The new front line for cyberattacks

Issue 4 2022 Information Security

Privacy relates to any rights you have to control your personal information and how it is used. Security, by contrast, refers to how your personal information is protected. Different data about you resides in multiple places for virtually everyone who is regularly online, challenging your privacy, as well as security. Some people consider privacy and security as pretty much the same thing, but, while similar, they are different, and your mobile communications should have both.

In a world replete with endless cyberattacks, IoT devices have minimal security and it is worthwhile to bear in mind that technology today can amplify the consequences of a successful data breach more than ever. With organisations and individuals alike turning in ever increasing numbers to technology for their communications and transactions, privacy and data security is becoming a necessity, especially now that corporate data exists everywhere and goes everywhere. It lives in the cloud, it travels with us on our smartphone and tablet, it’s shared on countless social media sites and who knows where else.

Worse, a great deal of the data that people and companies deal with daily – sensitive and otherwise – is transmitted over unencrypted channels, much of it “in the open” over wireless networks where the data is easily available to bad actors looking to intercept it.

For this reason,mobile communications must be secured at all costs.

Mobile is the new front line for cyberattacks

The Blackphone PRIVY 2.0 is the smartest defence for encrypted businesses and personal communications. Blackphone is designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy and mobile communications. Built to foil and protect privacy from all surface attacks and brute force, the new generation Blackphone Privy 2.0 is the world’s smartest and most secure defence for encrypted businesses and personal communications.

The Blackphone PRIVY 2.0 has been developed to address every aspect of smartphone security from the technology used to make the handset, through to the OS that runs it and the apps that can be used on it. Even how and where your data is securely held has been covered.

Features of the Blackphone

Military grade end-to-end encryption: Robust and powerful data encryption is a vital component for any security protocol used on the latest smartphones. With the next generation of Blackphone PRIVY 2.0, your communications are fully protected by a wide range of the very latest cryptographic protocols that deliver absolute data security. All your incoming and outgoing communications are secured by end-to-end encryption and only transmitted using an encrypted network. The data created is stored only on the device itself, ensuring it is fully secured and encrypted.

PRIVY Chat and PRIVY Vault: Messaging apps and unencrypted calls pose a risk to your digital communications. The Blackphone PRIVY 2.0 is delivered with preloaded applications that provide secure communications and file storage. These are PRIVY Chat and PRIVY Vault. The applications protect your data while it is in transit, with military grade end-to-end encryption, and securely store the data-at-rest in encrypted databases.

PRIVY Chat and PRIVY Vault include:

• Peer-to-peer chat.

• Secure group-chat.

• Peer-to-peer VoIP calls.

• PGP chat.

• Fully encrypted file storage

• Zero server trace storage.

Much has been written about the significant risks that are posed by tech giants storing your data and files on their own servers. They are often the target of hackers looking to exploit their infrastructure weaknesses to gain access to your information.

To address this issue head on, the Blackphone PRIVY 2.0 does not store any sensitive information from your communications. Each message created in peer-to-peer chats does not reach the locations of Blackphone’s servers. The messages created in the group chats only use Blackphone’s infrastructure to distribute the shared information. These messages are not stored for more than a week, after which they are deleted, leaving no trace.

The VoIP calls only use Blackphone’s servers to establish a connection between the peers. These privacy-focused methods have been specially developed to assure your absolute privacy.

Secure OS: The threat posed by hackers and how they operate is forever changing and evolving. Their attack methods are now using multiple endpoints and backdoors, rather than simply employing a single attack vector.

The standard consumer-grade operating systems (OS), such as Android and iOS, pay a great deal of attention to developing the user experience and functionalities, all of which comes at the expense of comprehensive security. This approach to functionality over security means that their offerings are more easily exploited by hackers. Their technical expertise and know-how mean your data is accessible to any third party that desires it.

The Blackphone PRIVY 2.0 is powered by Secure OS, which is a specially adapted operating system based on Android to focus heavily on the security factors. It deploys multiple defence layers to isolate, encrypt, and secure your data against any mobile threat.

The Secure OS deploys:

• Zero attack surface.

• Military grade encryption.

• Triple password protection.

• Verified boot.

• Trusted updates.

• Silent Phone by Silent Circle.

Silent Phone is an end-to-end encrypted application which allows users to make calls, send instant messages, and share files with other users that have the application on their device. This allows the Blackphone PRIVY 2.0 to communicate with any iOS or Android device, providing significantly wider reach and compatibility with any other secure phone.

Blackphone PRIVY 2.0 is delivered with a multi-IMSI SIM card that provides unlimited data coverage worldwide. It also includes the built-In SS7 Firewall and VPN. The SS7 Firewall helps prevent hackers from gaining access to your telephone signal as it transfers from one network to another. The VPN means that your communications are transmitted via an encrypted tunnel between you and your contact.

With these added features, it means you will be able to securely and privately communicate across the world.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...