& cplSiteName &

Privacy-Protecting 'Blackphone' to Ship in Three Weeks

Mitch Wagner
6/12/2014
50%
50%

SAN FRANCISCO -- MIT Technology Review Digital Summit -- "Blackphone," a privacy-protecting secure smartphone, is due to ship in three weeks from Silent Circle, a company co-founded by encryption pioneer Phil Zimmermann.

The Android-based Blackphone, produced in partnership with Geeksphone, will be available from carriers priced at $629, Silent Circle LLC President Zimmermann said Tuesday at a presentation at the conference here.

Silent Circle hopes to see significant demand for its product based on growing awareness of privacy and security, Zimmermann said. "More and more people are waking up to this problem," he said. "There's a growing number of people who want to push back." About 60% of people are willing to give up private information indiscriminately, but that still leaves a big potential market for Blackphone. Silent Circle expects to sell millions of the phones, Zimmermann said.

Silent Circle and Geeksphone unveiled the Blackphone at Mobile World Congress in February, and sold out its first batch of several thousand in weeks. FreedomPop also launched a secure phone -- nicknamed the "Snowden Phone" -- at about the same time. (See Blackphone Unveils Secure Smartphone, FreedomPop Launches 'Snowden Phone'.)

Silent Circle's Blackphone and encrypted communication software is designed to protect users against criminal organizations, private companies seeking information about customers and potential customers, as well as overreaching governments. Zimmermann compared Silent Circle's role to the fictional Spider-Man, who battles both criminals and corrupt authorities.

User control
Silent Circle isn't opposed to services that require users to give up information, said company chief scientist Javier Agüera. "We just want to give users control," he said. For example, Agüera said he's happy to use Google Maps to get driving directions and traffic information, and he gives up his location information to do so.

In addition to providing end-to-end encryption with other Blackphone users, Blackphone also allows users to control the data they send out to external sensors. For example, WiFi basestations can detect the locations of nearby WiFi devices such as phones even if those devices don't establish a connection. Blackphone allows its users to mask those signals, by activating WiFi only when the phone is near the home and office.

Blackphone protects application privacy by monitoring what information applications require to operate and giving the user the option to, basically, lie to the app. The phone's Security Center that tells users what information every application needs and allows users to block the app from getting the information, or trick the app with fake information. For example, an app like a recorder might require access to the phone address book to operate. The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty,'" Zimmermann said. "We help you do guerrilla tricks to get what you want."

Silent Circle is not just a bunch of privacy nuts operating out of a garage. The company announced last month that it had raised $30 million in private funding from investors including Ross Perot Jr. and private investment fund Cain Capital LLC. The company claims customers including consumers in over 130 countries, 23 of the global Fortune 50 enterprises and governments from 11 nations.

Distributors include Dutch telco KPN, through which Silent Circle expects to sell hundreds of thousands of phones in Germany, where KPN is present through its ownership of E-Plus, Zimmermann said. Silent Circle has deals with other telcos too.

Silent Circle also has relationships with governments, including US Navy SEALs, and special operation forces for the UK and Canada. "We have government customers who are using us with lives on the line," Zimmermann said. That gives Silent Circle a peculiarly split relationship with governments -- security agencies who want to monitor communications find Silent Circle products to be obstacles to their work, but other government agencies use Silent Circle services for protection.

Bonnie & Clyde
Messages sent from one Blackphone to another will be encrypted end-to-end, while those sent from a Blackphone to an unsecured device will at least be encrypted from the Blackphone to Silent Circle's servers.

Silent Circle is committed to providing security updates for the phone, Agüera said. That's extremely important in security -- it's not enough for vendors to protect users against today's threats. Users need protection against future threats as well.

In addition to Blackphone, Silent Circle makes privacy apps including Silent Phone, for voice and video calls on iOS, Android, and desktop, as well as Silent Text, with a "Burn" feature that automatically deletes messages and attachments from the sender and recipient machines.

