Posts

Showing posts from July, 2014

Encrypted Call Tecnhology

Image
CEN-02 Encrypted Android Phone Micro SD card adopts independent hardware encrypted engine; fulfill AES-256 high level encrypt standard; acquire CC EAL5+ approval. ·         AES : Advanced Encryption Standard 256 high level encryption standard. It is stipulated by National Institute of Standards and Technology (NIST). ·         RSA : An algorithm for cryptography. CEN-02 adopts RSA-2048, the length of the code is 2048 binary. ·         CC : Common Criteria, stipulated by National Information Assurance Partnership (National Security Agency subjection) ·         EAL : Evaluation Assurance Level, issued by National Information Assurance Partnership after tested. ·         FIPS 140-2 Level 3.is a   U.S. government   computer security   standard   used to accredit   cryptographic   modules. From Wikipedia, Security Level 3 attempts to prevent the intruder from gaining access to CSPs held within the cryptographic module. Physical security mechanisms required at Security Level 3 a

Keep your mobile device secure !

Image
Nov. 18. 2013 ABC news stated that Australian intelligence tried to listen in to Indonesian President Susilo Bambang Yudhoyono's mobile phone. Feb. 23. 2014 Reuters’ news stated that NSA has stepped up its surveillance of senior German government officials since being ordered by  Barack Obama  to halt its spying on Chancellor Angela Merkel. From NSA’s worldwide spying operations, all mobile user need to think about security on mobile device. There are various encrypted mobile communication devices you can find on  the market. One is hardware based encryption group and other is software base encryption group. What is the difference between the software and hardware encryption? From ehow Software-based encryption uses the computer's program to encrypt data and Software encryption often uses the user's password as the encryption key that scrambles the data. The encrypted data is secure, only as safe as your computer. If hackers can get malicious code onto the co

Encrypted phone is useful or not ?

Someone give me below comments on the encrypted phone - If you are a target for an intelligence agency or any entity having enough financial resources to buy a GSM interceptor , have a guess on what they will do in case the you use an encrypted cell phone. - The phone number dialled by you or the phone number that is calling you. Hence, they can figure out the caller location and even his real identity. It is only a matter of time. They can (and they will do) tape his cell phone in order to find out who it is and what your relation with him is. - The conversation length, time stamped. - Your location at the moment of phone conversation. - Your geographical location at every moment, by some simple and effective triangulation techniques. Yes, it is correct. But all process take time. It is better to talk the "important issue" face by face. But do you have time to do it even you both are not in the same country ? Encrypted phone is a solution for those who cares abo

Who need encrypted phone ?

From the National Security Agency document leaked by Edward Snowden show that government spies are capable of listening in on mobile phone calls.  Our mordern word go round the encryption , for example: mobile payment, credit card, mobile phone call. Public concern about their privancy, their right, so there are encrypted phone in the marekt. Who need it ? The person who cares about privancy.   

Are you safe in your voice call ?

As smart phone phones are becoming more necessary device in our life, it likes a pocket-sized computers, all our network communication go through it.  From current NSA spying, Edward Snowden n ews and Police tracing phone call, we should aware the importance on our network privacy.   There are various anti-syp device (software and hardware) in the market. The  hardware device  is more reliable and secure then software.  For the hardware device, you can find blackphone, encrypted phone and others in the market. There is also another choice, user do not need to buy a new phone, just insert the encrypted micro SD card. This card create encrypted code for each call, it just like a encrypted key generator.