The Blackphone is a secure mobile phone whose operating system is based on Android, designed to minimize the amount of data you leak as you move through the world through a combination of encryption and systems design that takes your privacy as its first priority.
Ars Technica's Sean Gallagher reviewed a pre-production version of the phone, and found that while it is a little underpowered on the hardware side, and required some getting used to, it nevertheless accomplished something fairly remarkable: a mobile experience that lets you stay in touch and find things, people and places, without giving up every intimate secret of your life to anyone who can be bothered to look for it.
We found that Blackphone lives up to its privacy hype. During our testing in a number of scenarios, there was little if any data leakage that would give any third-party observer anything usable in terms of private information.
As far as its functionality as a consumer device goes, Blackphone still has a few rough edges. We were working with “release candidate” versions of the phone’s operating system and applications, so it would be unfair to judge their stability too harshly. But since the Google ecosystem of applications (Chrome, Google Play, and other Google-branded features) was carved from PrivatOS, a privacy-focused fork of KitKat, it may feel like a step backward for some Android users—and a breath of fresh air for others.
Exclusive: A review of the Blackphone, the Android for the paranoid [Sean Gallagher/Ars Technica]
Super Retro-Boy is a compact, minimal reimplementation of Nintendo’s classic Game Boy with the look as well as the tech. It plays real cartidges, including those from the full-color Game Boy Advance—presumably this is why there are four buttons. It gets 10 hours on a charge, and will come with a 10-in-1 game from Retro-Bit […]
A T-Mobile customer in Florida drove her SUV into the store, smashing through the front window and coming to a stop deep in the showroom. Then she emerged from her disabled vehicle, hefted a broken window frame, and smashed a display. “What is wrong with her?” calls out an unseen observer. According to witnesses who […]
Slovenia’s Maheno corporation manufactured a series of Barbie-branded and white label typewriters for kids, with a hidden feature that allowed their owners to use them to produce messages encrypted with a simple substitution cipher.
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]