Feb. 23. 2014 Reuters’ news stated that NSA has stepped up its surveillance of senior German government officials since being ordered by Barack Obama (http://www.reuters.com/
From NSA’s worldwide spying operations, all mobile user need to think about how to secure mobile device.
There are various encrypted mobile communication device you can find in the market. One is hardware based encryption group and other is software base encryption group.
What is the difference between the software and hardware encryption?
Below information from ehow (http://www.ehow.com/
Software-based encryption uses the computer's program to encrypt data and Software encryption often uses the user's password as the encryption key that scrambles the data. The encrypted data is secure, only as safe as your computer.
If hackers can get malicious code onto the computer, they can change or disable the encryption, allowing the disk to store unsecured data.
Hardware-based encryption uses a dedicated processor physically located on the encrypted drive instead of the computer's processor. This encryption processor also often contains a random number generator to generate an encryption key, which the user's password will unlock. Hardware-based encryption runs independently of the operating system so it is not exposed to the most common attacks.
Encrypted Android phone micro SD card provides point-to-point voice encryption, which means all data is first encrypted on the device before it is sent off and decrypted by the receiving device
The encrypted key of each phone call is created randomly and store in the encrypted chip, not in the cell phone so that it can resist the tapping of the Trojan virus.