Secure Crypto Phones: Lugano Cypherpunk Summits, Reinvigorate the AP Ethos, Cryptocurrency Blockchain Revolution
On 9/11/23, pro2rat@yahoo.com.au <pro2rat@yahoo.com.au> wrote:
This village-idiots-convention
Link to what the fuck you're talking about, and properly thread your posts, you jackass ;) Do you think any of the self-proclaimed "cypherpunks" attendant will dare to mention let alone reinvigorate the thought crime of AP at this "summit"? https://cpm23.com/ An artistic tribute to the Cypherpunks movement. Tribute Event On October 20th & 21st, 2023, 30 years after the first historical meeting of the Cypherpunks, selected protagonists of the Cypherpunks movement will be honored and essential thoughts on the three core topics will be discussed during an exclusive Tribute Event during the Plan B Forum at the Convention Center in Lugano. https://www.tandfonline.com/doi/full/10.1080/24701475.2021.1935547 Cypherpunk ideology: objectives, profiles, and influences (1992-1998) https://www.cypherpunk2023.com/ https://nakamoto.com/the-cypherpunks/ https://www.princeton.edu/events/2022/reunions-cypherpunks-meetup https://coincodex.com/article/2883/biggest-israeli-bitcoin-conference-brings...
Blackphone
https://en.wikipedia.org/wiki/List_of_open-source_mobile_phones Here's the latest fraudulent entrants in the wannabe "secure phone" market, maybe a few of them are actually doing something interesting, or not... protip: If it's not at least running stock BSD or Linux, and doesn't have at least a switch to power disable the cellular baseband, and doesn't have the baseband as nothing more than a separate serial modem link from the CPU, then it's not even close to being worthy of beginning to be called a "secure phone". Apple just disclosed yet another massive zero-click exploit, as does Google all the time... https://www.androidcentral.com/apps-software/galaxy-s23-s22-september-2023-s... https://en.wikipedia.org/wiki/PinePhone_Pro https://en.wikipedia.org/wiki/Librem_5 https://www.htcexodus.com/us/cryptophone Cryptophone | EXODUS Introducing the Cryptophone, the next-generation device that combines the usability of the smartphone and the security of a crypto hardware wallet. The secure all-in-one device revolutionizes how we access Bitcoin and Web 3 - empowering you to buy, sell, send, receive, borrow and lend. The Exodus line of phones provides such a wallet agent, able to interact with the digital world on our behalf. We see a world where people own their own identities and data, where everyone understands the concept and economics of digital property. I'm excited to see EXODUS putting in the work to make blockchain and cryptocurrency technology ... The r/ evolution of the smartphone: introducing the Cryptophone What is the EXODUS 1s? EXODUS 1s is a Cryptophone - the first ever mobile device with Bitcoin Full Node support. Combining a lightweight form factor, secure hardware and a easy-to-use software, the EXODUS 1s is a one-of-a-kind bank in your hand. ... What is the EXODUS 1? EXODUS 1 is a Cryptophone - a next-generation device that combines the usability of the smartphone and the security of a hardware wallet. With Zion - the Bank of EXODUS - the user can easily buy, receive, store crypto assets all on the phone, without the risk of hacking and other forms of malware. https://puri.sm/products/librem-5 Purism- Librem 5 Discover the Librem 5 The Librem 5 is a phone built on PureOS, a fully free, ethical and open-source operating system that is not based on Android or iOS. Learn more about why this is important By purchasing a Librem 5 phone you are supporting a future of digital privacy, invested in supporting an open, community-driven environment. Vote with your wallet to support a future safe from digital ... https://www.theverge.com/2022/6/23/23180421/osom-solana-saga-android-crypto-... Solana is making a crypto phone with help from former Essential ... The phone previously known as the Osom OV1, built by a team consisting of former engineers and designers from Essential, is being renamed and repurposed today, and it's all in the name of crypto ... https://www.cnet.com/tech/mobile/solana-saga-is-a-fancy-android-phone-for-cr... Solana Saga Is a Fancy Android Phone for Crypto Traders The Solana Saga is a top-spec, 6.67-inch Android phone that'll launch in first quarter of 2023 for $1,000. Revealed at a keynote in New York, the Saga is designed to make trading cryptocurrencies ... https://www.technologyreview.com/2022/08/19/1058243/erik-prince-wants-to-sel... https://dekisoft.com/best-unhackable-and-untraceable-phones/ https://arstechnica.com/tech-policy/2021/06/fbi-sold-phones-to-organized-cri... https://shop.sirinlabs.com/products/finney https://www.makeuseof.com/most-secure-blockchain-smartphones What Are the Most Secure Blockchain Smartphones? - MUO You can check out all the key differences between these three models by visiting HTC's cryptophone page. 2. The FINNEY Phone. Sirin Labs' FINNEY phone has some undeniably useful features for crypto