Hi.
First, I think the promiscuous "network" permission should be replaced with
more fine-grained ones like "secure web connection to example.com" (or
secure chat/im/mail).
I'd also like to see a mechanism for temporary face-to-face trust (e.g. via
qr-code) of self-signed certificates for situati
Hello:
I'd like to see a mesh mode in the mobile phones. There are currently
lots of mesh software initiatives, but I haven't seen any smartphone
manufacturers support this. In the past, they were dependant of
telecommunication companies to sell their phones, but now some
companies are now startin
(1) A unique key built into each device, which can't be read directly
by software, but which can be used to derive other keys (e.g. for disk
encryption) at a limited rate, slowing down brute-force attacks
against such keys.
(2) An effaceable area of flash storage where the operating system can
st
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Ben,
I'd love to see hardware support for full-disk encryption and secure
deletion. Apple is streets ahead of Android in this respect: iOS's
disk encryption key depends on a unique key built into each device, so
brute-force attempts to decrypt the
On Thu, Jul 11, 2013 at 12:57 PM, Ben Doernberg wrote:
> ...
> What would you change if you were the CEO of a major mobile device
> manufacturer?
open source baseband firmware - these opaque blobs are a security
nightmare and excellent point of attack for an entity with resources.
unfortunately
Hi all,
What would you change if you were the CEO of a major mobile device
manufacturer? One of my colleagues at WITNESS has a unique opportunity to
make a presentation to the CEOs of these companies. He'll be discussing our
work around verified video for human rights abuse documentation, but we'd