1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
Clever Intelligence Unity Logo

Keep your mobile phone secure !


 
 
cen-02-3
cen-02-3
PRLog - Jul. 31, 2014 - TAIPEI, Taiwan -- Nov. 18. 2013 ABC news stated that Australian intelligence tried to listen in to Indonesian President Susilo Bambang Yudhoyono's mobile phone.

Feb. 23. 2014 Reuters’ news stated that NSA has stepped up its surveillance of senior German government officials since being ordered by Barack Obama (http://www.reuters.com/people/barack-obama?lc=int_mb_1001) to halt its spying on Chancellor Angela Merkel.

From NSA’s worldwide spying operations, all mobile user need to think about how to secure mobile device.

There are various encrypted mobile communication device you can find in the market. One is hardware based encryption group and other is software base encryption group.

What is the difference between the software and hardware encryption?

Below information from
ehow (http://www.ehow.com/about_6521817_hardware-vs_-software-e...).

Software-based encryption uses the computer's program to encrypt data and Software encryption often uses the user's password as the encryption key that scrambles the data. The encrypted data is secure, only as safe as your computer.

If hackers can get malicious code onto the computer, they can change or disable the encryption, allowing the disk to store unsecured data.

Hardware-based encryption uses a dedicated processor physically located on the encrypted drive instead of the computer's processor. This encryption processor also often contains a random number generator to generate an encryption key, which the user's password will unlock. Hardware-based encryption runs independently of the operating system so it is not exposed to the most common attacks.

Encrypted Android phone micro SD card provides point-to-point voice encryption, which means all data is first encrypted on the device before it is sent off and decrypted by the receiving device

The encrypted key of each phone call is created randomly and store in the encrypted chip, not in the cell phone so that it can resist the tapping of the Trojan virus.

www.cleverintelligenceunity.tw


--- End ---

Click to Share

Contact Email:
***@cleverintelligenceunity.tw Email Verified
Source:Clever Intelligence Unity
Location:Taipei - Taipei - Taiwan
Industry:Technology, Telecom
Tags:mobile security, encrypted blackphone, NSA spying, encrypted phone
Shortcut:prlog.org/12353077
Verified Account Email Address
Verified Account Phone Number

Disclaimer:   Issuers of the press releases are solely responsible for the content of their press releases. PRLog can't be held liable for the content posted by others.   Report Abuse

Latest Press Releases By “

More...

Trending News...



  1. SiteMap
  2. Privacy Policy
  3. Terms of Service
  4. Copyright Notice
  5. About
  6. Advertise
Like PRLog?
9K2K1K
Click to Share