SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
PrivateGSM Demo
Quick Start Guide for iPhone




Demo version for evaluation only
NOT FOR SALE: the PrivateGSM version you can purchase
is sold within the Enterprise VoIP Security Suite solution.




© 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
PrivateGSM Demo                                          1



Summary




1. Some advice before you begin!                             2



2. Activation... in 2 easy steps!                            3


1 Install PrivateGSM Professional                            3
2 Launch the Automatic Setup                                 3



3. How it works                                              4


1   Invite your contacts                                     4
2   Make a secure call using PrivateGSM                      4
3   Receive a secure call using PrivateGSM                   5
4   Call phases                                              5
5   Call quality level                                       6
6   Check your security                                      6
7   Receive Only mode                                        7



4. Contacts                                                  8



                                             Quick Start Guide
PrivateGSM Demo                                                                                         2



1. Some advice before you begin!


=   Your phone calls’ security is granted by using the VoIP data line instead of the voice one.
    Under particular events, due to the VoIP network condition, it could be present a little latency.
    In the presence of a WiFi internet connection, consider to use it for a better communication quality.

= As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling.
  To save your money consider to subscribe an unlimited mobile internet data plan with your mobile
  operator.

= When making a secure call, before being connected to your contact, the system needs to exchange
  and verify the security keys. It takes a while, so you need to wait some seconds before starting the
  conversation.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                          3



2. Activation... in 2 easy steps!


1   Install PrivateGSM Professional


                                      You can download PrivateGSM Professional on
                                      your mobile from the Apple App Store.




                                         !
                                               In order to use PrivateGSM Professional,
                                               you need to have an active internet con-
                                               nection.




2   Launch the Automatic Setup


                                      After the installation, you have to choose the Auto-
                                      matic Setup in order to start making phone calls.

                                      Choose the “Automatic” mode and send the activa-
                                      tion SMS. Then, follow all the suggested steps till the
                                      “Activation successful” message.




                                         !
                                               We strongly encourage automatic set-
                                               up. Manual setup is only recommended
                                               for expert users. Some automations,
                                               designed to simplify product use, will be
                                               lost with manual setup.




                                                                              Quick Start Guide
PrivateGSM Demo                                                                       4



3. How it works


1   Invite your contacts


                                   Using your mobile address book, you can invite your
                                   contacts to join PrivateGSM.

                                   Launch PrivateGSM, tap the “Invite” icon and choose
                                   the contacts to whom you want to make secure calls.
                                   They will receive a text message including the instal-
                                   lation link.

                                   Your contacts can also download the software from
                                   the Apple App Store.




2   Make a secure call using PrivateGSM


                                   Calling using PrivateGSM is very easy; you only need to
                                   run the application, insert the number and press the
                                   green “Call” button as you would do with the official
                                   “Phone” app.

                                   It is also possible to call a contact from the address
                                   book, just tapping the “Contacts” icon at the bottom
                                   of the screen and choosing a number from the list.




                                      !
                                            To make a secure call, you and the called
                                            party must be running PrivateGSM soft-
                                            ware and be connected to the Internet.


                                                                           Quick Start Guide
PrivateGSM Demo                                                                                         5




3   Receive a secure call using PrivateGSM


                                                     Once PrivateGSM is installed, you are able to receive
                                                     a secure call.

                                                     When an incoming secure call is ringing on your
                                                     phone, PrivateGSM displays a pop up.

                                                     Once in PrivateGSM, you only need to press “Accept”
                                                     to allow the connection. The system exchanges and
                                                     verifies the security keys and then the conversation
                                                     can start.




                                                        !
                                                              To receive a secure call, you must be run-
                                                              ning PrivateGSM software and be con-
                                                              nected to the Internet.




4   Call phases

    To establish a call, PrivateGSM completes three phases, shown by three icons:




                    1. Red light: the connection is starting. This step may take several seconds.




                    2. Yellow light: ZRTP keys are being exchanged to secure the call.




                    3. Green light: secure call is established. Now it is possible to speak in a secure way.




                                                                                             Quick Start Guide
PrivateGSM Demo                                                                                    6




5   Call quality level

    Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes,
    roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above,
    changes to display the current quality level:




                   Poor connection quality.




                   Average connection quality.




                   Good connection quality.




6   Check your security


                                                  A PrivateGSM phone call is always encrypted.

                                                  When you call a contact, to verify that there are no
                                                  intrusions, PrivateGSM displays a security code, con-
                                                  sisting of two random words, to both parties.

                                                  Check the two words with your contact: if you see
                                                  the same security code, then the call is secure.

                                                  The security code is different each time you make or
                                                  receive a new secure call.




                                                                                        Quick Start Guide
PrivateGSM Demo                                                            7




7   Receive Only mode


                        As the trial period expires, PrivateGSM turns in Re-
                        ceive Only mode.

                        In this mode PrivateGSM still allows you to receive
                        secure calls for as long as the software is installed on
                        your phone, but it’s no more possible to call other
                        PrivateGSM users.




