Why use a Gigaset E630H Dect Cordless Phone?
If you have a craft workshop or a home with small children, you know how to handle a high-impact environment, so does the Gigaset E630 cordless phone. Surrounded by tools and equipment, or kids, challenges and disruptions are par for the course. That’s why this robust Gigaset E630H Dect Cordless Phone is splash-proof, as well as resistant to dust and shocks.
What does DECT stand for?
DECT stands for Digital Enhanced Cordless Telecommunications. It is a wireless standard that is very often used for landline phones. Wireless communication has been given a big boost thanks to the introduction of the wireless standard.
DECT is to landline telephony what WiFi is to the Internet.
How does Dect Technology works?
A DECT system always contains two components that constantly communicate with each other. The two components are a base station, also called the fixed part, and at least one handset, or portable part.
What is a DECT base station?
The base station forms the bridge between the telephone and Internet connection and the handsets. This can be in the form of a simple DECT base station with or without an answering machine or a DSL router with DECT function.
How secure are DECT calls?
Nobody wants other people to listen in on their private conversations. In 2009, a group of engineers from the Technical University of Darmstadt published information about how DECT calls can be intercepted.
This resulted in manufacturers issuing very serious security updates. The security measures involved each handset logging on to the base station using a secret key, but these were no longer sufficient.
What is the standard encryption for DECT devices?
The standard encryption for DECT devices is 64-bit. Some manufacturers also use higher rates of encryption.
Does a DECT Repeater need Encryption?
It is important to know that when using a DECT repeater, encryption will no longer be in place as it is strictly speaking a connection from handset to handset.
Various groups are continuing to look at improving security around DECT wireless signals and correcting potential security vulnerabilities.