Encrypted Blackphone goes to war with snoopers - Phys.Org

Encrypted Blackphone goes to war with snoopers
2 hours ago by Rob Lever

Mike Janke, CEO & Co-Founder of Silent Circle, makers of encrypted technology for mobile and desktop devices and email, stands January 16, 2014, at his National Harbor, Maryland office

It's a fully encrypted smartphone that aims to foil snooping governments, industry rivals and hackers.

It's also a sleek, attractive device that fits in your pocket and can impress friends and colleagues, according to its makers.

The Blackphone is set to be released next month by the secure communications firm Silent Circle and the small Spanish-based manufacturer Geeksphone, amid a fever pitch of concern over revelations about vast US surveillance of data and telephony.

But Silent Circle chief executive Mike Janke said his company was working on the handset even before last year's revelations about the wide-ranging US National Security Agency programs, leaked by former contractor Edward Snowden.

"We did this because there was a problem that was not being solved: ," Janke told AFP in an interview in the Silent Circle offices overlooking the Potomac River just outside Washington.

Silent Circle was formed in 2011 and in 2013 launched apps and other services which allow smartphone and PC users to send encrypted messages and videos.

The Blackphone is an extension of that effort, says Janke, a former Navy SEAL who co-founded the firm with other ex-SEALs and Silicon Valley cryptographic experts.

"We offer completely encrypted, peer-to-peer communications. We have encrypted video, encrypted text and secure VoIP (Voice-over-Internet-Protocol) calls," Janke said.

The founders include Phil Zimmermann, who created the widely used PGP (Pretty Good Privacy) standard, and former Apple cryptographic expert Jon Callas.

Last year, Silent Circle halted its encrypted email service to avoid becoming a target after the US government subpoenaed the records of a similar service called Lavabit.

"We destroyed all that data," said Janke, while adding that the company never faced a subpoena.

Silent Circle customers include major global corporations, human rights activists and even the Tibetan government in exile.

Because of its work, he said, "almost all of the major smartphone manufacturers came to us" to collaborate on a more secure smartphone.

Janke said Silent Circle chose to form a joint venture for Blackphone with the small Spanish company which recently began making smartphones using the Firefox operating system.

The larger firms, said Janke, "want to own your soul. These companies are in the business of monetizing data."

Silent Circle developed a modified or "forked" version of Android called PrivatOS for the phone, which is set to be unveiled at Mobile World Congress in Barcelona on February 24.

'It's sexy, it's thin'

The company declined to release detailed specifications or pricing ahead of the unveiling, but Janke said it will be sold around the world at prices lower than the iPhone 5S or Samsung Galaxy S4.

But he maintained it would be comparable in terms of performance to those flagship devices. It is designed as a user-friendly phone that could be carried by executives, government officials, activists or ordinary people.

"It's sexy, it's thin, it's sleek, but it also solves a problem," Janke said.

"You can still go to Google and browse the web, but Google doesn't know who you are. It's a high-end smartphone. The user doesn't have to know how to use or how to spell encryption."

As an added assurance to customers, the Blackphone venture is incorporated in Switzerland with a Swiss data center and has "minimal data retention."

"All we have is the user name you give us and a 10-digit phone number," he said.

Even if the company faced a court order in Switzerland, it could only hand over the user name. Authorities seeking more information would need to subpoena a separate payment processing firm "and try to match that to our users," Janke said.

Janke said there is interest in the device worldwide, and that Blackphone has "verbal pre-orders" from four international telecom carriers and 30 enterprise customers.

Interest in Blackphone, Janke said, suggests "several million" will be sold within 12 months, and some 10 million total over the coming four years.

He did not disclose where the Blackphone would be made, but said there would be "neutral" partners making components and a tightly controlled assembly process to ensure no backdoors are inserted.

Janke said the US State Department wanted to buy some of the phones and distribute them to human rights groups but that the company refused, out of concern that the Blackphone would be associated with the US government.

"We decided to distribute this ourselves," he said.