                                                                Quick Start Guide
PrivateGSM Demo                                                                                       8



4. Contacts


For additional help and more information, please visit the support section at:

http://www.privatewave.com

To contact our technical support:

Tel: +39 02 911 930 891
E-mail: support@privatewave.com

Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1)




We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the
software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed-
mobile encryption in a company network.

For more information or technical details on the Enterprise VoIP Security Suite, get in contact with
our sales team:

E-mail: sales@privatewave.com




                                                                                           Quick Start Guide

Weitere ähnliche Inhalte

Andere mochten auch

Movt patterns in holding a rugby ball
Movt patterns in holding a rugby ballMovt patterns in holding a rugby ball
Movt patterns in holding a rugby ballrrajanpt
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Pointmichael foxwell
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens házkleila83
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
BlackHat by Joclar
BlackHat by JoclarBlackHat by Joclar
BlackHat by JoclarJosep Claret
 
Primera Gala de Alumnas
Primera Gala de AlumnasPrimera Gala de Alumnas
Primera Gala de AlumnasPaula Velozo
 
These Citadel smiles are infectious!
These Citadel smiles are infectious! These Citadel smiles are infectious!
These Citadel smiles are infectious! Page Tisdale
 
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...Sabina Renshof
 
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónSEDIC
 

Andere mochten auch (19)

Intranet homepage competition
Intranet homepage competitionIntranet homepage competition
Intranet homepage competition
 
Business Coaching Cagliari In
Business Coaching Cagliari InBusiness Coaching Cagliari In
Business Coaching Cagliari In
 
Movt patterns in holding a rugby ball
Movt patterns in holding a rugby ballMovt patterns in holding a rugby ball
Movt patterns in holding a rugby ball
 
Sergata
SergataSergata
Sergata
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Point
 
Intelligens ház
Intelligens házIntelligens ház
Intelligens ház
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
BlackHat by Joclar
BlackHat by JoclarBlackHat by Joclar
BlackHat by Joclar
 
Governança e Inovação
Governança e InovaçãoGovernança e Inovação
Governança e Inovação
 
Now
NowNow
Now
 
Primera Gala de Alumnas
Primera Gala de AlumnasPrimera Gala de Alumnas
Primera Gala de Alumnas
 
These Citadel smiles are infectious!
These Citadel smiles are infectious! These Citadel smiles are infectious!
These Citadel smiles are infectious!
 
Gmg2010seminar2
Gmg2010seminar2Gmg2010seminar2
Gmg2010seminar2
 
Private gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_enPrivate gsm demo user_manual_nokia_en
Private gsm demo user_manual_nokia_en
 
Top Tips For Powerful Presentations
Top Tips For Powerful PresentationsTop Tips For Powerful Presentations
Top Tips For Powerful Presentations
 
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...Naar een veerkrachtige overheid   agile scrum en lean in organisatie verander...
Naar een veerkrachtige overheid agile scrum en lean in organisatie verander...
 
Atomosphere
AtomosphereAtomosphere
Atomosphere
 
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigaciónOvid: Recursos para el aprendizaje, para el uso clínico y de investigación
Ovid: Recursos para el aprendizaje, para el uso clínico y de investigación
 

Ähnlich wie PrivateGSM demo quickstart guide iphone_en

PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateWave Italia SpA
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox ConfigureSamsung Business USA
 
Home computer instructions
Home computer instructionsHome computer instructions
Home computer instructionspsudhars
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0Javier Gonzalez
 
Ransombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsRansombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsMartin Vigo
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB
 
7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device ManagerBTB Solution
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Tomek Cejner
 
User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)SIMANDO
 

Ähnlich wie PrivateGSM demo quickstart guide iphone_en (16)

PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_en
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure8 Steps to Customizing Mobile Devices with Knox Configure
8 Steps to Customizing Mobile Devices with Knox Configure
 
msrm .pptx
msrm .pptxmsrm .pptx
msrm .pptx
 
Home computer instructions
Home computer instructionsHome computer instructions
Home computer instructions
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Ransombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch smsRansombile: yet another reason to ditch sms
Ransombile: yet another reason to ditch sms
 
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed InfrastructureMongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
MongoDB World 2016: Do What Matters: Migrating to Self-Managed Infrastructure
 
7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager7. Product Introduction for PUMP Device Manager
7. Product Introduction for PUMP Device Manager
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Android
AndroidAndroid
Android
 
Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.Security Checklist: how iOS can help protecting your data.
Security Checklist: how iOS can help protecting your data.
 
