TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

No, the NSA can't spy on smartphone data

1 点作者 clarkm超过 11 年前

1 comment

001sky超过 11 年前
<i>BlackBerry&#x27;s mail system &quot;is known to be very secure&quot;. Known by whom, exactly. Can you cite a source? Any source? I&#x27;m an expert in cybersec, I know lots of experts, and I nobody I know thinks...</i><p>The author puts his credibility on the line dismissing RIM&#x27;s security as obviously flawed, and then admits he hasn&#x27;t the most basic clue about their services. Of course BES and BBM are (or: were at one stage) secure enough that the Indian government threatened to shut down RIM, if they did not provide a direct link the servers for Indian security forces.<p><i>Update: @ChrisEng points out that there&#x27;s a difference between normal BlackBerry Internet Services (BIS) provided by your phone carrier, and BlackBerry Enterprise Services (BES) provided by your company.</i><p>_______<p>The relevance of BES:<p><i>What is key here, is that when running a BES neither RIM nor the wireless carrier can assist law enforcement in accessing email, Internet browsing (which can be encrypted by default) or BlackBerry messenger contents (assuming that the organization isn’t using the same global encryption key consumer messenger traffic relies on). If the BES and surrounding corporate IT infrastructure is outside a country’s legal reach then secured communications can be provided without worrying about government actually going after the mail or messaging servers themselves. Further, if a corporation’s legal assets and identity are also outside the nation, the government may be unable to legally compel the company to turn over the contents of BlackBerry communications. Needless to say, the full encryption of communications prevents the nation’s wireless carriers from effectively tapping BlackBerry device communications. Of course, this degree of security does depend on the device itself being protected from side-attacks...</i>