owners, starting with its built-in hardware wallet that can manage transactions and store the user's private keys in an ultra-secure way. The FINNEY ... https://www.justice.gov/usao-sdca/pr/fbi-s-encrypted-phone-platform-infiltra... https://vpnoverview.com/privacy/devices/the-best-secure-smartphones-for-priv... Top 5 Best and Most Secure Smartphones for Privacy in 2023 Here are our top 5 most secure smartphones: Blackphone PRIVY 2.0: Top-level security. Sirin Labs Finney U1: Best for crypto users. Bittium Tough Mobile C: Best for private key management. Purism Librem 5: Best for maximum security. Sirin Solarin: Best for preventing incoming threats. If you're looking for the best mobile VPN for iPhones or ... https://www.itpro.com/mobile/mobile-phones/360024/5-most-secure-smartphones The best secure phones | ITPro Purism Librem 5. Apple iPhone 13 Pro Max. Google Pixel 6. Bittium Tough Mobile 2C. Sirin Labs Finney. What are the best secure smartphones? It is a question worth asking yourself, particularly as your smartphone is likely the device you use the most to access the online world, and the various threats that exist there. https://iradtechie.com/discover-5-unhackable-reliable-smartphones-in-year-20... https://www.gadgetreview.com/most-secure-phones https://www.techradar.com/news/this-is-probably-the-worlds-most-secure-smart... https://www.usatoday.com/story/tech/news/2023/09/07/iphone-ipad-apple-securi... https://www.techradar.com/best/secure-smartphones Best secure smartphones of 2023 | TechRadar All of this rounds out to one of the most secure Android flagships on the market. Apple iPhone 14 Pro Max Apple's crown jewel in 2023, a sleek ... https://www.androidcentral.com/best-phone-security https://www.allthingssecured.com/reviews/security/best-secure-phone-service Most Secure Cell Phone Service in 2023 (+ Best Secure Phones) 4Freedom Secure Phone. The 4Freedom Secure Phone is available to run on the 4Freedom secure network mentioned above. The phone boasts a security hardened custom hardware, a de-Googled version of Android and a special "Pro" mode that creates a separate, more secure OS environment. https://www.scienceabc.com/innovation/cryptophone-secured-ordinary-phone.htm... Cryptophone: Definition, Need, Advantages, Disadvantages and Reception A cryptophone is a mobile phone with robust security features that protect users against eavesdropping by intelligence or private organizations, and are able to avoid most surveillance measures. Cryptophones use sophisticated algorithms to encrypt the voice signals, making it difficult for intruders to break into the system and conduct ... https://www.cryptomuseum.com/crypto/gsmk/ip19/index.htm https://www.malwarefox.com/most-secure-phone/ https://en.wikipedia.org/wiki/Secure_telephone Secure telephone - Wikipedia A Secure Terminal Equipment desk set. A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack. Concerns about massive growth of telephone tapping incidents ... https://www.technologyreview.com/2014/03/18/173659/for-3500-a-spy-resistant-... For $3,500, a Spy-Resistant Smartphone | MIT Technology Review The CryptoPhone's $3,500 price tag (which pays for three years of service, not including calling charges) puts the device beyond the reach of most individuals and small businesses. A competing ... https://www.cryptophone.de/ Home | CryptoPhone Secure Calls and Messaging. Whether on the road or in the office, GSMK CryptoPhone secure mobile and desktop phones deliver superior voice and message encryption - anytime, anywhere. Their unsurpassed reliability even under poor or restricted network conditions has made them the premier choice of governments, NGOs, international organizations ... The CP600G allows you to make secure end-to-end encrypted voice over IP calls on any network - 2G, 3G, 4G, or WiFi. The CP600G comes with the strongest and most secure algorithms available today, AES256 and Twofish. It features a 4096 bit Diffie-Hellman key exchange with SHA-256 hash function, readout-hash based key authentication, and ... https://www.kryptophone.ae/ KryptoPhone X - Encrypted Smartphone for Secure Communications KryptoPhone. KryptoPhone is a fully encrypted iPhone SE that utilises highly reliable encryption technology to allow users to communicate securely. KryptoPhone enables our customers to make voice and video calls, send and receive encrypted messages, and share files privately. Using KryptoPhone you can make fully encrypted voice and video calls. https://cryptomize.com/cryptophone CryptoPhone - Secure, Encrypt & Anonymize Communications CryptoPhone is an Extremely Encrypted and Secure Communication Device that works without a Central Server on a Private End-to-End CryptoNetwork to protect them from Unauthorized Surveillance and Interception. About Us. No Conversations History. The chat history is not stored anywhere, its only visible to both the parties that are communicating ... https://www.npr.org/2021/06/08/1004332551/drug-rings-platform-operation-troj... https://www.computerweekly.com/news/366551114/German-court-unclear-whether-i... German