Blackphone: Privacy-obsessed Smartphone

Can you hear me now? Not if you’re eavesdropping on a Blackphone. 

Privacy company Silent Circle has released a second version of its signature handheld, a smartphone designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy in the last few years (and whose results might well end up with the NSA, if the Cybersecurity Information Sharing Act passes).

Silent Circle is the brainchild of the inventor of the modestly named “Pretty Good Privacy” (PGP) encryption, Phil Zimmermann, and former Navy Seal Team Six sniper Mike Janke. In the beginning, Janke said, the Blackphone project was just a way for people working for his security firm SOC, since sold, to call home without having their communications intercepted. With its newer and easier to use model, it’s seeking industry clients in addition to individual security wonks.
“I began going around from Silicon Valley to Germany to Spain, and there just wasn’t anything,” Janke said. “I went Nato, I went to the US, to the British governments, and they all said, ‘No, we don’t know of anything,’ and I said, ‘Come on, you’ve got to have some super-secret tech,’ and they said, ‘No, it’s a big problem for us.’”
So Janke, who remembered using PGP as a Seal, sought out Zimmermann and went to work. Now, as the new iPhone and Samsung models hit the market, the Switzerland-based company, which runs a heavily modified version of Google’s Android mobile operating system, finally has support from Google.

Google didn’t support the initial software build, something that probably helped make the phone more popular, rather than less, with people concerned about NSA backdoors and data leakage. But now the tech giant is trying to break into the business software market, and that’s a sector that Silent Circle, with its subscription-based business model, has its sights set on. (The subscriptions to secure call and messaging apps that come with the Blackphone run out after a year.)
The new operating system is “about 20% Lollipop”, said CEO, Bill Conner, referring to the Android version Blackphone currently uses.

Google support is a relief to Silent Circle – in the previous version of the phone, users couldn’t download anything from the Google Play store and had to manage installation through web downloads or an old-fashioned hardware connection. The new version lets users download whatever they want and tweak its access to your data as you see fit in much the way the iPhone does – a feature Google-distributed builds of Android have notably avoided over the years.

Blackphone is encrypted end to end, if both people on the line are using either the phone itself or Silent Circle’s call and messaging apps. If someone tries to break into a Blackphone call, they’ll get a notification and the call will drop.
“But let’s say I have my Blackphone and I left my jacket at a hotel in Paris and they have a big, old landline and I’m calling from New York,” said Janke.
“I dial their number and I’m encrypted all the way from New York to the Paris public switch telephone network, and then I’m open to them,” he explained. “It’s either encrypted completely end-to-end, or encrypted to the public switch network and then open from there.”
Janke said he still hopes Google will adopt some of Silent Circle’s own features: “We hope that Google will federate some of the capabilities [of our phone],” he said. “They’ve got [support for multiple personas] in Android that’s coming out now. The problem with it is that it still leaves data across those spaces and the spaces aren’t segregated all the way down to the chip.”

Guardian:http://http://bit.ly/1VPGYMg

 

 

« The Blockchain Might Be The Next Disruptive Technology
Best Practices for Cybersecurity Breaches »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

Rite-Solutions

Rite-Solutions

Rite-Solutions is an award-winning software development, systems engineering, and information technology firm.