Silent Circles Military-Grade Encryption: BYOD Tool?

  /     /     /  
Publicated : 22/11/2024   Category : security


Silent Circles Military-Grade Encryption: BYOD Tool?


Silent Circles encryption tools for smartphones and tablets are a boon for privacy enthusiasts--but enterprises could find them useful too.



Silent Circles suite of apps for smartphones and tablets is designed to make calls, text messages, video chats, and, in coming months, emails virtually invulnerable to surveillance efforts.
Its no surprise the company sensed a market for this sort of service. As technology and terrorist threats have evolved over the last decade, lines between national security efforts, invasive data mining, civil liberties, and Big Brother-like policies have become increasingly difficult to discern. A few recent examples:
Carrier IQ debate
, the FBIs attempts to gain
backdoor access to various electronic communication and social media platforms
, ramped-up domestic surveillance initiatives at both the
federal
and
local
levels, contentious court rulings around businesses that
spy on customers
, and an explosion of data-pilfering
malware
. Privacy concerns have ballooned beyond the ranks of conspiracy theorists to include an increasing number of ordinary citizens.
But what about businesses? As much as average users have reason to proactively protect their privacy, enterprises--thanks in large part to the
BYOD phenomenon
--arguably need to be even more diligent. Many businesses are already invested in a slew of precautions, including next-gen firewalls, mobile application management tools, and more. Does Silent Circle bring something new to businesses that have already deployed such measures?
Absolutely, according to co-founder Mike Janke, a former Navy SEAL and--along with email encryption pioneer Phil Zimmermann--one of the companys co-founders.
Its great that people want to use VPN, he said during a phone interview, but there are nation states and criminal groups breaking them open like coconuts. These ubiquitous encryption tools usually connect to a server where security keys are stored, he explained, making them less than fully secure.
[ Were key details omitted from the FTCs privacy audit of Google? Read more at
Google Privacy Audit Leaves Lingering Questions
. ]
Infiltrating such enterprise-grade perimeters demands a certain level of sophistication, of course. But
elaborate viruses
, many ostensibly designed to breach complex targets such as industrial control systems, are already roaming the Internet. Free access to this malware not only demonstrates that high-level sophistication is already being applied but it also allows less skilled hackers to piggyback on these more accomplished efforts.
The issue of government-sponsored espionage, meanwhile, has been a hot topic, with recent headlines focusing on
Iran
and
China
. The United States, as
Stuxnet
revealed, also has an active stake in cyber-warfares evolution. While these developments can lead to overstated rhetoric, risks remain: data loss can be incredibly damaging, and as strong as some security measures are, they have to contend with talented but unscrupulous people working against them.
Silent Circle isnt a panacea against all of those threats, of course, but it does offer an alternative to the security key dilemma. The products encryption is peer-to-peer, meaning that it is uniquely generated every time a data transfer is initiated and also deleted, either immediately or after a user-defined period, afterward. Silent Circle doesnt store a key that can be used to decrypt data. The result is information thats not only much more difficult to intercept but also more challenging to use if an attacker actually gets his or her hands on it.
Whats more, the interface generally preserves the native app experience, making it user-friendly. As some frustrated IT managers will no doubt agree, security protocols are sometimes subverted by employees who either dont understand all the measures they need to observe or opt for workarounds because they think the policies get in the way of productivity. Janke remarked that Silent Circle deliberately avoided anything too geeky in order to make the experience just like what [users] are used to.
Currently, Silent Circles products work on iOS devices (except for first- and second-generation versions of the iPhone and iPod Touch). Support for additional operating systems, starting with Android, will come online in the coming months.
The companys encryption tools offer potentially powerful capabilities for those who need to secure sensitive data. However, broader MDM and MAM capabilities currently arent included, which means that Silent Circle could be a component in an enterprises security policy but not a complete solution. Given the products focus on privacy, its not likely that this larger set of capabilities is in the cards, but Janke said there are plans for additional features that will appeal to enterprises. He mentioned that real-time collaboration tools and encrypted data storage, for example, should join the suite in 2013.
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new
Holes In BYOD
issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Silent Circles Military-Grade Encryption: BYOD Tool?