Customers worldwide are interested "because it's not just the NSA—there are 72 countries that have some NSA-like capabilities and they're all spying on us and on each other. If you're living in Kenya or Germany or Argentina, you have the same threats."

Even though some reports suggest the NSA has found ways to intercept encrypted communications, Janke said his systems will be effective.

"We know that encryption works," he said, adding that "brute force" attacks to break encryption are rare because they are time-consuming, and that spy agencies generally use other means like inserting viruses in emails or hardware that can intercept messages.

Because of this, Janke is careful not to promise too much. He said Blackphone is not a "hardened" device like some designed for military use.

"There is no such thing as a completely secure phone," he said. "Nothing is going to protect you from your own behavior. But out of the box, this phone does a lot of things to protect your privacy."

Explore further: Techies vs. NSA: Encryption arms race escalates

© 2014 AFP

Conventional Current
created2 hours ago I understand, thanks to basic physics concepts, that when the electrons flow through the circuit from the negative...
Dimensional Analysis with non-dimensional initial parameter
created3 hours ago I would like non-dimensionalize the equations which describe a non-Newtonian fluid model. In the constitutive equation...
Earth slowing down...
created9 hours ago I was watching a documentary that examines what happens if the earth slowed to a halt in the span of 5 years. One...
Where did the radian come from (Torque)?
created12 hours ago In the simple torque equation: [tex] \tau_z = \alpha_z \times I [/tex] [tex] \frac{\tau_z}{I} = \alpha_z...
A quick question from a layman about folding space time
created13 hours ago I was just doing some thinking about the folding of space time. I have seen a demonstration that a piece of paper is...
A question about the point of action of the magnetic force
created17 hours ago Hello everyone, Translation of extended objects is described taking the net force acting on the center of mass of...

More from Physics Forums - General Physics

Related Stories

Techies vs. NSA: Encryption arms race escalates

Nov 29, 2013

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs. But the flood of new computer security services is of ...

Yahoo vows to encrypt all its users' personal data (Update)

Nov 18, 2013

Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the ...

NSA eyes encryption-breaking 'quantum' machine

Jan 03, 2014

The US National Security Agency is making strides toward building a "quantum computer" that could break nearly any kind of encryption, The Washington Post reported Thursday.

Report: NSA cracked most online encryption

Sep 05, 2013

The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential ...

Target: Customers' encrypted PINs were stolen

Dec 27, 2013

Target said Friday that debit card PIN numbers were among the financial information stolen from millions of U.S. customers who shopped at the retailer earlier this month.

Google reportedly working on encrypting user files on Google Drive

Jul 19, 2013

CNET, the online tech magazine has apparently found two sources inside of Google who are claiming that the company is embarking on a plan to encrypt user data on Google Drive. Doing so would mean that the U.S. g ...

Recommended for you

20 million people fall victim to S. Korea data leak

1 hour ago

The personal data of at least 20 million bank and credit card users in South Korea has been leaked, state regulators said Sunday, one of the country's biggest ever breaches.

Retail breaches could fuel push for safer cards

Jan 17, 2014

The Target credit and debit card and personal information breach, which last week was revealed to have affected more consumers than originally thought and which may be linked to attacks on other retailers, is expected to ...

Hacker threats rise, with defenders lacking, report says

Jan 16, 2014

A Cisco security report released on Thursday showed that hacker threats reached "startling levels" last year and that the world is suffering from a shortage of skilled computer defenders.

Fujitsu develops technology capable of searching encrypted data to maintain privacy

Jan 15, 2014

Fujitsu Laboratories today announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is encrypted makes it possible to ...

Huawei rejects reports of security weakness

Jan 15, 2014

Chinese tech giant Huawei on Wednesday rejected suggestions its telecoms equipment is vulnerable to hacking and forecast a rise in 2013 profit of nearly 50 percent.

Report: NSA uses radio waves to map pathway into computers

Jan 15, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world—but not in the United States—that allows the U.S. to conduct surveillance on those machines, The New York ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

dogbert

not rated yet 1 hour ago

Excellent!

I need a new phone soon. May have found the phone I need.

More news stories

Flight research center to test shape-changing wing idea

(Phys.org) —Conventional wing designs in the form of hinged flaps are in for a re-think. The Aircraft Owners and Pilots Association has noted how hinged flight control surfaces came along shortly after wing-warping technology developed by the Wright Brother ...

Germany eyes swift cuts in renewable energy subsidies

Germany's new energy minister has outlined cuts in subsidies to producers of renewable energy as the country wrestles with soaring costs from its nuclear power exit, according to a document obtained by AFP ...

Flying car spreads its wings in Slovakia

Mankind's primordial dream of flight is taking off with a new twist as a Slovak prototype of a flying car spreads its wings.

20 million people fall victim to S. Korea data leak

The personal data of at least 20 million bank and credit card users in South Korea has been leaked, state regulators said Sunday, one of the country's biggest ever breaches.

Violence-torn Venezuela creates phone 'panic button'

A free app for certain smartphones that works as a "panic button" in emergencies has launched in Venezuela, one of the world's most violent countries, a lawmaker said Saturday.

Researchers discover how heart arrhythmia occurs

Researchers have discovered the fundamental biology of calcium waves in relation to heart arrhythmias.

Distant quasar illuminates a filament of the cosmic web

Astronomers have discovered a distant quasar illuminating a vast nebula of diffuse gas, revealing for the first time part of the network of filaments thought to connect galaxies in a cosmic web. Researchers ...

How to tap the sun's energy through heat as well as light

A new approach to harvesting solar energy, developed by MIT researchers, could improve efficiency by using sunlight to heat a high-temperature material whose infrared radiation would then be collected by ...

Scientists identify 'molecular fossil' in fungi

(Phys.org) —All but a few eukaryotes die without oxygen, and they respond dynamically to changes in the level of oxygen available to them. UCD scientists used genetic analysis to pinpoint an evolutionary ...

New hope for Gaucher patients

What causes brain damage and inflammation in severe cases of Gaucher disease? Little is known about the events that lead to brain pathology in some forms of the disease, and there is currently no treatment ...

Encrypted Blackphone goes to war with snoopers
2 hours ago by Rob Lever

Mike Janke, CEO & Co-Founder of Silent Circle, makers of encrypted technology for mobile and desktop devices and email, stands January 16, 2014, at his National Harbor, Maryland office

It's a fully encrypted smartphone that aims to foil snooping governments, industry rivals and hackers.

It's also a sleek, attractive device that fits in your pocket and can impress friends and colleagues, according to its makers.

The Blackphone is set to be released next month by the secure communications firm Silent Circle and the small Spanish-based manufacturer Geeksphone, amid a fever pitch of concern over revelations about vast US surveillance of data and telephony.

But Silent Circle chief executive Mike Janke said his company was working on the handset even before last year's revelations about the wide-ranging US National Security Agency programs, leaked by former contractor Edward Snowden.

"We did this because there was a problem that was not being solved: ," Janke told AFP in an interview in the Silent Circle offices overlooking the Potomac River just outside Washington.

Silent Circle was formed in 2011 and in 2013 launched apps and other services which allow smartphone and PC users to send encrypted messages and videos.

The Blackphone is an extension of that effort, says Janke, a former Navy SEAL who co-founded the firm with other ex-SEALs and Silicon Valley cryptographic experts.

"We offer completely encrypted, peer-to-peer communications. We have encrypted video, encrypted text and secure VoIP (Voice-over-Internet-Protocol) calls," Janke said.

The founders include Phil Zimmermann, who created the widely used PGP (Pretty Good Privacy) standard, and former Apple cryptographic expert Jon Callas.

Last year, Silent Circle halted its encrypted email service to avoid becoming a target after the US government subpoenaed the records of a similar service called Lavabit.

"We destroyed all that data," said Janke, while adding that the company never faced a subpoena.

Silent Circle customers include major global corporations, human rights activists and even the Tibetan government in exile.

Because of its work, he said, "almost all of the major smartphone manufacturers came to us" to collaborate on a more secure smartphone.

Janke said Silent Circle chose to form a joint venture for Blackphone with the small Spanish company which recently began making smartphones using the Firefox operating system.

The larger firms, said Janke, "want to own your soul. These companies are in the business of monetizing data."

Silent Circle developed a modified or "forked" version of Android called PrivatOS for the phone, which is set to be unveiled at Mobile World Congress in Barcelona on February 24.

'It's sexy, it's thin'

The company declined to release detailed specifications or pricing ahead of the unveiling, but Janke said it will be sold around the world at prices lower than the iPhone 5S or Samsung Galaxy S4.

But he maintained it would be comparable in terms of performance to those flagship devices. It is designed as a user-friendly phone that could be carried by executives, government officials, activists or ordinary people.

"It's sexy, it's thin, it's sleek, but it also solves a problem," Janke said.

"You can still go to Google and browse the web, but Google doesn't know who you are. It's a high-end smartphone. The user doesn't have to know how to use or how to spell encryption."

As an added assurance to customers, the Blackphone venture is incorporated in Switzerland with a Swiss data center and has "minimal data retention."

"All we have is the user name you give us and a 10-digit phone number," he said.

Even if the company faced a court order in Switzerland, it could only hand over the user name. Authorities seeking more information would need to subpoena a separate payment processing firm "and try to match that to our users," Janke said.

Janke said there is interest in the device worldwide, and that Blackphone has "verbal pre-orders" from four international telecom carriers and 30 enterprise customers.

Interest in Blackphone, Janke said, suggests "several million" will be sold within 12 months, and some 10 million total over the coming four years.

He did not disclose where the Blackphone would be made, but said there would be "neutral" partners making components and a tightly controlled assembly process to ensure no backdoors are inserted.

Janke said the US State Department wanted to buy some of the phones and distribute them to human rights groups but that the company refused, out of concern that the Blackphone would be associated with the US government.

"We decided to distribute this ourselves," he said.

Customers worldwide are interested "because it's not just the NSA—there are 72 countries that have some NSA-like capabilities and they're all spying on us and on each other. If you're living in Kenya or Germany or Argentina, you have the same threats."

Even though some reports suggest the NSA has found ways to intercept encrypted communications, Janke said his systems will be effective.

"We know that encryption works," he said, adding that "brute force" attacks to break encryption are rare because they are time-consuming, and that spy agencies generally use other means like inserting viruses in emails or hardware that can intercept messages.

Because of this, Janke is careful not to promise too much. He said Blackphone is not a "hardened" device like some designed for military use.

"There is no such thing as a completely secure phone," he said. "Nothing is going to protect you from your own behavior. But out of the box, this phone does a lot of things to protect your privacy."

Explore further: Techies vs. NSA: Encryption arms race escalates

© 2014 AFP

Conventional Current
created2 hours agoI understand, thanks to basic physics concepts, that when the electrons flow through the circuit from the negative...
Dimensional Analysis with non-dimensional initial parameter
created3 hours agoI would like non-dimensionalize the equations which describe a non-Newtonian fluid model. In the constitutive equation...
Earth slowing down...
created9 hours agoI was watching a documentary that examines what happens if the earth slowed to a halt in the span of 5 years. One...
Where did the radian come from (Torque)?
created12 hours agoIn the simple torque equation: [tex] \tau_z = \alpha_z \times I [/tex] [tex] \frac{\tau_z}{I} = \alpha_z...
A quick question from a layman about folding space time
created13 hours agoI was just doing some thinking about the folding of space time. I have seen a demonstration that a piece of paper is...
A question about the point of action of the magnetic force
created17 hours agoHello everyone, Translation of extended objects is described taking the net force acting on the center of mass of...

More from Physics Forums - General Physics

Related Stories

Techies vs. NSA: Encryption arms race escalates

Nov 29, 2013

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs. But the flood of new computer security services is of ...

Yahoo vows to encrypt all its users' personal data (Update)

Nov 18, 2013

Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the ...

NSA eyes encryption-breaking 'quantum' machine

Jan 03, 2014

The US National Security Agency is making strides toward building a "quantum computer" that could break nearly any kind of encryption, The Washington Post reported Thursday.

