Keep your mobile phone secure !

 
 
cen-02-3
cen-02-3
 
Spread the Word
Listed Under

Tags:
* Mobile Security
* Encrypted Blackphone
* NSA spying
* Encrypted Phone

Industrys:
* Technology
* Telecom

Location:
* Taipei - Taipei - Taiwan

TAIPEI, Taiwan - July 31, 2014 - PRLog -- Nov. 18. 2013 ABC news stated that Australian intelligence tried to listen in to Indonesian President Susilo Bambang Yudhoyono's mobile phone.

Feb. 23. 2014 Reuters’ news stated that NSA has stepped up its surveillance of senior German government officials since being ordered by Barack Obama (http://www.reuters.com/people/barack-obama?lc=int_mb_1001) to halt its spying on Chancellor Angela Merkel.

From NSA’s worldwide spying operations, all mobile user need to think about how to secure mobile device.

There are various encrypted mobile communication device you can find in the market. One is hardware based encryption group and other is software base encryption group.

What is the difference between the software and hardware encryption?

Below information from
ehow (http://www.ehow.com/about_6521817_hardware-vs_-software-e...).

Software-based encryption uses the computer's program to encrypt data and Software encryption often uses the user's password as the encryption key that scrambles the data. The encrypted data is secure, only as safe as your computer.

If hackers can get malicious code onto the computer, they can change or disable the encryption, allowing the disk to store unsecured data.

Hardware-based encryption uses a dedicated processor physically located on the encrypted drive instead of the computer's processor. This encryption processor also often contains a random number generator to generate an encryption key, which the user's password will unlock. Hardware-based encryption runs independently of the operating system so it is not exposed to the most common attacks.

Encrypted Android phone micro SD card (http://www.cleverintelligenceunity.tw/style/frame/templat...) provides point-to-point voice encryption, which means all data is first encrypted on the device before it is sent off and decrypted by the receiving device

The encrypted key of each phone call is created randomly and store in the encrypted chip, not in the cell phone so that it can resist the tapping of the Trojan virus.

www.cleverintelligenceunity.tw

Contact
Clever Intelligence Unity
***@cleverintelligenceunity.tw
End
Source:Clever Intelligence Unity
Email:***@cleverintelligenceunity.tw Email Verified
Tags:Mobile Security, Encrypted Blackphone, NSA spying, Encrypted Phone
Industry:Technology, Telecom
Location:Taipei - Taipei - Taiwan
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse



Like PRLog?
9K2K1K
Click to Share