- A handset that's allowed to run custom ROMS and/or apps will always be the weakest link in the chain of security. This is were BlackBerry truly shines, as no one has ever been able to run any custom ROM/OS on the handsets due to BlackBerry requiring the OS to be signed by them and only them.
Posted via CB10
I have heard of people doing stuff at the ROM level to remove carrier branding. Not sure if that is the same thing though.08-05-15 06:06 PMLike 0 -
-
Posted via CB10Bluenoser63 likes this.08-05-15 06:17 PMLike 1 -
This is a stark contrast to Android and iOS, in that no Android or iOS hardware checks the ROM/OS for a signature before booting.
Android and iOS usually have a locked "bootloader" that prevents writing to the ROM/OS partitions, but these locks are bypassed easily once certain exploits are discovered in the software.
Requiring the hardware to verify the software is the way BlackBerry has been able to prevent running unauthorized code on their hardware. If the software is ever changed in any way, then the key that the software was signed with is changed and thus the hardware will refuse to boot; preventing any unauthorized code to run.
Posted via CB10The_Passporter and KongHardrada like this.08-05-15 07:01 PMLike 2 - Regardless of the business or requirements of the business or their scenario, is BES10 combined with BlackBerry's phone hardware and software, in simplistic terms less of a risk for security weaknesses (hacks, breaches) then other combined solutions using Android or iPhone based on the security holes I noted in previous posts?
Even if it's only marginal is it better as a whole?Last edited by Bishkin; 08-05-15 at 09:25 PM.
08-05-15 09:09 PMLike 0 - I have been Jailbreaking and Rooting for as long as the third iphone came out and have not heard of any type or root access on a BlackBerry. If you have some factual information I would love to hear it. Also if you have a website that hosts "How to's" I would love to have the name of the site so I may read on it.08-05-15 09:20 PMLike 0
- Not many berries around, so not very enticing. Why not hack the servers instead, that should cast the net wider. Not uncommon that some hacks are only discovered years later. Please don't tell the person that you hacked into his phone or leave anything behind like a rose or key chain.08-05-15 09:32 PMLike 0
-
And yes, just like I said earlier, it is more enticing to go for something big and there is not need for you to repeat after me. But at least you finally see the light.08-05-15 11:09 PMLike 0 - What proof? Anything. You have nothing. And what do you think the big players use? BlackBerry phones. Thanks for playing.08-06-15 05:11 AMLike 0
-
Anyway I'm glad to hear it's not been done even thought I do miss tinkering With my phones lol.
Posted via CB1008-06-15 05:21 AMLike 0 -
- Like Bluenoser63 said the government would be the equivalent of going for something big. Not that it's a large number of phones but the information is of greater value then Joe Blow.
Anyway I'm glad to hear it's not been done even thought I do miss tinkering With my phones lol.
Posted via CB1008-06-15 05:58 AMLike 0 - I'll grab a screen shot later, I'm now in a hurry to get to another site - and POTUS, if they're using BB services will have similar tools in BES already and with other services they've taken up, whether Cisco, in their WLAN AP's (lots of Layer 7 functionality in AP's and controller units now), or other equipment and tools.
On record - at no point have I said BlackBerry is lesser or greater security than anything else anywhere in this thread: I'm simply trying to get the point across that the security market BB is vying for is not handset based, it is services based like the one I've screen shot several times for you guys.Both BB and the one I'm showing you are MUCH bigger than what I've shared. The concepts are not the easiest to get your mind around, but when the penny drops you'll have a whole new realm of pretty exciting gadgets and software to get into and it really is worth the journey to do it.
"But I say this to you, love your enemies and pray for those who persecute you;" - Matthew 5:4408-06-15 12:35 PMLike 0 - Because he insisted on using a legacy device?
IIRC, the device wasn't considered secure enough initially, hence the Sectera.
But what does the device he uses (NSA-hardened) mean for regular folks? Even BBRY didn't hang a hat on that, for good reason.
It's kinda like pumping up the perfection of the commercial Boeing 747 because POTUS flies in a version if it (darn! I just used an airplane analogy )
"But I say this to you, love your enemies and pray for those who persecute you;" - Matthew 5:4408-06-15 12:39 PMLike 0 - This is sheer nonsense. There are different vendors providing solutions similar to what Blackberry is offering. Different clients with different background have different requirements. If you like some of them here think that the Passport is the best, then you can be rest assured that a big part the rest of the world thought you meant the travel document.
The solutions MUST suit the business, not the other way round. And this is not only restricted to security products.
"But I say this to you, love your enemies and pray for those who persecute you;" - Matthew 5:4408-06-15 12:45 PMLike 0 -
As you've said and to paraphrase your previous comment, different mobile security solutions cater to different requirements.
So, they must be (all EMM and MDM) of the same level of security but cater to different enterprise requirements.
If they are not different, they must be the same. What do you think?
"But I say this to you, love your enemies and pray for those who persecute you;" - Matthew 5:44der_mit likes this.08-06-15 03:17 PMLike 1 - Not sure if we are going to get a solid straight answer out of anyone on the Network Security issue but but I have a new question that deals with BlackBerry security.
I was wondering what does this Sandboxing for the Android apps do exactly. The android apps can access the contacts I think and pictures, not sure what else but how does the sandbox work exactly to prevent the android apps from sharing information or keep the device secure? When some android apps pop up in the background without permission do they share any info with google? I know google isn't a security threat but all the same just want to understand the limitations the Sandbox sets for these Android apps.
If anyone know.....
Posted via CB1008-06-15 08:15 PMLike 0 - So this is what you are harping all along. Why not make it easy on yourself and everybody. Prove to me that I make that statement, or at least show me where to find it.
Last edited by Bishkin; 08-06-15 at 11:53 PM.
08-06-15 09:35 PMLike 0 -
I think you are right.Last edited by Bishkin; 08-06-15 at 10:14 PM.
08-06-15 09:41 PMLike 0 - I have been Jailbreaking and Rooting for as long as the third iphone came out and have not heard of any type or root access on a BlackBerry. If you have some factual information I would love to hear it. Also if you have a website that hosts "How to's" I would love to have the name of the site so I may read on it.
Posted via CB10
How do you tell if a phone was Jailbreak or Rooted, clothes they wear? No, I was only joking.Last edited by Bishkin; 08-06-15 at 10:05 PM.
The_Passporter likes this.08-06-15 09:45 PMLike 1 -
- Forum
- BlackBerry 10 Phones & OS
- BlackBerry 10 OS
What's all this about BlackBerry security
« Why hasn't my P9982 STK100-1 received an update notification 10.3.2?
|
Why Can't I Update BB10 via Link? (screenshot included) »
Similar Threads
-
How do I turn on my keyboard light and keep it on (BlackBerry Q10)?
By CrackBerry Question in forum BlackBerry Q10Replies: 3Last Post: 08-19-15, 10:51 AM -
How do I go about setting up a Blackberry Enterprise Server Express?
By CrackBerry Question in forum EnterpriseReplies: 1Last Post: 08-02-15, 02:19 PM -
Blackberry best Dictionary with IPA.
By Patrick Vo1 in forum BlackBerry PassportReplies: 1Last Post: 08-02-15, 12:54 PM -
How do I close BlackBerry Blend on my PC?
By CrackBerry Question in forum Ask a QuestionReplies: 1Last Post: 08-02-15, 10:50 AM
LINK TO POST COPIED TO CLIPBOARD