Privacy technology makes strange partnerships. Zimmermann said he was a peace activist in the 80s and teamed up with former Navy SEAL Mike Janke to form the company. Janke is Silent Circle's CEO. One of the company's most valued advisors is a hacker who finds exploits and sells them to governments or criminals -- whoever pays more.

During the Q&A following the Silent Circle presentation, one audience member asked whether the company is concerned about criminals and terrorists using the Blackphone. Zimmermann responded that criminals and terrorists always use technology, but that doesn't make the technology bad. Bonnie & Clyde used cars to outrun police when robbing banks, and terrorists today use car bombs. But no reasonable person blames cars or wants to ban them.

— Mitch Wagner, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profileFollow me on Facebook, West Coast Bureau Chief, Light Reading. Got a tip about SDN or NFV? Send it to wagner@lightreading.com.

(23)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 3   >   >>
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/29/2014 | 10:56:26 PM
Re: A lot of great features in this product
@Susan,

I'm sure the NSA would find out soon enough that you're sending them dummy data. The true upside is deterring rogue apps from siphoning your data.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/28/2014 | 12:22:07 PM
Re: A lot of great features in this product
pcharles, 

That's an excellent idea. :) Maybe it helps a little when the NSA tries to get some data out from the iPhones. 

-Susan 
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/28/2014 | 10:03:18 AM
Re: A lot of great features in this product
@Susan,

Here's an idea. They should release an iPhone app that does the same thing. At least fooling the apps to think the Address Book, Contacts, and Albums are empty.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/27/2014 | 7:38:44 AM
Re: A lot of great features in this product
pcharles, 

Yes, true. 

This is one of my favorite parts:

"The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty, . . . "  :D 

For all those applications that want access to your contacts it could be the same. Oh, yes, here's all the contacts. Oops. There are no contacts. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/22/2014 | 9:02:29 AM
Re: A lot of great features in this product
@Susan,

Sounds cool. They should make apps like that for computers too. Seems like the dummy data would thwart hackers.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/1/2014 | 6:36:02 AM
Re: A lot of great features in this product
pcharles, 

From the article: 

"Blackphone protects application privacy by monitoring what information applications require to operate and giving the user the option to, basically, lie to the app. The phone's Security Center that tells users what information every application needs and allows users to block the app from getting the information, or trick the app with fake information. For example, an app like a recorder might require access to the phone address book to operate. The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty, . . . "

That, for example. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
6/30/2014 | 11:35:34 PM
Re: A lot of great features in this product
I understand that. But what I'm getting at is, with the 'security' & 'privacy' being the main differentiator between this phone & all other Android phones, what's the upper limit on the security & privacy? Is the expectation that no one can trace your calls, texts, etc?
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
6/30/2014 | 8:19:46 PM
Re: A lot of great features in this product
pcharles,

The main feature of this phone is to protect your privacy and it has good security. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
6/30/2014 | 6:44:40 PM
Re: A lot of great features in this product
The more important question is if the authorities will start snooping if you have this phone. My guess is that the carriers will have a roster of everyone with this device, right?
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
6/29/2014 | 12:35:00 AM
Re: A lot of great features in this product
SachinEE, 

"The big question being asked is whether the privacy feature on the phones will cost people more than expected"

You can see that Mitch wrote the price of the phone in the second paragraph: 

"The Android-based Blackphone, produced in partnership with Geeksphone, will be available from carriers priced at $629, . . . "

-Susan
Page 1 / 3   >   >>
From The Founder
Kicking off BCE 2017, Light Reading founder Steve Saunders lays blame for NFV's slow ramp-up and urges telecom to return to old-fashioned standards building and interoperability.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
Women in Comms Introduction Videos
Infinera's Sales Director Paints Tech's Big Picture

6|21|17   |   4:14   |   (1) comment


Shannon Williams, Infinera's director of sales, shares how she achieves work's many balancing acts -- between her role and the broader company, today and tomorrow's tech and more.
LRTV Custom TV
SD-WAN Innovation & Trends

