Bitcoin Forum
May 06, 2024, 10:55:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Secure smartphone?  (Read 1465 times)
isherclub
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile WWW
December 14, 2016, 09:06:24 PM
 #21

There are no absolutely secure smartphones. Any gadget transfers a lot of data to the mobile network, for example. If u use public WiFi, you can automatically forget about security. Still, on Android you can install special programs for security. Or you can develop some by your own.
I do agree with you there is no secure smart phone as it stands as they devices can be compromised by people who understand them well
And possibly android should be the OS to use for a more controllable privacy option

I respectfully disagree with the statement "if  u use a public WiFi you can automatically forget about security".

That is true, if you use any "standard" phone. If on the contrary your device is aware of how a public WiFi works then there is no problem.

For example, our devices can connect to any WiFi. Our smartphones come with a low level IP firewalls that blocks all incoming connections both on IPv4 and IPv6 other than those coming from the encrypted VPN, only after the connection has been established.

Our phones do selectively block fake antennas that pretend to be a known WiFi already authorized by our phones, by keeping a map of the authorized mac addresses of the authorized antennas.

When it comes to connecting to the VPN gateway, we do not even use DNS queries to find the right IP, our connections are made using stating IP addresses for the VPN gateway (not for the phone interface, of course).

We do not exchange asymmetric keys on-line and the authentication is done against a certificate that is pre-installed on the phone at the moment the phone is shipped.

Certificates are updated every 12 months, so we update (send a new phone) every 12 months at top.

Once the connection is established with the VPN gateway (using AES256-CBC) all that any operator will see over the WiFi will be encrypted traffic back and forth our device and a remote IP (the VPN gateway) which may be chosen randomly by our clients at every reboot of the phone from a set of up to 80 different gateways in 80 different countries.

The traffic is further obfuscated as it is directed usually toward port 53, which is the port used to query a DNS server.

In other words whoever would sniff the WiFi traffic would see a lots of encrypted queries to some remote DNS. That's all. So I find difficult, even if you install Wireshark in any open WiFi, to figure it out what our device is doing.

Since we are on the subject, our phones do only encrypted calls, messaging and e-mail.

Both sender and receiver connect the way I described above to different gateways.

On top of the encrypted VPNs runs, for each service (voice, message, email) an encrypted query to a distributed hash table with static IPs, updated at every boot. Those static IPs are located all across the globe in several countries, mostly managed by university research centres, not us.

Through those queries, the calling party is able to find the VPN gateway IP and port of the called party (not the real IP address).

The calling party will never know the real IP of the called party and vice versa. Once the "virtual" IP are known the calling party will establish a peer-to-peer call (or text or email).

Again, the actual call will be established only if the called party has previously authorized, and exchanged, a symmetric key with the calling party, through a safe channel.

In our case the safe channel is optical, meaning, both phones need to be close to each other and exchange a bar code when they are first paired.

From there, a perfect forward secrecy method to update the keys is used.

Once the party is acknowledged, an end-to-end encryption (AES256 o TwoFish) will be used to encrypt the correspondence.

This encryption goes on top of the previous two VPN encryptions (one for the called and one for the calling party).

Traffic goes obfuscated (port 53) from the calling device (in one country) to the VPN gateway (another country) to the other VPN gateway on random port in another country, and finally on the last device, in another country again.

It is very similar to what TOR does, with the difference that TOR cannot be used because it doesn't guarantee enough bandwidth.

Anyway, it is getting really out of topic. All this to say, that just if you use any WiFi, that doesn't mean that your connection is doomed. That's all.
1715036137
Hero Member
*
Offline Offline

Posts: 1715036137

View Profile Personal Message (Offline)

Ignore
1715036137
Reply with quote  #2

1715036137
Report to moderator
1715036137
Hero Member
*
Offline Offline

Posts: 1715036137

View Profile Personal Message (Offline)

Ignore
1715036137
Reply with quote  #2

1715036137
Report to moderator
1715036137
Hero Member
*
Offline Offline

Posts: 1715036137

View Profile Personal Message (Offline)

Ignore
1715036137
Reply with quote  #2

1715036137
Report to moderator
I HATE TABLES I HATE TABLES I HA(╯°□°)╯︵ ┻━┻ TABLES I HATE TABLES I HATE TABLES
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
deadsilent
Hero Member
*****
Offline Offline

Activity: 1148
Merit: 500



View Profile
December 15, 2016, 12:58:31 AM
 #22

Android os is good for you. Because it is linux. It is harder to infect with virus. But also it depends on the user. Some of hacking incidents are coming from the carelessness of the users. They are using some stupid applications which are infused with hacking tools. Be careful also from any brand of smartphones because some of them are injected with a very small device which they transmit every data you have.
picasoamberlin
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
December 15, 2016, 10:30:47 AM
 #23

dont sync with server and stay offine
that the most secure way Grin
isherclub
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile WWW
December 15, 2016, 11:02:44 AM
 #24

Android os is good for you. Because it is linux. It is harder to infect with virus. But also it depends on the user. Some of hacking incidents are coming from the carelessness of the users. They are using some stupid applications which are infused with hacking tools. Be careful also from any brand of smartphones because some of them are injected with a very small device which they transmit every data you have.

