Blackphone: Privacy-obsessed Smartphone

Can you hear me now? Not if you’re eavesdropping on a Blackphone. 

Privacy company Silent Circle has released a second version of its signature handheld, a smartphone designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy in the last few years (and whose results might well end up with the NSA, if the Cybersecurity Information Sharing Act passes).

Silent Circle is the brainchild of the inventor of the modestly named “Pretty Good Privacy” (PGP) encryption, Phil Zimmermann, and former Navy Seal Team Six sniper Mike Janke. In the beginning, Janke said, the Blackphone project was just a way for people working for his security firm SOC, since sold, to call home without having their communications intercepted. With its newer and easier to use model, it’s seeking industry clients in addition to individual security wonks.
“I began going around from Silicon Valley to Germany to Spain, and there just wasn’t anything,” Janke said. “I went Nato, I went to the US, to the British governments, and they all said, ‘No, we don’t know of anything,’ and I said, ‘Come on, you’ve got to have some super-secret tech,’ and they said, ‘No, it’s a big problem for us.’”
So Janke, who remembered using PGP as a Seal, sought out Zimmermann and went to work. Now, as the new iPhone and Samsung models hit the market, the Switzerland-based company, which runs a heavily modified version of Google’s Android mobile operating system, finally has support from Google.

Google didn’t support the initial software build, something that probably helped make the phone more popular, rather than less, with people concerned about NSA backdoors and data leakage. But now the tech giant is trying to break into the business software market, and that’s a sector that Silent Circle, with its subscription-based business model, has its sights set on. (The subscriptions to secure call and messaging apps that come with the Blackphone run out after a year.)
The new operating system is “about 20% Lollipop”, said CEO, Bill Conner, referring to the Android version Blackphone currently uses.

Google support is a relief to Silent Circle – in the previous version of the phone, users couldn’t download anything from the Google Play store and had to manage installation through web downloads or an old-fashioned hardware connection. The new version lets users download whatever they want and tweak its access to your data as you see fit in much the way the iPhone does – a feature Google-distributed builds of Android have notably avoided over the years.

Blackphone is encrypted end to end, if both people on the line are using either the phone itself or Silent Circle’s call and messaging apps. If someone tries to break into a Blackphone call, they’ll get a notification and the call will drop.
“But let’s say I have my Blackphone and I left my jacket at a hotel in Paris and they have a big, old landline and I’m calling from New York,” said Janke.
“I dial their number and I’m encrypted all the way from New York to the Paris public switch telephone network, and then I’m open to them,” he explained. “It’s either encrypted completely end-to-end, or encrypted to the public switch network and then open from there.”
Janke said he still hopes Google will adopt some of Silent Circle’s own features: “We hope that Google will federate some of the capabilities [of our phone],” he said. “They’ve got [support for multiple personas] in Android that’s coming out now. The problem with it is that it still leaves data across those spaces and the spaces aren’t segregated all the way down to the chip.”

Guardian:http://http://bit.ly/1VPGYMg

 

 

« The Blockchain Might Be The Next Disruptive Technology
Best Practices for Cybersecurity Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.