CryptoPhone Use RocketedAdded: Thursday, April 10th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Regardless of the price tag, the makers of cryptophones are obviously flourishing from providing services that allow to make it impossible for the National Security Agency spooks to decode your calls. Mobile security experts point out that, for instance, the GSMK CryptoPhone is a bright example of what is going on in the industry.
The developers explain that the CryptoPhone is based on Samsung’s Galaxy S3 handset with an extra Android ROM which allows encrypted calls, disables location tracking, and provides zero-knowledge encryption keys that won’t ever leave the device. This device will cost you $3,500, including 2 years of secure service.
The makers of GSMK CryptoPhones were among the first businesses to take advantage of the fact that the CPU performance of mobiles was sufficient enough to provide strong real-time voice encryption. For example, the company offers such feature as Zero-Knowledge. Its solutions are absolutely anonymous, and nobody, including the company selling the device and providing the service, will know who is using it. In addition, the CryptoPhone generates unique keys from static noise, which never leave the device and can’t be accessed by either the company or the user, thus making it impossible to share them.
Edward Snowden is recognized as the phones most successful marketer: after he started leaking NSA files in 2013, GSMK’s sales boomed. At the moment, there are over 100,000 CryptoPhones in use – hopefully, not all of them are used by murders and terrorists.
Aside from just the phones, the company can also offer satellite, landline, and PBX, all interconnected – this can provide full security at corporate level. Of course, this can be a perfect choice for anyone who doesn’t want government listening in on their calls, but not all of them are innocent companies that just try to protect themselves. Obtaining a satellite link, terrorists also have the perfect method to organize a raid from across the world with nobody finding out about it.
Posted by: Date:
Thursday, April 10th, 2014
|posted by (2014-04-10 17:22:53)|
|i would like to see contracts in dodgy areas "NOT" being spied on ...|
|Let's get this straight- Edward Snowden did NOT 'leak' anything. He blew the whistle on criminal(treasonous) activity and provided *journalists* with documentation to prove it. These journalists have done expose articles informing the public about this activity. A 'leaker' would have sold it all to the Russians and gotten killed on his way out of the country.|
And let's hope the NSSA hasn't had an agent in the company putting security holes in the encryption yet. If that doesn't work they'll get IBM or some other company like Microsoft to dig up(or buy) a patent that is vaguely similar and sue them out of business(even if it's a bogus case).
|3'500 a Phone! Bargain i'll take two|
|What is the ROM they are using. Any leaks?|
|Sorry Idon't anderstand !|
|Interesting! wish have a CryptoPhone.|
but the price is too high.
|posted by (2014-04-12 03:27:37)|
|anyone know if the ROMs are open source?? possibly living on GitHub??? cause that would be freakin awesome to tinker with my old androids and see if a hobbyist could make something close to what they're selling for 3500 (USD?)|
??rape?? I think so...
|I personally would not pay such stupid money Blackphones are not that price and they offer more than just 2 years contract with silent circle.|
|That's the pro`s and here`s the cons:|
Blackphone comes unlocked and features several pre-installed privacy tools, all of which are fully enabled for at least two years of usage. These tools include the Silent Circle suite of apps, including Silent Phone, Silent Text, and Silent Contacts; anonymous search, private browsing, and VPN from Disconnect; and secure cloud file storage from SpiderOak. In addition, Blackphone ships with the Smart WiFi Manager from Mike Kershaw, Chief Architect for SGP Technologies, and a powerful remote-wipe and device recovery tool.
That’s great. But as Matt Weinberger points out in CITEWorld, “Blackphone primarily secures data at the application level, which means that a dedicated hacker could take advantage of any given zero-day vulnerability [previously undiscovered flaw in the code] to get into your data.” What that means is anything other than the apps, such as the phone’s internal hardware that it uses to communicate with cell towers, is up for grabs.
Sebastian Anthony at ITProPortal explains: “Your phone’s baseband—the device that handles negotiation with cell towers and other messy stuff—is essentially a black box, with its own CPU and operating system. The baseband has complete, low-level access to your microphone—access that the Blackphone cannot mitigate against. If the NSA really wants to tap your phone, that is probably the attack vector that it would use.”
The makers of Blackphone are well aware of this. “We have a bit of a problem with the press saying that the Blackphone will make you NSA-proof. If someone [at the Blackphone booth] tells you that it’ll protect you from the NSA, I’ll fire them,” Phil Zimmermann, one of the Blackphone’s creators, told Anthony.
The dangers of feeling secure
Zimmermann may need to try harder to get his message heard, starting with his website. Blackphone is being sold for a hefty $629 (plus delivery) as a secure, or at least privacy-enabling, device. “Keep your communications private without extra effort,” the phone’s site declares. “Be confident in your personal communications.” Yet it is this confidence that is most dangerous. The assumption of privacy, or security, means users lower their guard. To those most likely to need a Blackphone—top-level executives, corporate lawyers, government lawyers, criminals—feeling more secure in what remains a vulnerable device can be a fatal mistake, and not just to the NSA. Sophisticated criminals too understand that there remain vulnerabilities.
It is a similar argument to the one presented when Britain imposed a blanket ban on pornographic (and increasingly other) material online as a way to protect children from the depravities of the internet. Such filters provide a false sense of security, lulling parents into thinking they no longer need to monitor their children’s online behavior because the government is doing it for them. Similarly, just because some aspects of your communications are more secure with Blackphone’s apps and services, it doesn’t mean that the phone is invulnerable. Getting that message out will be crucial to the phone’s success, and that of other secure services in the future.
|posted by (2014-04-12 15:01:17)|
|3500 usd = 2091.6 GBP = 2520.35 EUR|
|Blackphones= 629 usd or 453 euros|
|where there's a will there's a way no matter how secure a thing is any determined intelligent cracker will get in as has been demonstrated with Pentagon locks all the way through to supposedly secure mainframes,it would always prove prudent to assume there is no safe form of communication or transport through any device and at best one can assume there is a more than normal level of security but not an infallible one.|
|If Edward Snowden was a German in late 30's Germany he would have saved many tears from grieving mothers.|
bkwsu.com free meditaion course
Most Popular Stories