Smartphones have become an extension of our hand, a significant part of our daily life. And when it comes to privacy and security, it is always a tricky subject to discuss, especially because of the “revolution” that happened a while back, concerning Wikileaks and ex-NSA employee Edward Snowden. And when you insert Rule 41, a set of laws passed by congress for mass surveillance, smartphone security becomes a very volatile subject to mess with too. So when the security features of smartphones are being discussed, several key areas need to be clear:
- Are you going to use a SIM card?
- Are you going to user accounts and other services that collect information?
- ?How is your smartphone usage going to be like – privacy focused or disregard for privacy.
But, unfortunately we are living in such times that even secure behavior does not necessarily mean smartphone security. It really comes down to what type of security you are interested in. If it is from thieves and cyber-criminals then this article might be able to help you out. However, if you are expecting a completely secure device against all governments and in complete isolation of your data, you should focus more on cryptography or… using a typewriter.
What Threats Exist Out There?
Basically, in the 21st century, every aspect of our data is saved online, for the most part – personal information, financial information and other important stuff, including paying with your smartphone. This has brought a whole new type of cyber-threats in relation to this. The threats nowadays are ranging from financial-stealing malware to viruses that even enable your microphone. Furthermore, ransomware threats have also begun to be seen on Android devices and are likely to be seen on IOS and other widely used devices too. Not to mention multiple other threats, like phishing and scammers that can cost you, if you are careless.
Which Smartphones Are The Most Secure and Private?
There are many smartphones that are secure in a different way. Some have more privacy-oriented features and others are more focused on encryption and secure boot. There are also devices that have different prices and these prices do not necessarily mean more security. In the end, it comes down to the user of the phone. So, let’s begin with our list.
The Award-Winning Blackphone 2 by SilentCircle
Probably what is the most notorious business phone with multiple layers of security and multiple OS’s running on it has recently won awards for it’s security oriented behavior.
Regarding privacy, this clever device has a very specific OS which is basically it’s core competence in the sector. The operating system is called Silent OS (or PrivatOS) and is created from the ground to be private. A feature on the phone is embedded and this feature actively encrypts every single text message and app communication. This privacy feature even extends to making calls as well, allowing the information during the phone call to be encrypted, hence preventing prying ears from listening.
In addition to this, for further privacy control, the OS allows to manage each app and decide what type of information this app will extract from you.
For increased overall cyber-security, the operating system of this devices uses application pre-loading, meaning that it has the ability to run applications in a controlled environment, giving the ability to be in charge of what you share as information.
Another very interesting aspect of the Silent OS is that it has a feature, called Spaces. This feature includes virtual environments that you can create separately one from another. For example, if you wish to store your personal data on one Android (like a separate phone), you can add a space and call it “Personal”. In this space, you can add your personal information, like photos, documents and this information will stay on this space only. If another space of your phone is compromised or someone has physical access, he or she will not be able to see the personal data in the “Personal” space. This very unique feature of the Blackphone enables a unique method to customize your environment in a secure way and keep the apps and files secure. You can also use Spaces to visit suspicious websites which you do not trust, without compromising the data in your personal space.
The company also outlines the device as having a very responsive support. They promise up to 72 hours deadline for patching a detected vulnerability that is critical to the device security.
Sirin Labs’s Expensive Solarin Smartphone
The smartphone market is a very competitive one and people are always looking to “shine” differently and succeed this way. Sirin Labs is one of those organizations who offer highly secure smartphones, but for a price that is not the cheapest, to say the least.
Regarding the security features of the phone, Sirin Labs have focused on providing active protection of the mobile device. This means that the device is not just any other phone with protection features. It is continuously protected against different attacks on it’s networks, it’s host or attacks via physical access. The active protection is real-time and is offered by a company known as Zimperium. It’s service includes:
- The detection of threats and their handling by experienced security administrators.
- Detection of previously unknown threats by including sophisticated behavior analysis.
Another active security feature coming from collaboration with the notorious Protonmail ensures that the user has encrypted e-mail address featuring 2 password encryption – one to login the account, the other to decrypt the mailbox itself.
Also an amazing security feature of this phone is a technology called Security Shield provided by a company called KoolSpan. This technology makes it possible for encrypted voice over IP (VoIP) phone calls and sending messages that are encrypted with AES-256 as well as FIPS 140-2 encryptions. These ciphers are often used by the government to lock top secret files that are eyes only. This mode is activated by a simple switch on the back of the phone. Military-grade secure and very elegant indeed.
Nexus Devices on CopperheadOS
When we talk about smartphone cyber-security, there is definitely the discussion of the Operating System above all. In connection with this, we have included a very interesting solution, despite being a bit tech savvy – an operating system focused completely on security and available for all the Nexus devices. This very cheap solution can be implemented if you have the technical skills and patience to do it. The files of the OS are even available for download for different specific factory releases of the devices.
For security the creators of the operating system have also used several interesting security features that do not step back by nothing to even more expensive solutions. One of them is the AES-256-XTS encryption algorithm that is military-grade and is used to encrypted all data in the file-system of the phone. In addition to this, for the metadata the cipher block chaining version (CBC mode) of the AES-256-XTS is being used.
To additionally improve security, the OS features a verified boot of it’s firmware modules and the partitions of the operating systems.
Furthermore, a service, called Zygote for Android is also used to start different processes. The difference with this usage is that not only the fork commands are used, like it is typically for Android, but also the exec commands as well. In short this is a type of service that is solely made to launch apps and this OS has additionally enhanced it’s usage thus improving app launch security.
