1. BBd00d's Avatar
    Mods, please delete this topic if it's inappropriate otherwise, please discuss this everyone. This is an alarming article and one I think BlackBerry should be greatly concerned about. Thoughts?

    http://m.ft.com/cms/s/0/ba3b873e-6b9...542bf8673.html

    Posted via CB10
    10-12-15 06:41 PM
  2. eldricho's Avatar
    Link wants me to sign up to read it

    Posted via CB10
    10-12-15 06:44 PM
  3. app_Developer's Avatar
    If you want people to discuss something behind a paywall maybe at least give everyone a sentence or two about what this is?
    10-12-15 06:47 PM
  4. outlooker's Avatar
    Can you post a screen shot of the article, or give a summary?

    Posted via CB10
    10-12-15 06:49 PM
  5. BBd00d's Avatar
    I have no idea why it's asking you to sign up. I'm not a member and I was able to read it just fine. Anyway, I went into reader mode and copied the article for you all...


    "Blackphone vies to be Blackberry�s heir
    Sam Jones, Defence and Security Editor

    In Geneva, Steve Jobs� former chess partner, a former US Navy Seal and a cryptographer run a company together. What they do is either a dangerous threat to the international security order or a vital safeguard for its future. Either way, the Dalai Lama is a client.

    Silent Circle may not be a household name, but the phone the Swiss-based company has built � a modified Google Android handset impermeable to snooping thanks to its total encryption � is becoming a coveted device for the rich, powerful and secretive.

    The first Blackphone, as it is known, sold out in weeks after being released last year. The second, released last month, is in equally high demand, even though users must put up with a more limited array of apps than they would be accustomed to in order to enjoy the security benefits.

    �We�re replacing BlackBerry,� declares Mike Janke, one of the co-founders and an ex-US Navy commando. Mr Janke � who still carries the strapping frame of his former profession, now clothed in a neat company polo shirt � is an unlikely advocate of cutting edge cryptography.

    Three years ago his claim to challenge a leading enterprise smartphone provider might have been laughable. But now 41 of the top 50 in the Fortune 500 ranking of US companies are clients, says Mr Janke, �and about 90 per cent of the US Senate�.

    Silent Circle is riding a global trend that is pitching companies, military forces and spies into the same digital battlefield at a time of massive technological up*heaval. Businesses and individuals, corporate intellectual property and private lives are all mixed on the front lines of geopolitics. Encryption is spreading across the tech world as a result.

    �The demand for it has to increase,� says Mr Janke. �Whenever I go away � to any hotel in the world, in South Africa, Argentina, Dubai, there are businessmen and women on their phones, on their laptops, using the hotel�s free WiFi. They have no idea how insecure what they are doing is.

    �I remember watching one woman calling London from South Africa, talking about financial results. That conversation is crossing at least a dozen countries that are all sucking it out of the air.�

    At Silent Circle, Mr Janke counts Phil Zimmermann, inventor of the global encryption gold standard PGP, among his co-founders. The other, the chess-playing Jon Callas, designed the security for Apple�s operating system.

    Calls and messages from a Blackphone are end-to-end encrypted, meaning only the participants have access. Every other app and feature on the device is �locked down� � Google gave Silent Circle rare power to modify Android devices to do this � to prevent any unauthorised transmission of data.

    Developing such a technology is not necessarily a comfort*able place to be. In the wake of the Edward Snowden revelations, as communications and tech companies have rushed to embrace greater digital security, governments around the world have slammed those bringing encryption to the masses.

    In November, Robert Hannigan, director of GCHQ, the UK�s electronic eavesdropping agency, accused companies embracing it of becoming the �command and control networks of choice� for terrorists. Intelligence agencies have warned repeatedly of the danger they face in �going dark� � losing access to the data that has made their fight against transnational terrorism, crime and espionage so successful of late.

    Mr Janke, who has spent his career working with intelligence agencies, gives such arguments short shrift: � Law enforcement and government have a hundred other ways to find their guy or girl . . . Targets don�t necessarily use encryption for everything either. They might have a laptop. A home computer. A tablet. A credit card and a vehicle. All of those leave digital traces.�

    By clamping down on encryption, Mr Janke argues, governments may make citizens far less secure by rushing through badly-designed legislation, just as they were tempted to do when responding to the 1930s bank robbers Bonnie and Clyde. �That�s what we need to avoid here.�

    At a time of growing digital insecurity � with countries such as China stealing vast amounts of corporate intellectual property through hacking � encryption offers much-needed defence.

    The problem, though, is that the digital getaway vehicle Silent Circle potentially offers would-be wrongdoers is near-perfect too, if they use it correctly. For example, even if law enforcement agencies subpoenaed the company, it would be unable to disgorge clients� communications because it cannot break into them itself.

    Mr Janke says Silent Circle would happily deactivate clients� phones if law enforcement agencies came to them with �life and death� situations. That, though, leaves plenty open. Would he, for example, authorise a client�s phone to be deactivated if an intelligence agency came to him with evidence it had ended up in Syria? �No.� Even if the agency said they had suspicions about its user? �No.�

    �We�re trying to be completely neutral, we don't want to be radical on either side of this debate,� he says.

