Ars Takes an Early Look At the Privacy-Centric Blackphone 67
Ars Technica has spent some time with pre-production (but very nearly final) samples of the Blackphone, from Geeksphone and Silent Circle. They give it generally high marks; the hardware is mostly solid but not cutting edge, but the software it comes with distinguishes it from run-of-the-mill Android phones. Though it's based on Android, the PrivOS system in these phone offers fine grained permissions, and other software included with the phone makes it more secure both if someone has physical access to the phone (by encrypting files, among other things) and if communications between this phone and another are being eavesdropped on. A small taste: At first start up, Blackphone’s configuration wizard walks through getting the phone configured and secured. After picking a language and setting a password or PIN to unlock the phone itself, the wizard presents the option of encrypting the phone’s stored data with another password. If you decline to encrypt the phone’s mini-SD storage during setup, you’ll get the opportunity later (and in the release candidate version of the PrivOS we used, the phone continued to remind me about that opportunity each time I logged into it until I did).
PrivOS’ main innovation is its Security Center, an interface that allows the user to explicitly control just what bits of hardware functionality and data each application on the phone has access to. It even provides control over the system-level applications—you can, if you wish for some reason, turn off the Camera app’s access to the camera hardware and turn off the Browser app’s access to networks.
Re:Apps which require location? (Score:3, Insightful)
But you give away your location by just connecting to a base station? (if anyone has solutions to this, please share!)
Most countries track the location of your cell phone (mandated by law), and then shares the information gathered with intelligence agencies.
While I appreciate what Silent Circle is doing... (Score:5, Insightful)
Re:Apps which require location? (Score:4, Insightful)
Yes. I know. Let's try that again: so you're just assuming the existence of backdoors in the Blackphone specifically which make the mic accessible to *.gov?
Unless I missed something, we don't know for sure one way or the other whether the techniques the FBI have used to do that to other phones, will work on the Blackphone.
Re:Gimme a keyboard (Score:2, Insightful)
Yes, let me buy a security-minded phone then get data into it over bluetooth.
A secure phone MUST have a physical keyboard.
Re:Apps which require location? (Score:4, Insightful)
There needs to be a way to verify how the hardware operates, or you just have to trust the manufacturer. Personally, I wouldn't.
Agree. If Blackphone don't go down the hardware-checking road, that rather weakens their case. It'll take more than this [twitter.com]. (I don't know what they mean by 'make', or even if they're correct in the first place.)
A simple solution would be to have a physical mic/camera-disconnect switch...