& cplSiteName &

Privacy-Protecting 'Blackphone' to Ship in Three Weeks

Mitch Wagner
6/12/2014
50%
50%

SAN FRANCISCO -- MIT Technology Review Digital Summit -- "Blackphone," a privacy-protecting secure smartphone, is due to ship in three weeks from Silent Circle, a company co-founded by encryption pioneer Phil Zimmermann.

The Android-based Blackphone, produced in partnership with Geeksphone, will be available from carriers priced at $629, Silent Circle LLC President Zimmermann said Tuesday at a presentation at the conference here.

Silent Circle hopes to see significant demand for its product based on growing awareness of privacy and security, Zimmermann said. "More and more people are waking up to this problem," he said. "There's a growing number of people who want to push back." About 60% of people are willing to give up private information indiscriminately, but that still leaves a big potential market for Blackphone. Silent Circle expects to sell millions of the phones, Zimmermann said.

Silent Circle and Geeksphone unveiled the Blackphone at Mobile World Congress in February, and sold out its first batch of several thousand in weeks. FreedomPop also launched a secure phone -- nicknamed the "Snowden Phone" -- at about the same time. (See Blackphone Unveils Secure Smartphone, FreedomPop Launches 'Snowden Phone'.)

Silent Circle's Blackphone and encrypted communication software is designed to protect users against criminal organizations, private companies seeking information about customers and potential customers, as well as overreaching governments. Zimmermann compared Silent Circle's role to the fictional Spider-Man, who battles both criminals and corrupt authorities.

User control
Silent Circle isn't opposed to services that require users to give up information, said company chief scientist Javier Agüera. "We just want to give users control," he said. For example, Agüera said he's happy to use Google Maps to get driving directions and traffic information, and he gives up his location information to do so.

In addition to providing end-to-end encryption with other Blackphone users, Blackphone also allows users to control the data they send out to external sensors. For example, WiFi basestations can detect the locations of nearby WiFi devices such as phones even if those devices don't establish a connection. Blackphone allows its users to mask those signals, by activating WiFi only when the phone is near the home and office.

Blackphone protects application privacy by monitoring what information applications require to operate and giving the user the option to, basically, lie to the app. The phone's Security Center that tells users what information every application needs and allows users to block the app from getting the information, or trick the app with fake information. For example, an app like a recorder might require access to the phone address book to operate. The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty,'" Zimmermann said. "We help you do guerrilla tricks to get what you want."

Silent Circle is not just a bunch of privacy nuts operating out of a garage. The company announced last month that it had raised $30 million in private funding from investors including Ross Perot Jr. and private investment fund Cain Capital LLC. The company claims customers including consumers in over 130 countries, 23 of the global Fortune 50 enterprises and governments from 11 nations.

Distributors include Dutch telco KPN, through which Silent Circle expects to sell hundreds of thousands of phones in Germany, where KPN is present through its ownership of E-Plus, Zimmermann said. Silent Circle has deals with other telcos too.

Silent Circle also has relationships with governments, including US Navy SEALs, and special operation forces for the UK and Canada. "We have government customers who are using us with lives on the line," Zimmermann said. That gives Silent Circle a peculiarly split relationship with governments -- security agencies who want to monitor communications find Silent Circle products to be obstacles to their work, but other government agencies use Silent Circle services for protection.

Bonnie & Clyde
Messages sent from one Blackphone to another will be encrypted end-to-end, while those sent from a Blackphone to an unsecured device will at least be encrypted from the Blackphone to Silent Circle's servers.

Silent Circle is committed to providing security updates for the phone, Agüera said. That's extremely important in security -- it's not enough for vendors to protect users against today's threats. Users need protection against future threats as well.

In addition to Blackphone, Silent Circle makes privacy apps including Silent Phone, for voice and video calls on iOS, Android, and desktop, as well as Silent Text, with a "Burn" feature that automatically deletes messages and attachments from the sender and recipient machines.

Privacy technology makes strange partnerships. Zimmermann said he was a peace activist in the 80s and teamed up with former Navy SEAL Mike Janke to form the company. Janke is Silent Circle's CEO. One of the company's most valued advisors is a hacker who finds exploits and sells them to governments or criminals -- whoever pays more.

During the Q&A following the Silent Circle presentation, one audience member asked whether the company is concerned about criminals and terrorists using the Blackphone. Zimmermann responded that criminals and terrorists always use technology, but that doesn't make the technology bad. Bonnie & Clyde used cars to outrun police when robbing banks, and terrorists today use car bombs. But no reasonable person blames cars or wants to ban them.