court unclear whether intercepted EncroChat cryptophone messages ... Police EncroChat cryptophone hacking implant did not work properly and frequently failed. Read more on Hackers and cybercrime prevention French supreme court dismisses legal challenge to EncroChat ... https://ano-phone.com/ Secure Encrypted Smartphone + Private VPN - ANO-PHONE With Ano Phone you get a purified, protected Android-based smartphone incl. firewall and a bulletproof private VPN that brings you maximum privacy and security.. We provide safety-conscious users with a secure cryptophone eliminating vulnerabilities: . The device comes with a preconfigured Private VPN, one of or alternative origin countries available upon request. https://cryptophone.ae/ CryptoPhone - secured and protected phone conversations The GSMK CryptoPhone 500i is a secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. It has hardened Android operating system with granular security management and streamlined, security-optimized components. Baseband firewall protects against over-the-air attacks with constant ... https://www.insidermonkey.com/blog/7-most-and-least-secure-cell-phones-in-th... https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor https://www.verizon.com/support/digital-secure-faqs/ https://www.wired.com/2014/09/cryptophone-firewall-identifies-rogue-cell-tow... https://www.popsci.com/article/technology/mysterious-phony-cell-towers-could... https://phandroid.com/2014/09/02/cryptophone-500/ https://www.computerworld.com/article/2600348/are-your-calls-being-intercept... https://www.computerweekly.com/news/366551078/French-supreme-court-dismisses... https://www.computerweekly.com/news/252526497/Dutch-lawyers-raise-human-righ... https://www.bankinfosecurity.com/cryptophone-service-crackdown-feds-indict-s... https://www.bankinfosecurity.com/blogs/dutch-police-bust-cryptophone-operati... https://www.marianne.net/monde/europe/es-cryptophones-des-telephones-ultra-p... Les "cryptophones" : des téléphones ultra-protégés ciblés par la police ... Publié le 11/03/2021 à 19:05. Cette semaine, la police belge a démantelé plusieurs organisations criminelles en déchiffrant les informations de millions de cryptophones. Des téléphones ... https://www.computerweekly.com/news/252497565/Police-crack-worlds-largest-cr... Police crack world's largest cryptophone network as criminals swap ... Belgian and Dutch police have breached the encryption of Sky ECC, the world's largest cryptophone network, which became the service of choice for criminals after police brought down rival ... https://www.tccsecure.com/secure-mobile-encryption-aspx TCC - Secure Mobile Phone Encryption CryptoPhone 600G Secure Smartphone. With innovative full-circle security, The CryptoPhone® secure mobile phone provides military-grade end-to-end encrypted and anonymous voice and text communications. Additionally, the encrypted communications are hidden for an additional layer of protection. Our secure mobile phone is FIPS 140-2 certified ... https://asiatimes.com/2022/05/the-fatal-failure-of-russias-era-cryptophone-s... The fatal failure of Russia's ERA cryptophone system Russia's military-secure ERA cryptophone system has failed in the Ukraine war, raising crucial questions about why Moscow committed to a system that was so badly flawed from the start. Cell phones have played an outsized role in the Ukraine war. In particular, they have been used to geolocate sensitive military sites, giving the Ukrainians ... https://news.yahoo.com/russian-military-being-hacked-after-its-own-soldiers-... Russian military phone calls hacked after 3G goes offline - Yahoo News Russian soldiers have switched off their encrypted phone system after towers were destroyed and are using normal phones with local sim cards, according to Bellingcat, an open-source investigative journalism organisation. Bellingcat's executive director, Christo Grozev, said in a series of Tweets: 'The idiots tried to use the Era ... https://www.cipher.tel/ CIPHER | phone Software Security. switch between cipher Android and ciphOS - hardened cipher Linux operating system (*not Android, not iOS) build from the ground up to be the most secure OS possible. single use key encryption. no personal conversation data written to disk. dynamic VPN/IP switching every 30 minutes https://www.iad.gov/securephone Secure Phone - iad.gov U.S. Military users must contact and acquire software through their respective command or acquire permission before downloading software for product upgrade. There are no new documents posted. To provide a platform to expeditiously coordinate the secure exchange of Secure Phone management & technical information. https://www.intactphone.com/ Secure Mobile Phones: Best & Safest Encrypted Devices | Intactphone PHONE. IntactPhone is the world's most secure mobile phone for organizations. It protects you from eavesdropping, malware, data breaches and any attempts to hack or tamper with your