backtop


Print 13 comment(s) - last by SuckRaven.. on Jul 1 at 12:51 PM

SGP Technologies claims that the Blackphone is the "world's first privacy-optimized smartphone"

We first brought you word of the Android-based Blackphone back in mid-January, and this week the smartphone is finally shipping to consumers. The Blackphone is the brainchild of SGP Technologies — a joint venture between Silent Circle and Geeksphone — and uses a customized version of Android 4.4 KitKat, which it calls PrivatOS.
 
SGP says that the Blackphone is “built from the ground up to maximize user privacy” and includes such features as private/encrypted cloud storage, encrypted voice/video calls and text messaging, Wi-Fi security settings which prevent hotspots from gleaning connection history and patterns of activity, remote wipe, and private web browsing.
 
"Blackphone's arrival puts mobile privacy directly in the hands of professionals and consumers everywhere,” said SGP Technologies CEO Toby Weir-Jones. In a world where devices and apps increasingly offer features only in return for users' personal or sensitive information, the pent-up demand for Blackphone shows there is strong, international demand for our brand's devices and services that stand apart by placing privacy before all else."

 
The Blackphone comes equipped with a 4.7” 720p IPS display, 2GHz, quad-core NVIDIA Tegra 4i processor with 1GB of RAM, 16GB of internal storage, microSD slot, Bluetooth 4.0, 802.11n, LTE connectivity, 8MP rear camera, 1.3MP front-facing camera, and a 2000 mAh battery.
 
The Blackphone is currently shipping to customers who already pre-ordered the $629 device. The company’s web store will re-open on July 14 to accept new orders for the smartphone.

Sources: SGP Technologies [1], [2]



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Shifting Private Data Around
By deltaend on 6/30/2014 9:10:51 AM , Rating: 3
Many of these services which are shipping with this phone simply shift the location of your private data from the Telcom to the service provider. For example, encrypted phone calls are a great idea, but the service that provides the encrypted phone calls has just as much access to the data as your Telcom did. Additionally, unless the person at the other end of your phone call also has the ability to receive encrypted calls, the encryption might as well not be taking place at all since it be unencrypted on the far end. Although this is a great start towards privacy, it hardly constitutes as much security as people may believe that it does.




RE: Shifting Private Data Around
By Reclaimer77 on 6/30/2014 9:25:51 AM , Rating: 2
quote:
Additionally, unless the person at the other end of your phone call also has the ability to receive encrypted calls


Duh?

I would imagine that's the point of this phone. For Government agencies and private companies to issue to employees so that both ends would be encrypted.


By CyberGirl212 on 7/1/2014 12:50:36 PM , Rating: 2
Bottom line, unless the user (or enterprise) has the encryption keys and their own server, there's still high risk for man in the middle attacks or third party data collection.
There's only one phone currently in the marketplace that puts the enterprise in control of the servers -- FortressFone.
Additionally, Blackphone offers PGP encryption - not AES 256 Enhanced encryption, like FortressFone. It also does not have a hardened OS or meet the NSA Mobility Standard, for that matter.


RE: Shifting Private Data Around
By futrtrubl on 6/30/2014 11:04:10 AM , Rating: 2
quote:
but the service that provides the encrypted phone calls has just as much access to the data as your Telcom did


I don't see how. If the encryption happens in phone, and it would have to be, and it's sent point to point then the only parties with access to the unencrypted data would be you and the person you are talking to.


By deltaend on 6/30/2014 11:30:12 AM , Rating: 2
If it is encrypted, it isn't directly encrypted between the two devices, it is both devices encrypted to a sip server or something similar. That means that the sip server has access to the unencrypted call and the metadata.


"DailyTech is the best kept secret on the Internet." -- Larry Barber














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki