Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Phones for outsmarting snoopers get pitched to mass market
yahoo ^ | 2/24/14 | Harro Ten Wolde

Posted on 02/24/2014 1:59:18 PM PST by Nachum

BARCELONA (Reuters) - Following the U.S. snooping revelations, there is a growing interest in a range of mobile phone products with one central selling point: privacy.

The latest contender is the Blackphone, which runs on a customised version of Google's Android software and encrypts texts, voice calls and video chats was launched in the Spanish Pavilion at the annual Mobile World Congress industry fair in Barcelona on Monday.

It aims to tap into the market for so-called mobile security management (MSM) products which was estimated to be worth $560 million in 2013 and is expected to nearly double in size to $1 billion a year by 2015, according to ABI Research.

Separately Deutsche Telekom said it is also preparing to launch a smartphone app that encrypts voice and text messages, making it the first major network operator with a mass market-compatible product that will be rolled out to all its users

(Excerpt) Read more at news.yahoo.com ...


TOPICS: News/Current Events
KEYWORDS: outsmarting; phones; snoopers
Navigation: use the links below to view more comments.
first 1-2021-25 next last

1 posted on 02/24/2014 1:59:18 PM PST by Nachum
[ Post Reply | Private Reply | View Replies]

To: Nachum

Interesting specs but it appears this will be the first of many.
If Apple is paying attention, this could be REALLY big.


2 posted on 02/24/2014 2:01:39 PM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

unless they use a completely redesigned dsp chip, forget it. the problems start at the hardware


3 posted on 02/24/2014 2:05:17 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

Looks like Snowden has created more jobs than Obama.....................


4 posted on 02/24/2014 2:05:24 PM PST by Red Badger (LIberal is an oxymoron......................)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum; COUNTrecount; Nowhere Man; FightThePower!; C. Edmund Wright; jacob allen; Travis McGee; ...
I don't think I'd trust "Don't Be Evil" google with my security.

Nut-job Conspiracy Theory Ping!

To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I don't add you to the list...

5 posted on 02/24/2014 2:07:38 PM PST by null and void (<--- unwilling cattle-car passenger on the bullet train to serfdom)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sten

For any smartphone to be secure it MUST have open-source firmware for the baseband processor.


6 posted on 02/24/2014 2:20:08 PM PST by Bobalu (Happiness is a fast ISR)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Nachum

The NSA can backdoor any program.


7 posted on 02/24/2014 2:22:34 PM PST by bgill
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bobalu

open source people are so funny

you see source... and you think the software (or chip) actually uses that exact software?

hilarious


8 posted on 02/24/2014 2:27:42 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 6 | View Replies]

To: sten

I’ve compiled open source software many times and written some of it. It is compiled as it was written. As for chips, documentation is available for preferred devices for systems like OpenBSD. Devices can also be injected, probed, etc.


9 posted on 02/24/2014 3:14:52 PM PST by familyop (We Baby Boomers are croaking in an avalanche of corruption smelled around the planet.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: sten
you foolishly laugh at open source advocates, thinking they are blind to actual reality.

Ultimately you can not know for certain anything is safe from being compromised. Instead, you must take steps to assure the risk falls below reasonable levels, and that exposure is mitigated to reasonable scope. In that regard open source reduces the difficulty to achieve those ends.

10 posted on 02/24/2014 3:14:55 PM PST by no-s (when democracy is displaced by tyranny, the armed citizen still gets to vote)
[ Post Reply | Private Reply | To 8 | View Replies]

To: bgill
"The NSA can backdoor any program."

Only where that's allowed by developers or users.


11 posted on 02/24/2014 3:16:11 PM PST by familyop (We Baby Boomers are croaking in an avalanche of corruption smelled around the planet.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: familyop

ever done an md5 on the binary posted and the one you generated?

how often do they match?


12 posted on 02/24/2014 3:17:53 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Nachum; All
"Phones for outsmarting snoopers
get pitched to mass market"


 photo dadez1.jpg

Help FR Continue the Conservative Fight!
Your Monthly and Quarterly Donations
Help Keep FR In the Battle!

Sponsoring FReepers are contributing
$10 Each time a New Monthly Donor signs up!
Get more bang for your FR buck!
Click Here To Sign Up Now!


13 posted on 02/24/2014 3:19:12 PM PST by musicman (Until I see the REAL Long Form Vault BC, he's just "PRES__ENT" Obama = Without "ID")
[ Post Reply | Private Reply | To 1 | View Replies]

To: no-s

for the 0.01% of the crowd that will (or know how to) compile a project... that might work

for the other 99.99%... they’re screwed


14 posted on 02/24/2014 3:20:24 PM PST by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 10 | View Replies]

To: null and void

Anyone who needs prodding to not be evil probably shouldn’t be trusted!


