Blackphone 2 Caters To the Enterprise, the Security-Minded and the Paranoid 59
Mark Wilson writes While much of the news coming out of MWC 2015 has been dominated by Microsoft's Lumia 640, the Samsung Galaxy S6 Edge, and tablets from Sony, there's always room for something a little different. Following on from the security-focused Blackphone, Silent Circle used the Barcelona event to announce the follow-up — the Blackphone 2. The privacy-centric company has been working on the "world's first enterprise privacy platform" for some time now and the second generation Blackphone. As you would expect, there's a faster processor than before -- an 8-core beast -- as well as an upgraded 3GB RAM, a larger 5.5 inch screen and a bigger battery than before. Blackphone 2 has a $600 price tag and will be unleashed in July.
Let me guess (Score:3)
Re:Let me guess (Score:5, Informative)
Gemalto SIM card?
Doesn't matter. The SIM card works on the network level. The data (voice or data) is encrypted prior to transmission onto the network layer so a compromised SIM card is no problem.
Re: (Score:3, Interesting)
I know this is the second, uh, let's-just-say-"story" about Blackphone in four days [slashdot.org], but I think it should be noted that the stolen Gemalto keys may have included "OTA keys" [bgr.com] that can be used for over-the-air SIM card upgrades [gemalto.com]:
Access to these encryption keys do not give governmental agencies only the power to monitor cellular communications, including calls and data, but they also come with additional perks, such as the power of instructing a device to install specific programs.
Spyware could be installed on
Re: (Score:2)
So apparently it does matter.
It looks like that what you're quoting concerns spyware on the SIM card, not the underlying OS on the phone/tablet.
In this discussion, the software running on the SIM card would be similar to the firmware on your cable modem. It no longer matters that your neighbors can see your traffic as long as everything you transmit is properly secured and encrypted.
I don't think so... (Score:3)
...except my cable modem does not share storage with my PC. On the other hand, the baseband and Android system (not to mention the device-specific efs/imei stuff and the user data stuff) are all located on the same emmc on many devices. (Hence the ability to "flash a new radio")
Could the baseband access or change data on the Android partitions or the efs data? I'm not sure, but the articles suggest to me that they could.
Also, my cable modem doesn't share memory with my PC [stackexchange.com] either: ....the application proc
Re: (Score:2)
Could the baseband access or change data on the Android partitions or the efs data? I'm not sure, but the articles suggest to me that they could.
I'm not sure either but if so then I sure hope that the developers of the Blackphone took precautions against that. I do agree with you that it could be a potential exploitable hole: very bad indeed!
scrt mssg (Score:1)
Y nd t s th Blckphn n rdr t s th vwls.
Privacy (Score:1)
Is it a commodity now? I'll take 10,000.
Re: (Score:2)
Privacy is the next big thing.
There's gold in them thar hills.
TFS talks about something new to the scene that will be standard issue in the future.
Re: (Score:3)
The perception of privacy is the next big thing. We've already mortgaged our privacy for beads and trinkets.
Re: (Score:2)
Re: (Score:2)
Re:But can it protect users against the Stingray? (Score:4, Informative)
Expect NSA to hack Silent Circle to obtain the keys, though...
Re:But can it protect users against the Stingray? (Score:4, Insightful)
Yes, it will protect you. The government will still be able to intercept and listen to your calls, data and text, but they will be encrypted and they will not be able to know what you were talking about. Expect NSA to hack Silent Circle to obtain the keys, though...
Oh and by the way, want to know if their hacking attempts were successful or not? That's easy to determine now.
Is any Blackphone service still legal to use?
You now have your answer.
Enjoy the illusion of privacy.
Re: (Score:2, Insightful)
On the other hand, if they actually banned something, wouldn't that attract people to that service? For example, in the 1990s, PGP got a lot of attention because it was "illegal", either due to RSA patents or ITAR penalties. Now, almost nobody uses it.
One can look at Prohibition, the War on Drugs, and as of now, the gun control fight to see how well banning something works.
Re: (Score:2)
Oh and by the way, want to know if their hacking attempts were successful or not? That's easy to determine now.
Is any Blackphone service still legal to use?
You now have your answer.
Enjoy the illusion of privacy.
Now there is an example of actual paranoia: The black and white thinking, the raising of a perceived enemy to super-human abilities.