But the operating system by far does not stop there. It includes other necessary features, like sanboxing of applications and services that are running in the background. This sandboxing feature is supported by the SELinux engine and has multiple improvements In it too.
There is also a very particular feature related to the allocation of the system. The CopperheadOS is using a port from what is still believed to be the most secure OS in the world – OpenBSD.
The operating system also has active support that patches zero-day exploits and other vulnerabilities if discovered. These patches make it difficult to manipulate it and get administrative access to the device, even if it’s targeted.
Basically, as a bottom line, this operating system can be installed if you look at beginner guides online. Other than that the installation is no difficult than reinstalling any other custom Android on a rooted Nexus device. A very tech savvy and cheap security solution which is as powerful as they come.
Recently, BlackBarry has come out with two phones specifically focused on security. They also run Android OS, but with multiple security features and are focused primarily on the business users who value privacy and security.
Similarly, to all the companies in this list, BlackBerry also outlines their phone as being a top notch security one. However, this is very relative, especially in the cyber-security field. One of the benefits of this phone in terms of security is that the device itself is supported very well and updates are immediately being issued regarding bug fixes and vulnerability patches.
Besides hardening of the Kernel of the phone, the device is also focused on preventing any modifications on it’s firmware. Despite that it runs Android 6 in it, the boot is secured more than just the regular encryption sequence it goes through.
The primary purpose for which this phone is created is overview and modification. Just like the older model (DTEK50), it features a DTEK software which provides insight on the state of security of the device and information and tools to take necessary action if a security issue has been detected.
In short, for the price of this device, it’s performance and security features that come out of the box with it, it is a very decent choice indeed.
Google Pixel Phone and It’s Android Nougat 7.1
Believe it or not, when it comes to Android devices, it is not a bad idea to mention the most commercialized flagship devices, primarily because they have the incentive to be secure. This is due to the fact that being widely known and famous, the devices are a target for all types of hackers to crack. This is why extra precaution and care must be taken when managing those devices. And Google Pixel’s iPhone’s 7’s competition is no exclusion from this.
The company has come up with multiple security features of the Pixel, primarily related to the latest Android OS – the Nougat 7.1. Google has implemented what many refer to as a FBE – file-based encryption. It is not known what type of algorithm is used, but the working of this encryption is very similar to the RSA cipher which generates a unique key. The same way this works is with the files used by the Google Pixel device. These files are encoded with different key for unlocking, corresponding for the specific file. The company has also combined security with convenience, meaning that they have inserted different features of the phone that are often used, like alarms, phone calls and other that can be accessed much faster, despite encryption.
Other security features of the Nougat version of Android include the direct boot feature of the phone and as mentioned, the much stronger encryption. A relatively new thing for the Android OS’s is the verified boot security extra that can stop any corrupted devices from booting at all. This may make it a bit more difficult to root though.
Also, the support of the Pixel has been made to be quite responsive, primarily because the company has implemented new technology regarding bug fixing. Imagine you are using your Google Pixel phone and a bug happens. Now, you do not have to send the bug information, but the Google support team receive the bug data and the bug data only, as soon as you get internet connection on the device. Instead of having to send manually bug info, or being requested to send info, now the process is handled automatically and discretely. And the whole process is privacy oriented, meaning that only the bug information is extracted and nothing else from your phone.
Regarding privacy, Google has taken good care of this device. It gives complete oversight on any type of permissions that are requested by different apps. The apps are also restricted to make any form of modifications on the device, even if they have some sort of permissions. In addition to this, the company has focused on reducing the amount of data which the device gives away when used by different apps. We believe that this feature is very useful, because there were many reports of malicious apps that were even using malware to obtain permissions and hence different tracking information.
Furthermore, regarding hiding you, the new operating system also features a built-in VPN service which is very suitable for business users, a segment targeted by the previously mentioned BlackBerry device. Good thinking, Google!
Apple’s Iphone 7 and The IOS 10 and the K iPhone
If it isn’t the elephant in the room – Apple. The company has been a subject to a massive pressure regarding the security and privacy of their devices and it has even come to involving themselves in court with FBI. But what about the latest iOS and the news of it’s security being weaker than the previous versions.
But Apple have not just stood by while this was happening. The company immediately and swiftly reacts to everything that was thrown at them, resulting in a phone with security features that are pretty astounding.
Besides the usual features and fingerprint scanning feature of the iPhone, there are multiple other biometric extras added as well. One of them is the ability to perform a retina scan to unlock your device. In addition to this, Apple has also offered a job to the primary iPhone hackers and crackers, like Luca Todesco, Nicholas Allegra and Patrick Ward, Betanews report. This is done with the purpose to increase the security of their products and boost their bug bounty program.
Besides having the regular security features which are very well refined, the phone also includes different encryption tools which are also full encryption for the different files on the device as well as encrypted messaging service, done via the iMessages application.
The Modified Version for Even More Security – K iPhone
In case you are still in doubt about iPhone security, a company known as KryptAll has reportedly modified the iPhone, changing it’s firmware and adding their personal voice over IP application. This allows ot make encrypted phone calls to anyone and conduct anonymous calls. The downside of this is that for maximum security a KryptAll device should only communicate with another KryptAll device in order to be private. But the privacy is certified and even the law and the company themselves cannot listen in on your calls. And it has to be, the devices cost approximately $4,500 dollars for the K iPhone 7.
So, if you want more than the advanced security of the iPhone 7 and want to be supreme in those terms, the K iPhone is for you, if you have the extra buck, that is.