07-06-11 08:10 PM
27 12
tools
  1. banyula's Avatar
    If you are indeed interested in knowing the security protocols involved, read this insomnia-break manual:

    docs.blackberry.com/en/admin/deliverables/25762/BlackBerry_Enterprise_Solution-Security_Technical_Overview--1315426-0302055542-001-5.0.3-US.pdf

    There you can find everything related on how the Encryption Keys are generated (unique per device) exchanged with the corporate BES (using SPEKE protocol) and also auto-renewed every 30 days, or on demand by going to Options->Security->Security Status Information->(click on Desktop services)-> (option key)Regenerate Encryption Key (for OS6) in your device. Every device has a unique encryption key and it changes periodically so it is impossible to keep track of them should they be obtained by manual means.

    There is also a way for any corporation to write their own encryption algorithm (RIM Cryptographic API) and implement it on top of BES AES encription (not replaced), so they can be 200% sure that the information is high-securely transmitted.
    Last edited by banyula; 07-06-11 at 05:47 PM.
    07-06-11 05:36 PM
  2. shabbs's Avatar
    Thanks. Then why does it go through RIM's servers? Seems it could bypass that and still work (unlike BIS) ...
    BES must connect through the Internet and RIM's SRP Network to communicate with the BlackBerry handheld so it can deliver the messages.
    07-06-11 08:10 PM
27 12
LINK TO POST COPIED TO CLIPBOARD