The world is in a CRISIS over privacy right now, and there is still much to this issue that is up in the air.
Do I think the US government is capable of *trying* to censor crypto? Yes, eventually it may happen. But only if/when housing and food become much more expensive... Then you would see the (small) difference between the US government and third world dictatorships disappea
Re: (Score:3)
Yes, it will protect you. The government will still be able to intercept and listen to your calls, data and text, but they will be encrypted and they will not be able to know what you were talking about.
But if you just have mobile data, you can do all that now with a typical Android phone without even installing additional software.* Just configure IPSEC to encrypt your SIP communications (you're going to need someplace for them to go, with IPSEC, that's your problem) and then configure the SIP phone to connect to your server, and finally make your calls via SIP. If you want to go WiFi-only, you can disable the cellular antenna for added security (or just buy a device without cell support in the first plac
Re: (Score:2)
Yes, it will protect you. The government will still be able to intercept and listen to your calls, data and text, but they will be encrypted and they will not be able to know what you were talking about.
Expect NSA to hack Silent Circle to obtain the keys, though...
Looking on the Silent Circle website, it seems that there is a version for the US and a version for the ROW (rest of the the world). The ROW version 'cannot' be shipped to the US which implies that what you suggest may already be the case - at least for the US version.
Re: (Score:2)
If the Stingray is a threat to you, then I hope you're convicted of the criminal activities that make it so.
'Criminal activities that make it so' like civil rights protests and political demonstrations and gatherings?
You must share the government's views on what it would like to consider 'criminal' (basically anything it doesn't like, makes it look bad, limits government power, or interferes with the ability to confiscate and redistribute wealth as it sees fit).
Strat
Re: (Score:2)
The Stingray is not the threat.
Lack of probable cause is the issue.
Attention Seekers, too. (Score:5, Informative)
Not just for "Security minded & paranoid."
"Security minded" people either don't carry cell phones or use plain burner phones housed in tin boxes when not in use and throw them away quickly.
Re: (Score:2)
That's now.
That amateurish crap not going to be necessary.
correction (Score:2, Insightful)
Re: (Score:1)
Why do you say that? Sure, your location may be triangulated by the cell towers, but everything else can be secure.
Don't conflate "Android" with "Google".
Google's version of Android does NOT maintain a user's privacy, but that's because Google's entire business model is to scoop-up as much private data as possible about all people. (And once your data is on their servers it's only an NSL away from the Gov of the day.)
Take Google out of the picture, and Android can be an extremely secure and private mobile o
what is this (Score:3)
Re: (Score:2)
Its based on proprietary software from 3rd party vendors. (drivers at least).
Its just a marketing exercise, technically no security or privacy, at best they force their adversaries to change methods.
The Enterprise? (Score:3)
Pretty sure they don't need "phones".
LLAP
Not Paranoid Enough! (Score:2)
Re: (Score:3)
What about the non-paranoid? (Score:2, Interesting)
This company is taking advantage of the paranoid. I want a device that actually has a chance at respecting my privacy. Your not going to get that in a true mobile phone as the GSM module is going to enable big brother to track you at all times. It's just how the thing works. What we need is a device that is mass produced, cost effective (as you need significant numbers for it to be privacy friendly), and text-oriented. That GSM modem can't be always-on or they'll learn who you are by the movements you make.
Is there an SD card slot (Score:2)
Is there an SD card slot? I can't tell. Google seems to be pressuring hardware manufacturers to drop them.
Where's the source? (Score:2)
On the web page they claim to support open source etc, but their product is apparently closed source as much as possible.
They have opened the kernel and two apps, the rest is closed down.
https://support.blackphone.ch/... [blackphone.ch]
So you got to trust them to not be a NSA honey-pot or something else.
I think not.
Re: (Score:2)
They're probably not a honeypot as I trust Phil. They're also developing a secure e-mail replacement protocol (forward encryption and no open headers) that they'll release as open source after they finish it (working with the Lavabit owner on that). Now, of course, if they are genuine (Phil
Microsized.. (Score:2)
Have to take issue with the paranoid reference (Score:2)
That's not being paranoid, that's just being realistic. You could say all that paranoid stuff (and tinfoil hat stuff) several years ago, but now that we know (some of) what