Seriously?

According to the Unclassified / Roll Call Release, "Threats to mobile devices Using The Android Operating System", issued by the Department of Homeland Security and the F.B.I on July, 23 2013 (ask me for a copy if you want it), Android is the least secure platform in terms of number of threats circulating and the lack of updates. Threats that, by the way, are delivered using text messages (SMS) and multimedia messages (MMS) so, that could potentially arm any phone from any brand and any OS release, simply knowing the phone number.

Of course, I agree, using the number of circulating threats doesn't really sound bi-partisan, considering the fact that Android is the most diffused platform.

But also stating that it is safe because it is based on Linux is not exactly a scientific analysis. Also iOS is based on FreeBSD.

That being said, the real threat to individual privacy comes from proprietary/closed software or architectures.

Unfortunately, ALL retail smartphones incorporate the baseband chip (the one used to connect to the cellular networks) and, guess what, all baseband chip manufacturers provide ONLY the binary of their drivers.

In other words, it doesn't matter which phone you will pick, it will come with a piece of software and hardware that you have to trust blindly.

As a side note, a while ago, a security research firm based in Germany found out that exactly that specific piece of software, installed on ALL Samsung devices, was used to eavesdrop all information from any Samsung phone, activated from an external unstoppable trigger.

At the same time all Android phones that come with google app store installed, come also with a piece of software that enable Google to install any app, at any time, without the authorization or the knowledge of the user.

Anyway, for this reason, our phones do not have the baseband firmware.

A good compromise could be to install Copperhead on a Nexus phone. Still half a way from total uncertainty to a spartan orthodox approach of our phones.
rajasumi3
Full Member
***
Offline Offline

Activity: 266
Merit: 100


View Profile
December 15, 2016, 05:17:30 PM
 #25

not a single phone is secured .well if u want a user friendly phone samsung will be best for u .and be careful from the public networks ,they are not  always secured at all.but if it is given by the government use it ,hope u understood and buy a smartphone buddy
isherclub
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile WWW
December 15, 2016, 06:25:18 PM
 #26

not a single phone is secured .well if u want a user friendly phone samsung will be best for u .and be careful from the public networks ,they are not  always secured at all.but if it is given by the government use it ,hope u understood and buy a smartphone buddy

You must have smoked something good, buddy.

I just said that Samsung smartphones come with a backdoor from the factory... Please read the following news, dated 2014 (not exactly  a news).

http://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor

As for the ability of Google to install (or remove), through push and pull notifications, whatever they like without your permission, see:

https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/issues/151

(I offered the work-around for rooted phones in the last post of that thread).

But also

https://jon.oberheide.org/blog/2010/06/28/a-peek-inside-the-gtalkservice-connection/

This issue is known since 2010 and it is still there.
brazile
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
December 15, 2016, 07:55:08 PM
 #27

Secure smartphone?

Not possible. Insecurity is the new secure. Live inna woods or become fish
Brattavito
Sr. Member
****
Offline Offline

Activity: 574
Merit: 250



View Profile
December 15, 2016, 08:32:07 PM
 #28

I think iphone good choice

█  ▄▄▄  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ▀▀▀  █
█  ▄▄▄  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ▀▀▀  █
R  E  P  U  B  L  I  A
PRE-SALE :  23.08 - 23.09
█  ▄▄▄  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ▀▀▀  █


█  █
█  █
█  █
█  █
█  █
█  █
█  █
█  █
█  █
   █
   █
Highly Efficient Technology
Secure & Transparent
Full Democracy
█  ▄▄▄  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ███  █
█  ▀▀▀  █
Cocobrayy
Sr. Member
****
Offline Offline

Activity: 322
Merit: 250



View Profile
December 16, 2016, 03:46:58 PM
 #29

No secure , because secure not reall secure
Kuingsudaqila
Sr. Member
****
Offline Offline