15 posted on 02/24/2014 3:21:53 PM PST by GeronL (Vote for Conservatives not for Republicans!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: sten

SSL sessions are best for such uploads. Writing to DVDs and getting checksum matches is another matter and can be frustrating with bad drives. There are better checksums than MD5s now, BTW. It’s best to use a good SSL session for both uploads and downloads (common in NetBSD work).


16 posted on 02/24/2014 3:26:20 PM PST by familyop (We Baby Boomers are croaking in an avalanche of corruption smelled around the planet.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: sten

I said open source for the baseband was a must for security.

I did not say that was all that needs doing :-)

There is no easy way to be certain that the silicon is secure. You would have to have faith in a chip fab and also all the designers.

What can be done quickly is to create blu tooth enabled snap-on hard cases for the most common smartphones. Inside this case would be an ARM processor, a microphone and two speakers.

The ARM processor inside the case would encrypt/decrypt audio to/from the phone using perfect forward secrecy public key protocols.

The case would cover the front facing camera of the phone and the 2nd speaker in the case would be directly above the mic of the smart phone so it can emit white noise audio to ensure that mic is useless for snooping.

Secure calls could only be made to similarly equipped phones. Call audio would suffer slightly.

This would give secure audio but would not protect against metadata collection.

This device would cost less than 20 dollars to manufacture in quantity.

It is possible to have faith in a common blu tooth chip and a simple ARM processor. Plus, there would be no way possible to tamper with the firmware remotely. To compromise the security of the device would require physical interdiction.

This is how you create secure data transfer across an untrusted link.

I’m an embedded systems guy, such a device would be very easy to construct using COTS devices.... I’d say not more than 200 man hours for the hardware and firmware.

The NSA would not like such devices.


17 posted on 02/24/2014 3:29:30 PM PST by Bobalu (Happiness is a fast ISR)
[ Post Reply | Private Reply | To 8 | View Replies]

To: sten

Checksums are for comparing files to copies of those files in case of accidents from copy to copy (e.g., yes, files in transit). If a file is corrupted during upload, a checksum can be used by the server to alert the uploader and avoid writing the corrupted file to a public archive.

But checksums don’t prevent someone from cracking an end user’s machine and corrupting a file on that machine after download. If a capable individual is out to get another individual, that is possible.

More security is desirable to less security for most developers and users. Open source software audited by open source developers is preferable to closed source software, especially closed source software with a big pecuniary-autocrat interest behind it.


18 posted on 02/24/2014 3:48:33 PM PST by familyop (We Baby Boomers are croaking in an avalanche of corruption smelled around the planet.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Bobalu

You wrote:”I said open source for the baseband was a must for security.

I did not say that was all that needs doing :-)

There is no easy way to be certain that the silicon is secure. You would have to have faith in a chip fab and also all the designers.

What can be done quickly is to create blu tooth enabled snap-on hard cases for the most common smartphones. Inside this case would be an ARM processor, a microphone and two speakers.

The ARM processor inside the case would encrypt/decrypt audio to/from the phone using perfect forward secrecy public key protocols.

The case would cover the front facing camera of the phone and the 2nd speaker in the case would be directly above the mic of the smart phone so it can emit white noise audio to ensure that mic is useless for snooping.

Secure calls could only be made to similarly equipped phones. Call audio would suffer slightly.

This would give secure audio but would not protect against metadata collection.

This device would cost less than 20 dollars to manufacture in quantity.

It is possible to have faith in a common blu tooth chip and a simple ARM processor. Plus, there would be no way possible to tamper with the firmware remotely. To compromise the security of the device would require physical interdiction.

This is how you create secure data transfer across an untrusted link.

I’m an embedded systems guy, such a device would be very easy to construct using COTS devices.... I’d say not more than 200 man hours for the hardware and firmware.

The NSA would not like such devices.”

I ask:
Please form a start-up and market such a device for my Android Tablet. A similar device for a desktop server would also be appreciated. I understand the theory but do not have the technical skill to create such a device.


19 posted on 02/24/2014 4:00:10 PM PST by Fai Mao (Genius at Large)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Fai Mao

Already been talking to a couple of teams that are hot on the trail.

Even that McAfee guy wants in.

This is an incredibly simple technique and is the only means of smart phone security in a world where everyone knuckles under and trust is a rare thing.


20 posted on 02/24/2014 4:06:17 PM PST by Bobalu (Happiness is a fast ISR)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-25 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson