{"id":3743,"date":"2014-07-10T10:00:14","date_gmt":"2014-07-10T14:00:14","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=3743"},"modified":"2017-09-24T20:14:18","modified_gmt":"2017-09-24T14:44:18","slug":"blackphone","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/blackphone\/3743\/","title":{"rendered":"The Ups and Downs of the new NSA-Fighting Blackphone"},"content":{"rendered":"<p>The world\u2019s first supposedly completely secure smartphone sold out after just its first two days on sale.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/08\/05093503\/blackphone.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5381\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/08\/05093503\/blackphone.png\" alt=\"blackphone\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Silent Circle\u2019s Android-based Blackphone is designed to block attacks of all kinds, including \u2013 and this is its biggest sales pitch \u2013 snoopers from the NSA.<\/p>\n<p>According to <a href=\"http:\/\/www.worldtechtoday.com\/silent-circles-surveillance-proof-blackphone-a-sellout-success-629-for-proven-privacy\/12272\/edward-jones\" target=\"_blank\" rel=\"noopener nofollow\">World Tech Today\u00a0<\/a>, the Blackphone was spawned directly from Edward Snowden\u2019s revelations about the NSA\u2019s massive domestic surveillance program that has free-ranging abilities to monitor cellphone calls and data transmissions.<\/p><blockquote class=\"twitter-pullquote\"><p>Smart Circle\u2019s Blackphone offers total security, limited usability.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FX6PF&amp;text=Smart+Circle%26%238217%3Bs+Blackphone+offers+total+security%2C+limited+usability.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The backbone of the Blackphone\u2019s security system is its Android-based PrivatOS platform, and its Silent Phone and Silent Text apps. These are encrypted communications services with a common directory service. They work over broadband cellular and Wi-Fi connections, and provide users with voice and video calls, as well as text messaging and data transfer without relying on a server \u2013 that can be vulnerable to data poaching \u2013 in the middle of those communications. The PrivOS platform also includes fine-grained permissions controls.<\/p>\n<div class=\"pullquote\">The Blackphone\u2019s required app sideloading could provide create a malware vulnerability for this otherwise secure device, so users are well-advised by Kaspersky experts to user a mobile AV platform on their Blackphone.<\/div>\n<p>At $629 retail, the Blackphone would do well to live up to its own lofty standards, and an initial review by <a href=\"http:\/\/arstechnica.com\/security\/2014\/06\/exclusive-a-review-of-the-blackphone-the-android-for-the-paranoid\/3\/\" target=\"_blank\" rel=\"noopener nofollow\">Ars Technica\u00a0<\/a>backs up the Blackphone\u2019s security credibility. Their assessment? \u201cBlackphone is pretty damn secure.\u201d<\/p>\n<p>So, initial returns are that the Blackphone is secure, but how does it work in day-to-day smartphone operations?<\/p>\n<p>Because the phone relies on whatever phone networks are available in any given area, call and video call qualities can suffer, according to Ars Technica. And because the Google ecosystem is unavailable on the device \u2013 include Google Play and all apps associated therein \u2013 users will have to sideload third-party apps; Ars Technica notes that Amazon Store apps work well on the device.<\/p>\n<p>But this sideloading could provide create a malware vulnerability for this otherwise secure device, so users are well-advised by Kaspersky experts to user a mobile AV platform on their Blackphone, should they choose to part with the better part of $1,000 to secure their mobile communications privacy.<\/p><blockquote class=\"twitter-pullquote\"><p>Smart Circle\u2019s Blackphone says it can stop the NSA from stealing your data.\u00a0<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FX6PF&amp;text=Smart+Circle%26%238217%3Bs+Blackphone+says+it+can+stop+the+NSA+from+stealing+your+data.%C2%A0\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Ultimately, Ars Technica concludes the phone is a good fit for individuals and businesses that place a high value on privacy and are technically savvy, but it may not be a great fit for non-technical users. And anyone who does decide to use it should be prepared to take extra precautions to make their secure Blackphone even more secure once they begin to add third-party apps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The list of highly touted devices that have been launched in recent years with embarrassing flaws \u2013 security and otherwise \u2013 is long and distinguished.<\/p>\n","protected":false},"author":41,"featured_media":3744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2196],"tags":[105,712,246,36,714,43,713],"class_list":{"0":"post-3743","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-blackcircle","11":"tag-data-theft","12":"tag-malware-2","13":"tag-nsa","14":"tag-privacy","15":"tag-smart-circle"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/blackphone\/3743\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/blackphone\/3644\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/blackphone\/4119\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/blackphone\/4371\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/blackphone\/4300\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/blackphone\/4627\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/blackphone\/5380\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/blackphone\/3562\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/blackphone\/4221\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/blackphone\/4627\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/blackphone\/5380\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/blackphone\/5380\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=3743"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3743\/revisions"}],"predecessor-version":[{"id":8671,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/3743\/revisions\/8671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/3744"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=3743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=3743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=3743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}