mobile communications and data. https://www.blackberry.com/us/en/products/secure-smartphones Secure Smartphones - BlackBerry Android OS Hardening: BlackBerry locks down capabilities that could give attackers the opportunity to compromise your device.. BlackBerry Secure Compound: A trusted execution environment guarantees the protection of sensitive data and security-focused apps running inside it.. Enhanced Memory: Address space layout randomization is a technique that randomizes the location of system components in ... https://www.kryptall.com/ KryptAll® is an encrypted telephone system that cannot be intercepted ... SECURE GLOBAL NETWORK KryptAll® has developed a global network of secure servers that allows encrypted calls to enter the regular telephone network from more than 100 different interconnection points. https://www.silentcircle.com/looking-for-blackphone Looking for Blackphone? | Silent Circle Protect your team with Silent Phone. In 2014, Silent Circle launched the original Blackphone, a secure mobile handset. Then in 2015, it launched Blackphone 2 to rave reviews. People loved the Blackphone. It represented security that you could hold in your hand. Even now, we get lots of requests from people who want to buy Blackphones. https://www.nitrokey.com/news/2021/nitrophone-most-secure-android-planet NitroPhone - Most Secure Android on the Planet | Nitrokey The NitroPhone combines security, privacy and ease of use with modern hardware. It is based on the high-quality Pixel 4a and GrapheneOS, the most hardened Android for professionals. Gain full control of your smartphone without Google and Apple! The NitroPhone is now available in the online shop. "If I were configuring a smartphone today, I'd ... https://www.redcom.com/sectera-wireline-terminal-replacement-viper Using the GD Sectéra® vIPer™ Secure Phone for Type-1 NSA ... - REDCOM Using the GD Sectéra® vIPer™ Secure Phone for Type-1 NSA ACC-Compliant Gateways. May 15, 2023 Sectera Wireline Terminal (SWT) Replacement. When the NSA released updated Advanced Cryptographic Capabilities (ACC) requirements, many existing solutions for red/black networks using a Type 1 gateway device or a Type 1 conferencing solution were ... https://grapheneos.org/ GrapheneOS: the private and secure mobile OS GrapheneOS is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project. It's focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model. https://toughmobile2.bittium.com/ Ultra Secure Mobile Communications - Bittium Tough Mobile 2 The ultra secure and rugged Bittium Tough Mobile™ 2 smartphone and its secure software solutions together with the Bittium Tough SDR Handheld™ tactical radio and dedicated accessories from Bittium Tough Mobile™ 2 Tactical - a complete solution for soldier mobile communications. Tough Mobile 2 Tactical is compatible with different ... https://gdmissionsystems.com/encryption/secure-voice Secure Voice - General Dynamics Mission Systems The Sectéra vIPer™ Universal Secure Phone allows you to easily switch between making end-to-end secure and non-secure calls on Voice over IP and analog networks, eliminating the need for multiple desktop phones. The vIPer is the only VoIP phone certified to protect information classified Top Secret/SCI and below over commercial wired networks. https://www.ia.nato.int/DocumentGenerator/repository/version/8a25cf8b-0fe8-479d-aa53-b97292e3e0f1/Sectera-vIPer™-Universal-Secure-Phone-Product Sheet Sectéra vIPer Phone Sectéra® vIPer™ Universal Secure Phone D-VIPER-33-0114 Size Width 10 in. Depth 3 in. (without footstand) Length 9.5 in. Weight 4.5 lbs (with footstand) Volume 285 cu in. Power Powered over Ethernet (802.3af) -or- AC power 100 to 250 VAC, 50-60 Hz 8 Watts maximum operating Environment MIL-STD-810F (temperature, humidity, vibra- ... https://www.signal.org/ Signal >> Home Say Anything. Share text, voice messages, photos, videos, GIFs and files for free. Signal uses your phone's data connection so you can avoid SMS and MMS fees. https://www.armadillophone.com/ Armadillo Phone is the most secure phone Armadillo Phone is the most secure phone. Protect yourself against hackers and spyware. Armadillo Phone can prevent attacks from Wi-Fi or cellular networks. If you're forced to unlock it, you can instead reveal a fake decoy user. Bypass censorship and metadata surveillance. Cameras or microphones can be removed.
great work, there must be a wiki where this stuff goes (maybe libreplanet?) here’s one review
- this is a distribution of the google pixel 3a - it is closed source - it has very impressive features but a serious security mistake is made in the specifications: it claims to prevent cold boot attacks by detecting low temperatures. these attacks do not actually require low temperatures, rather “cold boot” refers to cutting and reapplying power. armadillophone should be informed of this mistake, as well as that power users will not trust their featureset without source code to verify it against
participants (2)
-
grarpamp
-
mailbombbin