Tuesday, October 29, 2013

What is the privacy score of your smartphone?

Clueful
You might know that apps on smartphones ask for permissions upon installing. However, some apps might ask more permission than their function really needs. If you would like to protect your information, than the first step is to check if your smartphone can leak your data. We have tried an app that does the work, Clueful (available for Android and iOS).

Clueful gives a general privacy score, that gives you an idea how safe is your smartphone.

It categorizes the apps into three categories:

  • High risk apps
  • Moderate risk apps
  • Low risk apps

You should really think over to uninstall apps that are in the high risk category. After installation Clueful checks new installations too, and alerts if a new app asks for too many permissions. Filtering by specific types of risks is also available (what apps can send SMS for example).

Check your smartphone, and put your Privacy Score in a comment here. Its free.

Please click +Google or share on Facebook if you found this article interesting.


Friday, October 25, 2013

Did US Tap Chancellor Merkel’s Mobile Phone? - Opinion


I read new articles every day on how Germany complains about NSA spying. Now turned out that there is a high chance that even Merkel’s phone conversations were tapped. What is the main problem behind protecting ourselves?

1. Security solutions come from US

This is a big problem since there is not a single security solution in US that has no backdoor. Even the “most secure” PGP was compromised, however PGP has no connection to any US governmental institutes. Why not to use PGP? Read this: https://github.com/pagekite/Mailpile/issues/79. Blackberry is very popular smartphone in Germany, and guess, what encryption Blackberry uses? Yes, you all right, PGP.

2. Standard mobile encryption solutions

The standards considerably decrease the security level. You now why? Because standard sets rules that is a good help when you try to break an encryption (you know the key lenghts for example). Not mentioning that governmental institutes and corporations have hardware and software resources tailored to break standard encryptions. Any non standard encryption need substantial extra effort to break.

3. Software based solutions

To protect a communication channel you need to protect all information that provides security of that converstion. These are encryption keys in the first place. If you use software base solution, your keys are stored in standard storing elements of your device. These elements (memory for example) are readable, writeable storages, not designed to store anything in a secure way. That means your encryption keys can be read or written. Sounds secure? Not really…

Any solution?

Of course, there is a solution. The keys that provide the security of a communication network have to be stored in a secure place, which MUST BE some kind of a hardware piece. Several solutions are on the market with unique hardware protection, mainly available for governmental use. These are special hardwares, you can not use it with you smartphone. However, Secfone seems to break the rule…

Please click +Google or share on Facebook if you found this article interesting.