Blackphone: Privacy-obsessed Smartphone

Can you hear me now? Not if you’re eavesdropping on a Blackphone. 

Privacy company Silent Circle has released a second version of its signature handheld, a smartphone designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy in the last few years (and whose results might well end up with the NSA, if the Cybersecurity Information Sharing Act passes).

Silent Circle is the brainchild of the inventor of the modestly named “Pretty Good Privacy” (PGP) encryption, Phil Zimmermann, and former Navy Seal Team Six sniper Mike Janke. In the beginning, Janke said, the Blackphone project was just a way for people working for his security firm SOC, since sold, to call home without having their communications intercepted. With its newer and easier to use model, it’s seeking industry clients in addition to individual security wonks.
“I began going around from Silicon Valley to Germany to Spain, and there just wasn’t anything,” Janke said. “I went Nato, I went to the US, to the British governments, and they all said, ‘No, we don’t know of anything,’ and I said, ‘Come on, you’ve got to have some super-secret tech,’ and they said, ‘No, it’s a big problem for us.’”
So Janke, who remembered using PGP as a Seal, sought out Zimmermann and went to work. Now, as the new iPhone and Samsung models hit the market, the Switzerland-based company, which runs a heavily modified version of Google’s Android mobile operating system, finally has support from Google.

Google didn’t support the initial software build, something that probably helped make the phone more popular, rather than less, with people concerned about NSA backdoors and data leakage. But now the tech giant is trying to break into the business software market, and that’s a sector that Silent Circle, with its subscription-based business model, has its sights set on. (The subscriptions to secure call and messaging apps that come with the Blackphone run out after a year.)
The new operating system is “about 20% Lollipop”, said CEO, Bill Conner, referring to the Android version Blackphone currently uses.

Google support is a relief to Silent Circle – in the previous version of the phone, users couldn’t download anything from the Google Play store and had to manage installation through web downloads or an old-fashioned hardware connection. The new version lets users download whatever they want and tweak its access to your data as you see fit in much the way the iPhone does – a feature Google-distributed builds of Android have notably avoided over the years.

Blackphone is encrypted end to end, if both people on the line are using either the phone itself or Silent Circle’s call and messaging apps. If someone tries to break into a Blackphone call, they’ll get a notification and the call will drop.
“But let’s say I have my Blackphone and I left my jacket at a hotel in Paris and they have a big, old landline and I’m calling from New York,” said Janke.
“I dial their number and I’m encrypted all the way from New York to the Paris public switch telephone network, and then I’m open to them,” he explained. “It’s either encrypted completely end-to-end, or encrypted to the public switch network and then open from there.”
Janke said he still hopes Google will adopt some of Silent Circle’s own features: “We hope that Google will federate some of the capabilities [of our phone],” he said. “They’ve got [support for multiple personas] in Android that’s coming out now. The problem with it is that it still leaves data across those spaces and the spaces aren’t segregated all the way down to the chip.”

Guardian:http://http://bit.ly/1VPGYMg

 

 

« The Blockchain Might Be The Next Disruptive Technology
Best Practices for Cybersecurity Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.