All of us care about privacy, so perhaps most of us have an iPhone, but you will be amazed, as there are other phones that carry an Android system that have also become very safe for the user, and of course the security of information is important, so what if you knew that what you have does not contain privacy and security! This thing is simply your smartphone, you carry in your pocket a tracking device more than a phone in which you spend most of your interests! Cell phone towers as well as satellites are tracking you due to having GPS on your phone. As well as phone data connection and tracking cookies, and what's worse is advertisement identifier, usage statistics, and permissions for various applications, whether for camera, microphone, email, or communication sites ... etc. It's all tracked! Yes, most smartphones are very bad in terms of privacy, except of course, a very few that we will mention in this article.


Smartphones are indispensable to us. Is there a secure phone or system that guarantees true privacy and security for me? In fact, this is a difficult question and the answer to it is more difficult. So gadgethacks has been doing research on the top smartphone brands out there. Key factors such as strength of encryption, biometrics such as fingerprints and hand and face, security with the help of external devices, availability of VPNs, patching or filling of vulnerabilities were examined. And they gained access to four smartphones that can guarantee you this privacy.


The main points of comparison

When it comes to comparing the final four phones, these were the main privacy and security differentiating factors:

◉ Biometrics or Biometrics

It is a system for verifying a person through parts of the body through which personal identity is automatically identified on the basis of his personal characteristics and characteristics that are unique to him and which are unique to the rest of human beings. Like fingerprints, palm rest, face print, and pupil. These measures are processed, encoded, and stored in the database to be called when needed. This method is fast and accurate at the same time.

◉ Encryption

Each of these phones relies on two types of encryption:

- the firstFile encryption, symbolized by an abbreviation (FBE), which means that different files are encrypted with different codes, and it also supports the ability to open each file independently, so you can access applications such as alarms, phone calls, camera and notifications, for example, once the phone is activated. This encryption is the most effective and widespread.

The second type of encryptionFully encrypted disk (FDE) meaning that all information on the hard disk is fully encrypted, including user data, the operating system, so nothing can be accessed until the phone is unlocked. This is for maximum protection.

Each of these four phones uses the Advanced Encryption Standard (AES) as it is considered a secure method of encryption due to the length of the encryption key. Some of these phones use 128-bit keys to decrypt data, and some more advanced 256-bit keys.

◉ Security with the help of external devices

Each of the phones on our list uses components or chips for securing and decrypting data.

◉ User accounts in the sandbox mode

This is one of the most important features of these phones that we have on the list, as it depends on what Apple has adopted in its systems, the SandBox feature for system applications, as well as the case for the user account, which must be sandboxed, that is, inside the sandbox that does not come out of it and applications do not reach it except with special permissions.

◉ Restrict ad tracking

All other Android phones have a system-wide ad tracking ID installed to help companies track you, track your interests, and display targeted ads. This identifier tracks you as you use the applications and services on your phone. And Apple allows you to restrict the capabilities of applications to view and use this identifier.

◉ Use a VPN

A VPN is a fake network that the user creates to send and receive data between his device and the Internet or another device that ensures its safe and encrypted passage and is not seen by anyone.

With Android devices, you can use a VPN with any type of data connection. As for the iPhone, you can use the VPN only during the Wi-Fi connection, except in the case of performing a reset of your device and wiping what it is on and using it in supervision mode using the Mac to get a VPN on the mobile data.

Block internet access to applications

If you want to preserve your internet package and prevent applications or device files from accessing the internet with Android devices, you can use the NetGuard application which is an open source application to prevent any application on your device from accessing the Internet. Thanks to this application, you can reduce your phone's data usage, as well as help you save battery power and extend its life. Of course, it is an application that protects your privacy. As for the iPhone, you can easily disable the mobile data for the applications, except in the case of Wi-Fi connectivity, there is no restriction of the applications.

◉ Clear data after login failure

Some phones have a feature that performs an automatic factory reset when someone tries to enter the password too often. This is fine for intruders or if the phone is lost.

