Silent Circle and ecosystem first World Privacy

12:44 PM
Silent Circle and ecosystem first World Privacy -

Silent Circle is on track to create the first ecosystem of the privacy in the world . How long will and other regulatory authorities allow such a space before the last stop? Check Blackphone 2 now and see for yourself.

Founded by God Internet Security

Phil Zimmermann co-founded Silent Circle in 2012 as part of its overall efforts to keep prying eyes and ears on private communications. Zimmerman is an Internet legend in some circles, that created what was to become a software as email encryption widely used in the world in 1991. He suffered through multiple criminal investigations for its efforts to increase and email privacy Internet, behavior that shows that the federal government more recent crackdown on whistleblowers, defenders of privacy, and journalists are not new. Company Zimmerman, Silent Circle, develops smartphones and applications designed for multi-platform secure communications.

New Blackphone encryption protocols

The Blackphone 2 is the latest Silent Circle iteration of its flagship smartphone, which sports an enhanced version of the Android operating system that its creators have dubbed, PrivatOS. The phone with its 5.5-inch screen, and uses ZRTP SCIMP protocols, avoiding persistent public keys, which reduces the complexity and locks the voice and IM communications. The system also creates authentication chains Blackphone 2 users can read each other on the phone to detect man-in-the-middle attacks.

Uneasy compromise servers data leaks to third parties? ZRTP and SCIMP not need servers to run or packets to manage keys through the SIP signaling. All keys generated for each call effectively destruct when the call ends.

from end to end security between users

ensure data is protected while it is in flight and when it reaches its destination is the top task of each digital security company. In the era of the NSA domestic spying and massive data breaches by rogue pirates, keeping our private daily communication is thirsty work.

To fight against espionage and large-scale data mining, Silent Circle Blackphone 2 retains all communications, including phone calls, text messages, and video chat, secured by the retention minimal data and negotiation of peer-to-peer key. proprietary line of the company's apps-text silent, quiet and Telephone Contacts silent work in tandem with its own smartphone operating system so conversations remain between the parties

Subscription unnecessary :. Although Blackphone 2 users enjoy the highest level of protection, other smartphone users can still protect their incoming and outgoing messages. Download the enterprise encryption applications for free and use them on any Android smartphone, iPhone or Windows desktop.

Creation of the first Privacy ecosystem

By allowing users to keep secure communications from devices and applications, Silent Circle is to create an ecosystem of privacy. In this area, users can send and receive information with relative certainty that the minimum data escapes to third parties. In addition, users can take advantage of Blackphone its operating system to create new "spaces" that generate new user profiles each time, complete with a virtual operating system for power applications and make calls. Each user profile functions essentially a completely different phone isolated from all other profiles.

This ecosystem is the first of its kind in the world and one that comes with heavy price tag. At $ 649 per phone, potential users can not get a two-year service contract to reduce costs.

risk of government interference

Although the operating system does not fully proves NSA in terms of resisting the data extraction, Blackphone 2 does offer a number of issues that could attract the interest of negative government. Without servers feature to store metadata, Silent Circle could operate in the same legal briar patch that caught lavabit trap in 2013 and 2014. System Encryption technology could also attract the interest of organized crime as a potential tool to avoid detection by law enforcement.

Even if used for malicious purposes, protection of Blackphone data is as effective as possible users. Sending data via unsecured sources is always a security risk, although Silent Circle professes that the phone itself is stunning digital fortress. In fact, its developers are so confident that they offer a reward (or premium, if you prefer) to anyone who is mild to severe bugs in their system.

Data confidentiality is freedom in the modern world. When you need to keep sensitive information protected, Hotspot Shield trust to keep attackers at bay.

Previous
Next Post »
0 Komentar