— Mitch Wagner, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profileFollow me on Facebook, West Coast Bureau Chief, Light Reading. Got a tip about SDN or NFV? Send it to wagner@lightreading.com.

(23)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 3   >   >>
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/29/2014 | 10:56:26 PM
Re: A lot of great features in this product
@Susan,

I'm sure the NSA would find out soon enough that you're sending them dummy data. The true upside is deterring rogue apps from siphoning your data.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/28/2014 | 12:22:07 PM
Re: A lot of great features in this product
pcharles, 

That's an excellent idea. :) Maybe it helps a little when the NSA tries to get some data out from the iPhones. 

-Susan 
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/28/2014 | 10:03:18 AM
Re: A lot of great features in this product
@Susan,

Here's an idea. They should release an iPhone app that does the same thing. At least fooling the apps to think the Address Book, Contacts, and Albums are empty.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/27/2014 | 7:38:44 AM
Re: A lot of great features in this product
pcharles, 

Yes, true. 

This is one of my favorite parts:

"The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty, . . . "  :D 

For all those applications that want access to your contacts it could be the same. Oh, yes, here's all the contacts. Oops. There are no contacts. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
7/22/2014 | 9:02:29 AM
Re: A lot of great features in this product
@Susan,

Sounds cool. They should make apps like that for computers too. Seems like the dummy data would thwart hackers.
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
7/1/2014 | 6:36:02 AM
Re: A lot of great features in this product
pcharles, 

From the article: 

"Blackphone protects application privacy by monitoring what information applications require to operate and giving the user the option to, basically, lie to the app. The phone's Security Center that tells users what information every application needs and allows users to block the app from getting the information, or trick the app with fake information. For example, an app like a recorder might require access to the phone address book to operate. The Blackphone tells the app that it can have address to the address book, and then falsely reports the address book has nothing in it. "We lie and say, 'oh, yes, here's your address book -- oh, it's empty, . . . "

That, for example. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
6/30/2014 | 11:35:34 PM
Re: A lot of great features in this product
I understand that. But what I'm getting at is, with the 'security' & 'privacy' being the main differentiator between this phone & all other Android phones, what's the upper limit on the security & privacy? Is the expectation that no one can trace your calls, texts, etc?
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
6/30/2014 | 8:19:46 PM
Re: A lot of great features in this product
pcharles,

The main feature of this phone is to protect your privacy and it has good security. 

-Susan
pcharles09
50%
50%
pcharles09,
User Rank: Light Beer
6/30/2014 | 6:44:40 PM
Re: A lot of great features in this product
The more important question is if the authorities will start snooping if you have this phone. My guess is that the carriers will have a roster of everyone with this device, right?
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Blogger
6/29/2014 | 12:35:00 AM
Re: A lot of great features in this product
SachinEE, 

"The big question being asked is whether the privacy feature on the phones will cost people more than expected"

You can see that Mitch wrote the price of the phone in the second paragraph: 

"The Android-based Blackphone, produced in partnership with Geeksphone, will be available from carriers priced at $629, . . . "

-Susan
Page 1 / 3   >   >>
Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Wednesday, August 3, 1:00PM EDT
The Central Office Re-Architected as a Data Center
Guru Parulkar, Executive Director, Open Networking Research Center, Open Networking Lab
UPCOMING COURSE SCHEDULE
Wednesday, August 10, 1:00PM EDT
Telcos & Open Source 101
Phil Robb, Senior Technical Director, OpenDaylight
Friday, August 12, 1:00PM EDT
The Role of Open Source in NFV
Jim Fagan, Director, Cloud Practice, Telstra
Wednesday, August 17, 1:00PM EDT
Using Open Source for Data Centers and Cloud Services
Roz Roseboro, Senior Analyst, Heavy Reading
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
Reinventing Operations for a Virtual, Software-Defined World

7|28|16   |   5:23   |   (0) comments


Heavy Reading Senior Analyst Jim Hodges speaks with Accenture's Larry Socher and Matt Anderson about what service providers must do to transform their business to get the benefits of SDN and NFV including: leveraging DevOps, introducing real-time OSS and implementing analytics.
Women in Comms Introduction Videos
Fujitsu Sales Leader Shares Lessons Learned

7|27|16   |   5:12   |   (0) comments


As Fujitsu's only female sales leader, Annie Bogue knows the importance of asking for what you want, being flexible (she's been relocated five times), keeping a meticulous calendar, 'leaning in,' working harder than everyone else around you, being aware and more.
Telecom Innovators Video Showcase
VeEX Test & Measurement Solutions