Activity: 438
Merit: 250



View Profile
December 17, 2016, 10:41:52 PM
 #30

iam recomended smartphone in samsung
high secure, high brand, and use OS android

and added antivirus in your smartphone


                 ▄▄▄██████████████████▄▄▄
            ▄▄██▀▀▀▀▀███████████████████████▄▄
        ▄▄███▀   ▄▄▄   ▀████████████████████████▄▄
     ▄██████  ▄███████▄  ▀██████████████████▀▀▀█████▄
   ▄███████    ███▀▀ ██    ███████████  ███▀  ▄███████▄
  █████████▄  ▄█▀  ▄███    ██████████  ▄██  ▄███████████
 ██████████████▀  ████▀   ▄██▀▀▀████  ▄████▀  ███████████
██████████████▀  ▄███▀   ▄█▀  ▄▄ ██▀ ▄█  ██  █████████████
██████████████   ▀     ▄██▀  ▄█  █▀  █   █▀▄  ▀███████████
█████████████▀  ▄███▄  ▀██   ██ ▄▄▄  █▀ ▄▄▀█▄  ▀▄█████████
█████████████   █████   ▀██▄ ▀▄████▄  ▄███▄▀  ▄███████████
 █████   ▀██▀  ▄█████    █▀▀█████████████████▀███████████
  ████   ▄█▀   █████    ██ ▀▄█▀▄▄▀█ ▀▄▀█▀▄▀ █▀█ ▀▄██████
   ▀███▄▄   ▄█▄ ▀▀     ███ █ █ ▄▄▄█  █ █ █  █ █ ██████▀
     ▀██████████▄▄▄▄▄█████▄█▄██▄▄██ █▄███▄█▄█▄█▄████▀
        ▀▀██████████████████████████████████████▀▀
            ▀▀██████████████████████████████▀▀
                 ▀▀▀██████████████████▀▀▀
      Powered by
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
|
|
|
|

   ▀██▄       ▀████▄
▄    ▀██          ▀██▄
██▄ ▄███         ▄█████▄▄
 ▀███████▄     ▄██▀ ▀▀████
      ▀████▄ ▄██▀     ▀█▀
        ▀████▄
        ▄█▀████▄
      ▄███▄▀▀████▄
    ▄████▀    ▀████▄
  ▄████▀        ▀██▀█▄
  ▀██▀            ▀██▀
Ashong Salonga
Sr. Member
****
Offline Offline

Activity: 882
Merit: 260



View Profile
December 18, 2016, 12:48:14 AM
 #31

iam recomended smartphone in samsung
high secure, high brand, and use OS android

and added antivirus in your smartphone
Yes, currently am using J7 prime and I found it very secured. I used password and fingerprints for my lockscreen. The good thing in its fingerprint is that it recognises only on fingerprint. My phone recognised my right thumb so even I uses my left thumb, it won't open same as the rest of my fingers.

.
.
.
▄███████████████████▄
█████████████████████
████████████▀▀░░░░███
███████████▌░░░░░░███
███████████░░░░██████
███████████░░░░██████
████████░░░░░░░░░░▐██
████████░░░░░░░░░░███

███████████░░░░██████

███████████░░░░██████

███████████░░░░██████

███████████░░░░██████

▀██████████░░░░█████▀
▄███████████████████▄
█████████████████████
█████████████████████
████▀██████▀░░░▀▀▄███
████░░▀▀███░░░░░░▄███
████▀░░░░░░░░░░░▐████
████▄░░░░░░░░░░░█████
█████▀░░░░░░░░░▄█████

████▀█▄░░░░░░░▄██████

█████▄░░░░░▄▄████████

█████████████████████

█████████████████████

▀███████████████████▀
▄███████████████████▄
█████▀▀▀▀▀▀▀▀▀▀▀█████
███░░░▄▄▄▄▄▄▄▄▄░░░███
██░░▄█████████▀▀▄░░██
██░░███▀▀░░░▀▀▄▄█░░██
██░░██▀░▄███▄░▀██░░██
██░░██░░█████░░██░░██
██░░██▄░▀███▀░▄██░░██

██░░███▄▄░░░▄▄███░░██

██░░▀███████████▀░░██

███░░░▀▀▀▀▀▀▀▀▀░░░███

█████▄▄▄▄▄▄▄▄▄▄▄█████

▀███████████████████▀
▄███████████████████▄
█████████████████████
█████████████████████
██████████████▀▀▀████
██████████▀▀░░░░▐████
██████▀▀░░░▄▀░░░█████
████░░░░▄▄▀░░░░▐█████
██████▄▐█░░░░░░██████

███████▌▌░░░░░▐██████

████████▄██▄▄░███████

█████████████████████

█████████████████████

▀███████████████████▀
.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!