◉ vulnerability (CVEs)

One of the most dangerous vulnerabilities ever discovered due to the amount of damage it causes and the number of infected devices. This vulnerability targets Android, iOS, Mac, Linux and other devices. Therefore, it is important that you recognize the strength and weakness of the devices that we have against this vulnerability.

◉ Time frame for patching the gaps

It is clear that Apple does not commit to a certain time to issue one update after another, so as soon as it detects any risk of issuing a security update immediately, it is possible to issue two updates in one week. For the Android system, it is possible to release the update after a month or maybe months, and first target the OME version or the original raw version designed specifically for Google devices, and then distribute it to other devices. And since Google Pixel 2 is Google's phone, it will definitely get security updates first.

◉ Security Bonuses or Bug Bounties

Technology companies usually offer cash rewards to anyone who finds weaknesses or gaps in their systems and programs, which leads to increased discoveries of vulnerabilities, and thus companies issue updates to close these gaps, and this is among the reasons for the delay of jailbreaking on iOS systems in the case of Apple, where vulnerability finders sell them to Camel.


How were these devices chosen?

◉ These phones are on default encryption mode to ensure that your data is protected.

◉ That the phones contain permissions or permission to access some features such as the camera or microphone.

◉ These phones have a remote lock or wipe feature in case the phone is stolen or lost.

◉ What distinguishes these devices is the presence of security with the help of other devices, for example, in the case of Apple, they use an encryption chip to increase security. In the Android system, especially the original raw version, the root or system root is mostly based on the Linux kernel, which needs root powers to access the system root and introduce modifications and changes such as the jailbreak state in Apple devices. This means that there is a physical barrier between the attacker and the systems, it is necessary to breach the physical barrier to access the system, and this is a very difficult thing, rare and almost impossible at times. This is lacking in most other popular phones.


There is no doubt that there are devices from the family of these devices to which the same applies, such as the iPhone 7 and Samsung S8, but we mentioned the newer devices because they are the strongest in the field of privacy and protection, namely:

 BlackBerry KEYone

The term BlackBerry is synonymous with security and privacy. The company prides itself on making its phones as safe as possible. Even after BlackBerry moved to the Android system to run its own devices, it backed it up with its own security and privacy features. This phone is one of the best smartphones that achieve a high degree of privacy and security for users.

Each time you turn on the phone, the phone takes additional steps to ensure that your phone is not tampered with or not hacked. Encryption keys are injected into the processor as backup steps so that the device is not tampered with. I mean, with every start, the phone is examined well to look for any change or modification, "a thorough self-inspection."

Since the Linux kernel is more vulnerable to hacking and various attacks, BlackBerry runs periodic updates to patch or strengthen vulnerabilities.

In addition, BlackBerry has only added small programs to their phones and cannot be used on other devices. It proves that the privacy of its customers is above all. Take, for example, the Privacy Shade application that prevents intruders from seeing what you do on your phone. This application turns the screen black, except for a small part that you specify, and there are other settings that you can modify to what suits your use.

There is also another feature, which is to unlock the device using the Picture Password feature. Through the settings, you can set a specific number to a specific place in a picture of your choice, and when you unlock the phone, you must move a network of numbers, including the number you chose, and then put it on the place you want You previously set it to unlock the device without anyone knowing or seeing the unlock password.

You can watch this video

In addition, the BlackBerry KEYone phone is equipped with a security system called DTEK that monitors your phone, especially applications, checks their behavior, and alerts you if any application goes out of the ordinary, for example if an application tries to access messages or wants to send your location, this system will notify you immediately as it is It evaluates the current safety of the phone, especially any malfunctions in the protection shields, and informs you about it.