7|25|16   |   08:57   |   (0) comments


Cyrille Morelle, president and CEO of VeEX Inc., talks test and measurement with Light Reading's Steve Saunders at BCE 2016. This includes innovative products such as VeSion Cloud-Based platform for network monitoring; MTTplus Modular Test platform for Access, Business, Carrier Ethernet, Transport and Core services; and OPX-BOX+ for Fiber Optics.
LRTV Custom TV
VeEX: Live From BCE 2016

7|25|16   |   03:20   |   (0) comments


VeEX's Senior Director of Business Development, Perry Romano, explains how VeEX provides tools to help install, maintain, monitor and manage network infrastructure efficiently and effectively. The portfolio of products on display include the RXT-6000, MTTplus and TX300s.
LRTV Custom TV
Real-Time Telemetry & Analytics for Intelligent SDN Orchestration

7|25|16   |   03:09   |   (0) comments


Packet Design CEO Scott Sherwood discusses how real-time network telemetry and analytics are enabling a new breed of SDN orchestration applications.
From the Founder
The Russo Report: Driving Disruption

7|25|16   |   07:44   |   (0) comments


In the first episode of a four-part series, Light Reading Founder and CEO Steve Saunders and Calix President and CEO Carl Russo drive around town discussing the disruptive mega-changes in the communications industry and where hope lies for service providers to meet the escalating demands of the cloud.
LRTV Custom TV
NetScout: Maximizing Enterprise Cloud for Digital Transformation

7|20|16   |   04:53   |   (0) comments


Light Reading Editor Mitch Wagner talks to NetScout CMO Jim McNiel about maximizing the benefits of enterprise cloud and digital transformation while minimizing potential pitfalls with a proper monitoring and instrumentation strategy.
Women in Comms Introduction Videos
Ciena's VP Offers a Career Crash Course

7|20|16   |   4:14   |   (2) comments


How did Ciena's Vice President of Sales, Angela Finn, carve out her career path? Simple, she tells WiC. She stayed true to her company, customers and principles. She shares her advice for women on how to be authentic and credible, as well as for companies that want to make a real change to their culture and practices.
LRTV Custom TV
NFV in 2016: Part 2 – Climbing the Virtualization Maturity Curve

7|19|16   |   06:56   |   (0) comments


Many of the initial use case implementations are single-vendor and self-contained. The industry is still climbing the virtualization maturity curve, needing further clarity and stability in the NFV infrastructure (NFVi) and greater availability and choice of virtualized network functions (VNFs). Interoperability between NFVis and VNFs from different vendors ...
Telecom Innovators Video Showcase
Versa Networks' Kumar Mehta on SD-WAN Managed Services

7|19|16   |     |   (0) comments


In Silicon Valley, Steve Saunders sits down with Versa's Kumar Mehta for an interview focused on why service providers are building SD-WAN managed services, and how Versa's telco customers are innovating.
LRTV Custom TV
Juniper Networks & The Evolution of NFV

7|19|16   |   06:01   |   (0) comments


Senior Juniper Networks executives talk to Light Reading Founder & CEO Steve Saunders about NFV developments and the recent independent evaluation by test lab EANTC of Juniper's Cloud CPE solution.
LRTV Interviews
CenturyLink Goes Beyond Managed WiFi

7|19|16   |     |   (0) comments


CenturyLink's managed WiFi allows enterprises, such as retailers and resorts, to track guest WiFi usage in order to help them better communicate with customers.
Upcoming Live Events
September 13-14, 2016, The Curtis Hotel, Denver, CO
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 6-8, 2016,
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Five of the Top 10 most targeted countries in Check Point Software Technologies' global Malware & Threat Index for Q1 2016 are in Africa.
Hot Topics
Verizon Sports Big Plans for Yahoo
Alan Breznick, Cable/Video Practice Leader, Light Reading, 7/26/2016
Light Reading Beyond
Steve Saunders, CEO and founder, Light Reading, 7/28/2016
Are IP/Optical Integration Initiatives Moving to Silos?
Faisal Khan, Network Operator Technology Planning Dept., 7/28/2016
Yahoo Signing Off in $4.83B Sale to Verizon
Mari Silbey, Senior Editor, Cable/Video, 7/25/2016
Facebook Gets Its Drone On
Ray Le Maistre, Editor-in-chief, 7/22/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
There's no question that, come 2020, 5G technology will turn the world's conception of what mobile networking is on its head. Within the world of 5G development, Dr. ...
I've enjoyed interviewing many interesting people since I rejoined Light Reading, but William A. "Bill" Owens certainly takes the biscuit, as we say where I come from.
Animals with Phones
Live Digital Audio

Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.