Report: NSA cracked most online encryption

Sep 05, 2013

The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential ...

Target: Customers' encrypted PINs were stolen

Dec 27, 2013

Target said Friday that debit card PIN numbers were among the financial information stolen from millions of U.S. customers who shopped at the retailer earlier this month.

Google reportedly working on encrypting user files on Google Drive

Jul 19, 2013

CNET, the online tech magazine has apparently found two sources inside of Google who are claiming that the company is embarking on a plan to encrypt user data on Google Drive. Doing so would mean that the U.S. g ...

Recommended for you

20 million people fall victim to S. Korea data leak

1 hour ago

The personal data of at least 20 million bank and credit card users in South Korea has been leaked, state regulators said Sunday, one of the country's biggest ever breaches.

Retail breaches could fuel push for safer cards

Jan 17, 2014

The Target credit and debit card and personal information breach, which last week was revealed to have affected more consumers than originally thought and which may be linked to attacks on other retailers, is expected to ...

Hacker threats rise, with defenders lacking, report says

Jan 16, 2014

A Cisco security report released on Thursday showed that hacker threats reached "startling levels" last year and that the world is suffering from a shortage of skilled computer defenders.

Fujitsu develops technology capable of searching encrypted data to maintain privacy

Jan 15, 2014

Fujitsu Laboratories today announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is encrypted makes it possible to ...

Huawei rejects reports of security weakness

Jan 15, 2014

Chinese tech giant Huawei on Wednesday rejected suggestions its telecoms equipment is vulnerable to hacking and forecast a rise in 2013 profit of nearly 50 percent.

Report: NSA uses radio waves to map pathway into computers

Jan 15, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world—but not in the United States—that allows the U.S. to conduct surveillance on those machines, The New York ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

dogbert

not rated yet 1 hour ago

Excellent!

I need a new phone soon. May have found the phone I need.

More news stories

Flight research center to test shape-changing wing idea

(Phys.org) —Conventional wing designs in the form of hinged flaps are in for a re-think. The Aircraft Owners and Pilots Association has noted how hinged flight control surfaces came along shortly after wing-warping technology developed by the Wright Brother ...

Germany eyes swift cuts in renewable energy subsidies

Germany's new energy minister has outlined cuts in subsidies to producers of renewable energy as the country wrestles with soaring costs from its nuclear power exit, according to a document obtained by AFP ...

Flying car spreads its wings in Slovakia

Mankind's primordial dream of flight is taking off with a new twist as a Slovak prototype of a flying car spreads its wings.

20 million people fall victim to S. Korea data leak

The personal data of at least 20 million bank and credit card users in South Korea has been leaked, state regulators said Sunday, one of the country's biggest ever breaches.

Violence-torn Venezuela creates phone 'panic button'

A free app for certain smartphones that works as a "panic button" in emergencies has launched in Venezuela, one of the world's most violent countries, a lawmaker said Saturday.

Researchers discover how heart arrhythmia occurs

Researchers have discovered the fundamental biology of calcium waves in relation to heart arrhythmias.

Distant quasar illuminates a filament of the cosmic web

Astronomers have discovered a distant quasar illuminating a vast nebula of diffuse gas, revealing for the first time part of the network of filaments thought to connect galaxies in a cosmic web. Researchers ...

How to tap the sun's energy through heat as well as light

A new approach to harvesting solar energy, developed by MIT researchers, could improve efficiency by using sunlight to heat a high-temperature material whose infrared radiation would then be collected by ...

Scientists identify 'molecular fossil' in fungi

(Phys.org) —All but a few eukaryotes die without oxygen, and they respond dynamically to changes in the level of oxygen available to them. UCD scientists used genetic analysis to pinpoint an evolutionary ...

New hope for Gaucher patients

What causes brain damage and inflammation in severe cases of Gaucher disease? Little is known about the events that lead to brain pathology in some forms of the disease, and there is currently no treatment ...



IFTTT

Put the internet to work for you.

via Personal Recipe 4521435

Labels:

Post a Comment

.