6|20|17   |     |   (0) comments


Versa CEO Kelly Ahuja discusses with Carol Wilson the current status and trends in the SD-WAN market, Versa's innovation around building a software platform with broad contextualization, and the advantages that startups can bring to the SD-WAN market.
LRTV Interviews
Ovum's Dario Talmesio on 5G in Europe

6|20|17   |   02:16   |   (0) comments


At 5G World 2017, Dario Talmesio, principal analyst and practice leader on Ovum's fixed and mobile telecoms European team, explains the emerging trends amongst European operators as they prepare for 5G.
LRTV Custom TV
Putting Power on a Pedestal

6|19|17   |     |   (0) comments


ARRIS's John Ulm says a major accomplishment of SCTE•ISBE's Energy 2020 program is increased focus on power cost and consumption, including inclusion of energy requirements in operators' RFPs and RFIs.
LRTV Custom TV
Gigabit Access: The Last-Mile Pipe for All Future Services

6|19|17   |     |   (0) comments


A Gigabit access platform being deployed today must be able to deliver all types of services to an increasing number of devices. A non-blocking architecture is necessary to support the ever-increasing growth in bandwidth demand. The Huawei Gigabit access solution is based on a distributed design that is fully scalable to deliver a unprecedented performance.
LRTV Custom TV
Key Factors to Successfully Deploy an SD-WAN Service

6|19|17   |     |   (0) comments


As service providers transition their SD-WAN solution from trials and limited deployments into production at large scale, there are important considerations to successfully operationalize these solutions and realize their full potential, without adding complexity, introducing uncertainty or disrupting current business operations. Sunil Khandekar, CEO and Founder ...
LRTV Custom TV
IoT Solutions: Rational Exuberance

6|19|17   |     |   (0) comments


IoT solutions are morphing from hype into viable business opportunities. Huawei has the platform and ecosystem support to help carriers successfully address new business opportunities in the IoT space.
LRTV Custom TV
Realizing ICN as a Network Slice for Mobile Data Distribution

6|19|17   |     |   (1) comment


Network slicing in 5G allows the potential introduction of new network architectures such as Information-centric Networks (ICN) as a slice, managed over a shared pool of compute, storage and bandwidth resource. Services over an ICN slice can benefit from many architectural features such as Name Based Networking, Security, Multicasting, Multi-homing, Mobility, ...
LRTV Interviews
Ovum's Mike Roberts on 5G Uptake

6|19|17   |   04:08   |   (0) comments


Mike Roberts, research director for Ovum's service provider markets group, explains why he has boosted his 5G subscriptions forecast.
LRTV Interviews
AT&T's Hubbard on Intersection of SD-WAN & MPLS

6|15|17   |     |   (0) comments


Rick Hubbard, SVP of Network Product Management for AT&T Business Solutions, discusses how AT&T's approach to SD-WAN fits in with its overall virtualization strategy, explains how SD-WAN can improve enterprise customers' use of the cloud and addresses the intersection of SD-WAN and MPLS.
Telecom Innovators Video Showcase
Keep Connected IoT Devices Under Control With Allot

6|15|17   |     |   (0) comments


Allot AVP of International Pre-Sales, Daniel Keidar, explains how communications service providers can protect infrastructure and service availability from flooding attacks caused by malfunctioning or bot-infected devices connected to their network.
LRTV Custom TV
ZTE 5G World Highlights

6|15|17   |     |   (0) comments


ZTE showcases its leading 5G innovations at 5G World in London.
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Verizon Warns of $500M Hit From Yahoo Deal
Iain Morris, News Editor, 6/16/2017
Netflix's Lesson in Culture Expectation Settings
Sarah Thomas, Director, Women in Comms, 6/21/2017
Can Comcast Beat Customer Hate With a Private Cloud?
Mitch Wagner, Editor, Enterprise Cloud, 6/15/2017
Kalanick Steps Down as Uber CEO
Sarah Thomas, Director, Women in Comms, 6/21/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.