User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)User guide - Value stream mapping simulation application part 1 (push principle)
User guide - Value stream mapping simulation application part 1 (push principle)
 

Mehr von PrivateWave Italia SpA

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiPrivateWave Italia SpA
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)PrivateWave Italia SpA
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)PrivateWave Italia SpA
 

Mehr von PrivateWave Italia SpA (20)

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 
Enterprise VolP Security Suite
Enterprise VolP Security SuiteEnterprise VolP Security Suite
Enterprise VolP Security Suite
 
Privatewave e i social network
Privatewave e i social networkPrivatewave e i social network
Privatewave e i social network
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tutti
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

PrivateGSM demo quickstart guide iphone_en

  • 1. PrivateGSM Demo Quick Start Guide for iPhone Demo version for evaluation only NOT FOR SALE: the PrivateGSM version you can purchase is sold within the Enterprise VoIP Security Suite solution. © 2005-2011 PrivateWave Italia SpA - All trademarks and copyrights are property of their respective owners. All rights reserved.
  • 2. PrivateGSM Demo 1 Summary 1. Some advice before you begin! 2 2. Activation... in 2 easy steps! 3 1 Install PrivateGSM Professional 3 2 Launch the Automatic Setup 3 3. How it works 4 1 Invite your contacts 4 2 Make a secure call using PrivateGSM 4 3 Receive a secure call using PrivateGSM 5 4 Call phases 5 5 Call quality level 6 6 Check your security 6 7 Receive Only mode 7 4. Contacts 8 Quick Start Guide
  • 3. PrivateGSM Demo 2 1. Some advice before you begin! = Your phone calls’ security is granted by using the VoIP data line instead of the voice one. Under particular events, due to the VoIP network condition, it could be present a little latency. In the presence of a WiFi internet connection, consider to use it for a better communication quality. = As a VoIP phone call, with data-packet exchanging, both the caller and the called pay for the calling. To save your money consider to subscribe an unlimited mobile internet data plan with your mobile operator. = When making a secure call, before being connected to your contact, the system needs to exchange and verify the security keys. It takes a while, so you need to wait some seconds before starting the conversation. Quick Start Guide
  • 4. PrivateGSM Demo 3 2. Activation... in 2 easy steps! 1 Install PrivateGSM Professional You can download PrivateGSM Professional on your mobile from the Apple App Store. ! In order to use PrivateGSM Professional, you need to have an active internet con- nection. 2 Launch the Automatic Setup After the installation, you have to choose the Auto- matic Setup in order to start making phone calls. Choose the “Automatic” mode and send the activa- tion SMS. Then, follow all the suggested steps till the “Activation successful” message. ! We strongly encourage automatic set- up. Manual setup is only recommended for expert users. Some automations, designed to simplify product use, will be lost with manual setup. Quick Start Guide
  • 5. PrivateGSM Demo 4 3. How it works 1 Invite your contacts Using your mobile address book, you can invite your contacts to join PrivateGSM. Launch PrivateGSM, tap the “Invite” icon and choose the contacts to whom you want to make secure calls. They will receive a text message including the instal- lation link. Your contacts can also download the software from the Apple App Store. 2 Make a secure call using PrivateGSM Calling using PrivateGSM is very easy; you only need to run the application, insert the number and press the green “Call” button as you would do with the official “Phone” app. It is also possible to call a contact from the address book, just tapping the “Contacts” icon at the bottom of the screen and choosing a number from the list. ! To make a secure call, you and the called party must be running PrivateGSM soft- ware and be connected to the Internet. Quick Start Guide
  • 6. PrivateGSM Demo 5 3 Receive a secure call using PrivateGSM Once PrivateGSM is installed, you are able to receive a secure call. When an incoming secure call is ringing on your phone, PrivateGSM displays a pop up. Once in PrivateGSM, you only need to press “Accept” to allow the connection. The system exchanges and verifies the security keys and then the conversation can start. ! To receive a secure call, you must be run- ning PrivateGSM software and be con- nected to the Internet. 4 Call phases To establish a call, PrivateGSM completes three phases, shown by three icons: 1. Red light: the connection is starting. This step may take several seconds. 2. Yellow light: ZRTP keys are being exchanged to secure the call. 3. Green light: secure call is established. Now it is possible to speak in a secure way. Quick Start Guide
  • 7. PrivateGSM Demo 6 5 Call quality level Some factors that affect the GSM network (i.e. GPRS use, poor signal, frequent radio cell changes, roaming), could decrease call quality, increasing voice delay. The “green light icon”, shown above, changes to display the current quality level: Poor connection quality. Average connection quality. Good connection quality. 6 Check your security A PrivateGSM phone call is always encrypted. When you call a contact, to verify that there are no intrusions, PrivateGSM displays a security code, con- sisting of two random words, to both parties. Check the two words with your contact: if you see the same security code, then the call is secure. The security code is different each time you make or receive a new secure call. Quick Start Guide
  • 8. PrivateGSM Demo 7 7 Receive Only mode As the trial period expires, PrivateGSM turns in Re- ceive Only mode. In this mode PrivateGSM still allows you to receive secure calls for as long as the software is installed on your phone, but it’s no more possible to call other PrivateGSM users. Quick Start Guide
  • 9. PrivateGSM Demo 8 4. Contacts For additional help and more information, please visit the support section at: http://www.privatewave.com To contact our technical support: Tel: +39 02 911 930 891 E-mail: support@privatewave.com Office hours: Monday to Friday, 10.00 AM - 12.00 PM and 2.30 PM - 4.30 PM (GMT +1) We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed- mobile encryption in a company network. For more information or technical details on the Enterprise VoIP Security Suite, get in contact with our sales team: E-mail: sales@privatewave.com Quick Start Guide