Finally, BlackBerry opted for a fully disk encryption system rather than file-based encryption. This is one of the best AES-128 encryption standards out there.


iPhone X

It is known that all Apple devices running on closed source iOS system, the strength of protection and privacy are superior to most of the systems that exist today. What distinguishes Apple from others is the large number of security updates and the speed of their issuance, unlike Google's open source systems, due to the multiplicity of companies that use that system. Each company adds more amendments to the system in accordance with its desires and policies, which makes successive updates somewhat difficult, unlike Apple's same system Locked only. Also, the latest Apple system works on most of its devices, while the latest Android system only works on 0,5% of the Android devices.

Another feature of iOS is the ability to handle encryption. Both iOS and Android use file-based encryption, but Apple's model is much more accurate. Whereas, Apple systems encrypt all files and their data separately, using unique keys. Then these keys are encrypted by another key, which is derived from the user's passcode and the hardware.

This second set of keys protects files based on their contents. For files that require a higher level of security, keys only unlock their content after turning on and unlocking the device. As for the other files, they only need to be authenticated once to access them.

The number of times iOS is exposed to CVEs is much less than Android and it decreases every year. Since last year, CVEs in iOS increased to 204, while in Android it increased by 318 in the same period.

Due to Apple's closed system, its store has almost no malware other than the Android system. Whereas, Apple reviews the applications manually by a team of Apple specialists.

Another key point is that the reason why we chose the iPhone X and not the iPhone 8 is the face print. Despite the presence of breaches that we have seen on the Internet, the faceprint is more secure than the fingerprint.

Apple has taken steps to ensure that facial fingerprint data is as secure as possible. Because the face map is encrypted and stored in an isolated safe place inside the iPhone X, with the exception of diagnostic data to support Apple, the face print data never leaves the device. As for the apps that require face ID authentication, they are notified from afar by the iOS system that the authentication is successful, and the app cannot access the face data by itself.


Galaxy Note 8

Samsung uses in this phone similar security and protection features used in BlackBerry, known as Samsung Knox. This security platform provides protection at a deep level that combines both hardware and software. The Samsung Knox platform aims to separate your work environment from the personal environment and provides the necessary protection due to the isolation of each area from the other, and this is sometimes called container technology.

Similar to BlackBerry, the Samsung Note 8 protects the phone using many features. And everything starts from the root embedded with the hardware components, where the root is injected into the designated place (the encryption key) during the manufacturing process and can only be accessed in a secure environment known as the trust zone. This key is unique to the Note 8.

Note 8 has a Secure Boot key. He is in charge of monitoring and checking every component during takeoff to ensure nothing has been tampered with. These keys are used to secure the boot and are a mechanism designed to prevent users from changing or tampering with the device's operating system. And changing or modifying the root will definitely affect the safety of security and privacy. However, unlike BlackBerry, users were able to manipulate the root and modify it. This is what made it in the region behind its predecessors.

Samsung supports non-return to previous systems, and this ensures that the Note 8 runs the latest operating systems.


 Pixel 2 or Pixel 2 XL

Pixel 2 transferred the authentication process from a secure, software-based environment known as TrustZone or the Safe Mode provided by the processor, even if the kernel is compromised, to a separate physical chip or what is known as a SOC or System on a chip that contains all the data needed to perform authentication on a device Your pixel 2. It is also resistant to all software- or processor-based attacks, and provides high-level protection.

Unlike most Android devices, my Pixel phone works with the latest version of the Android system, and Google has pledged to provide regular updates to these devices for a period of three years. It issues monthly updates to protect the phone from any potential threats.

Google offers financial rewards estimated at two hundred thousand dollars for anyone who finds a serious security threat on their systems, and it is the highest on this list. a program So. The program is open to the public. You can search the base Pixel 2 system for any vulnerability, and get paid.


BlackBerry Keyone continues to top the list well. This company has the right to obtain multiple certificates, including FIPS 140-2 for the cipher kernel. As well as the iPhone X and the iOS system that the FBI or the Federal Bureau of Investigation in the United States stood in front of, unable to open the phone until Apple helped her in that.

Do you agree with our list? Which smartphone do you think is the best in security and privacy? Do let us know in the comments below.

Source:

gadgetthacks

Related articles