    It is a tough line to walk. As Mr Janke is also keen to point out, though, Silent Circle is far from being the enemy of western spycraft. It supplies the FBI. In the UK, a team of former SAS commandos is selling the Blackphone to British agents. �It�s close to 37 countries who are purchasers of our software . . . On the policy side, there�s criticism, but on the operational side, they�re buying our stuff like hot cakes.�

    Ultimately, says Mr Janke, it will not be governments that inhibit the spread of encrypted devices such as the Blackphone but Facebook and other big tech companies. �People like to talk about the NSA, China, Russia, GCHQ, but let me tell you the largest purveyors of data theft out there are the technology firms themselves. Every free app is sucking globs of data off your phone hourly and they do atrocious things.�

    Encryption blocks this business model. �The backlash is going to come from the big data firms. That is the new war � the new gold coming out of the ground isn�t oil. It�s your data.�

    Since Edward Snowden stole and leaked thousands of secret documents exposing electronic eavesdropping activities, US spymasters and their peers have repeatedly warned they are �going dark�. The betrayal, they say, has been a bonanza for terrorists and hostile states. In laying bare the capabilities of the National Security Agency and Britain�s GCHQ, it has allowed enemies to better protect themselves from their snooping.It is hard for the agencies to substantiate such claims without revealing even more about themselves. But there is plenty of evidence to suggest their fears are more than just scaremongering. Isis, the jihadi terror group that has seized a swath of territory in Iraq and Syria, is perhaps the prime example. It has disabled the GSM network in sensitive areas of its territory to prevent geolocation of mobile signals. Wireless operation is banned in its stronghold Raqqa. Documents circulated among its fighters show how to scrub data from mobile communications. And its leadership practises scrupulous digital hygiene. Many never use phones or computers. Where Isis�s commanders do use the internet, it is in line with Mr Snowden�s precepts: they encrypt and anonymise. Undoubtedly, some such activity would be taking place regardless of whether the Snowden leaks had occurred or not, but what the NSA and GCHQ fear most is its spread. The more ubiquitous and cheap it becomes to encrypt communications as a matter of course, they point out, the harder it becomes to conduct any kind of signals intelligence work in the fight against terrorism."

    Markets Data: � Thomson Reuters
    Market data delayed by at least 20 minutes.
    �The Financial Times Ltd 2015

    Posted via CB10
    Bbnivende likes this.
    10-12-15 06:55 PM
  6. crackbrry fan's Avatar
    Sydney crime and bikie gangs are using uncrackable mobile phones to arrange murders, shootings and drug deals – hampering the ability of police to solve the crimes.
    Law enforcement agencies have warned about the increased use of encrypted mobile phones, with the devices being used to arrange at least two recent murders and hampered investigations into at least two others.

    Detectives from the organised crime squad this month arrested and charged a Sydney man who allegedly had 55 encrypted devices in his CBD flat.*It is understood the man had up to 800 clients on his books from a range of criminal networks.

    The phones with the encryption software and a US SIM*card can be bought in Sydney for between $2300 and $2800 for a six-month subscription. Users can then pay upwards of $1000 to extend their subscription for another another six months.

    A number of mobile phone applications are also available for download.
    It is understood representatives from the NSW Police have travelled to BlackBerry's headquarters in Canada in a bid to get advice on how to retrieve information from the encrypted devices
    http://www.smh.com.au/nsw/are-encryp...23-gh82gv.html

    The preceding is why black phone isn't any more secure than BlackBerry , it's also a double edged sword that has carriers pulling away from BlackBerry.the authorities need access. The Priv will fit their bill however, as it will help them garner easily through the Android platform.

    Speaking from a corporate stand point we won't want a device like black phone as it is only as secure as an Android can be. Any device that gets hacked in less than 5 mins, then spins it isn't serious about security.

    Oh and BTW don't expect the Priv to be anymore secure than its predecessors

    http://www.welivesecurity.com/2014/0...ine-privacy-3/


    Posted via CB10
    Last edited by crackbrry fan; 10-12-15 at 07:24 PM.
    10-12-15 07:09 PM
  7. peter0328's Avatar
    http://www.smh.com.au/nsw/are-encryp...23-gh82gv.html

    The preceding is why black phone isn't any more secure than BlackBerry , it's also a double edged sword that has carriers pulling away from BlackBerry.the authorities need access. The Priv will fit their bill however, as it will help them garner easily through the Android platform.

    Speaking from a corporate stand point we won't want a device like black phone as it is only as secure as an Android can be. Any device that gets hacked in less than 5 mins, then spins it isn't serious about security.

    Oh and BTW don't expect the Priv to be anymore secure than its predecessors

    http://www.welivesecurity.com/2014/0...ine-privacy-3/


    Posted via CB10
    Sounds like SecuSmart is doing a good job.

    Posted via CB10
    10-12-15 09:49 PM

Similar Threads

  1. Replies: 3
    Last Post: 10-17-15, 02:56 AM
  2. How to import bookmarks from Google Chrome?
    By Georgian Nicolae in forum Ask a Question
    Replies: 2
    Last Post: 10-13-15, 02:32 PM
  3. Anyone here use a Stylus with their Passport?
    By RealRichLRead in forum BlackBerry Passport
    Replies: 3
    Last Post: 10-13-15, 06:33 AM
  4. Anyone using a pre-paid plan with passport ?
    By nickanderson in forum BlackBerry Passport
    Replies: 6
    Last Post: 10-12-15, 10:10 PM
  5. Priv article
    By robert_in_la in forum BlackBerry Priv
    Replies: 1
    Last Post: 10-12-15, 04:53 PM
LINK TO POST COPIED TO CLIPBOARD