Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Security Smartphones
Use Modified Android Operating System
Infrastructure and Technology Requirements
Benefits to Businesses
Evolution of Idea
a. Cyber Dust
Cyber Dust Application
iPhone and Android Operating Systems
b. Daily Security Threats
Choose Carriers & Vendors
Qihoo 360 Security
Countermeasures to over-claims of permissions
Blackphone and CryptoPhone
Scores 7/7 w/ EFF
Scores 5/7 with EFF
Cyber Dust Application
Android & iPhone
Businesses that use smartphone security?
GSMK CryptoPhone 500
Geeksphone + Silent Circle
Silent Circle apps
VPN from Disconnect
SpiderOak cloud storage
Secure search & browse
Remote wipe & protect
Samsung Galaxy S III
GSMK’s Android OS
Voice & message encryption
Verifiable source code
Two-layer storage encryption
$3,500.00 w/ 3 yrs of service (not including calling charges)
"Which do you recommend?"
Panicked about Security?
Only Slightly Paranoid?
Android + Cyber Dust
E. Dowskin, "Hackproof Phones?" WSJ.
W. Fang et al, "Permissions Based Android Security," Computers & Security.
S. Mlot, "Only 6 Messaging Apps Are Secure," PCMag.
D. Talbot, "Ultraprivate Smartphones," Technology Review.
S. Mlot, "Blackphone Promises NSA-Proof Smartphone," PCMag.
C. Albanesius, "NY,San Fran Officials Praise iOS 7s Security Features," PCMag.
M. Eddy, "Qihoo 360 Security," PCMag.
A. Jakakumar, "As Mobile Device Privacy Hits Spotlight," Washington Post.
A. Regalado et al, "Spies, Technology, Business," Technology Review.
S. Schechner, "Corporate News," WSJ.
T. Simonite, "For $3500, A Spy-Resistant Smartphone," Technology Review.
P. Kirby, "ACLU Complains to FTC about Android Security," Cyber Security Policy Report.
Smartphone Security Measures:
Risks & Challenges
Stay Logged In
Need secure correspondence
"Estimated that U.S. companies lose $250 billion a year to intellectual-property theft"
-Keith Alexander (2012)
1 yr Silent Circle Mobile
1 yr “Friends & Family” Silent Circle Subscription
1 yr Disconnect (1GB per month)
1 yr SpiderOak (5GB per month)
International Power Adapter Kit
GSMK Encryption Engine
Snowden Effect Blackphone