a rugby ball
 
Sergata
SergataSergata
Sergata
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Point
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
BlackHat by Joclar
BlackHat by JoclarBlackHat by Joclar
BlackHat by Joclar
 
Governança e Inovação
Governança e InovaçãoGovernança e Inovação
Governança e Inovação
 
Now
NowNow
Now
 
Primera Gala de Alumnas
Primera Gala de AlumnasPrimera Gala de Alumnas
Primera Gala de Alumnas
 
These Citadel smiles are infectious!
These Citadel smiles are infectious! These Citadel smiles are infectious!
These Citadel smiles are infectious!
 
Gmg2010seminar2
Gmg2010seminar2Gmg2010seminar2
Gmg2010seminar2
 
Private gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_enPrivate gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_en
 
Top Tips For Powerful Presentations
Top Tips For Powerful PresentationsTop Tips For Powerful Presentations
Top Tips For Powerful Presentations
 
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
 
Atomosphere
AtomosphereAtomosphere
Atomosphere
 
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
 

Similar a PrivateGSM demo quickstart guide iphone_en

PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateWave Italia SpA
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
Home computer instructions
Home computer instructionsHome computer instructions
Home computer instructionspsudhars
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0Javier Gonzalez
 
Ransombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsRansombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsMartin Vigo
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB
 
7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device ManagerBTB Solution
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Tomek Cejner
 
User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)SIMANDO
 

Similar a PrivateGSM demo quickstart guide iphone_en (16)

PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_en
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
msrm .pptx
msrm .pptxmsrm .pptx
msrm .pptx
 
Home computer instructions
Home computer instructionsHome computer instructions
Home computer instructions
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Ransombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsRansombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch sms
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
 
7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Android
AndroidAndroid
Android
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.
 
User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)
 

Más de PrivateWave Italia SpA

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiPrivateWave Italia SpA
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)PrivateWave Italia SpA
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)PrivateWave Italia SpA
 

Más de PrivateWave Italia SpA (20)

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 
Enterprise VolP Security Suite
Enterprise VolP Security SuiteEnterprise VolP Security Suite
Enterprise VolP Security Suite
 
Privatewave e i social network
Privatewave e i social networkPrivatewave e i social network
Privatewave e i social network
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tutti
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

PrivateGSM demo quickstart guide iphone_en

  • 1. PrivateGSM Demo Quick Start Guide for iPhone Demo version for evaluation only NOT FOR SALE: the PrivateGSM version you can purchase is sold within the Enterprise VoIP Security Suite solution. © 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
  • 2. PrivateGSM Demo 1 Summary 1. Some advice before you begin! 2 2. Activation... in 2 easy steps! 3 1 Install PrivateGSM Professional 3 2 Launch the Automatic Setup 3 3. How it works 4 1 Invite your contacts 4 2 Make a secure call using PrivateGSM 4 3 Receive a secure call using PrivateGSM 5 4 Call phases 5 5 Call quality level 6 6 Check your security 6 7 Receive Only mode 7 4. Contacts 8 Quick Start Guide
  • 3. PrivateGSM Demo 2 1. Some advice before you begin! = Your phone calls’ security is granted by using the VoIP data line instead of the voice one. Under particular events, due to the VoIP network condition, it could be present a little latency. In the presence of a WiFi internet connection, consider to use it for a better communication quality. = As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling. To save your money consider to subscribe an unlimited mobile internet data plan with your mobile operator. = When making a secure call, before being connected to your contact, the system needs to exchange and verify the security keys. It takes a while, so you need to wait some seconds before starting the conversation. Quick Start Guide
  • 4. PrivateGSM Demo 3 2. Activation... in 2 easy steps! 1 Install PrivateGSM Professional You can download PrivateGSM Professional on your mobile from the Apple App Store. ! In order to use PrivateGSM Professional, you need to have an active internet con- nection. 2 Launch the Automatic Setup After the installation, you have to choose the Auto- matic Setup in order to start making phone calls. Choose the “Automatic” mode and send the activa- tion SMS. Then, follow all the suggested steps till the “Activation successful” message. ! We strongly encourage automatic set- up. Manual setup is only recommended for expert users. Some automations, designed to simplify product use, will be lost with manual setup. Quick Start Guide
  • 5. PrivateGSM Demo 4 3. How it works 1 Invite your contacts Using your mobile address book, you can invite your contacts to join PrivateGSM. Launch PrivateGSM, tap the “Invite” icon and choose the contacts to whom you want to make secure calls. They will receive a text message including the instal- lation link. Your contacts can also download the software from the Apple App Store. 2 Make a secure call using PrivateGSM Calling using PrivateGSM is very easy; you only need to run the application, insert the number and press the green “Call” button as you would do with the official “Phone” app. It is also possible to call a contact from the address book, just tapping the “Contacts” icon at the bottom of the screen and choosing a number from the list. ! To make a secure call, you and the called party must be running PrivateGSM soft- ware and be connected to the Internet. Quick Start Guide
  • 6. PrivateGSM Demo 5 3 Receive a secure call using PrivateGSM Once PrivateGSM is installed, you are able to receive a secure call. When an incoming secure call is ringing on your phone, PrivateGSM displays a pop up. Once in PrivateGSM, you only need to press “Accept” to allow the connection. The system exchanges and verifies the security keys and then the conversation can start. ! To receive a secure call, you must be run- ning PrivateGSM software and be con- nected to the Internet. 4 Call phases To establish a call, PrivateGSM completes three phases, shown by three icons: 1. Red light: the connection is starting. This step may take several seconds. 2. Yellow light: ZRTP keys are being exchanged to secure the call. 3. Green light: secure call is established. Now it is possible to speak in a secure way. Quick Start Guide
  • 7. PrivateGSM Demo 6 5 Call quality level Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes, roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above, changes to display the current quality level: Poor connection quality. Average connection quality. Good connection quality. 6 Check your security A PrivateGSM phone call is always encrypted. When you call a contact, to verify that there are no intrusions, PrivateGSM displays a security code, con- sisting of two random words, to both parties. Check the two words with your contact: if you see the same security code, then the call is secure. The security code is different each time you make or receive a new secure call. Quick Start Guide
  • 8. PrivateGSM Demo 7 7 Receive Only mode As the trial period expires, PrivateGSM turns in Re- ceive Only mode. In this mode PrivateGSM still allows you to receive secure calls for as long as the software is installed on your phone, but it’s no more possible to call other PrivateGSM users. Quick Start Guide
  • 9. PrivateGSM Demo 8 4. Contacts For additional help and more information, please visit the support section at: http://www.privatewave.com To contact our technical support: Tel: +39 02 911 930 891 E-mail: support@privatewave.com Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1) We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed- mobile encryption in a company network. For more information or technical details on the Enterprise VoIP Security Suite, get in contact with our sales team: E-mail: sales@privatewave.com Quick Start Guide