Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by LaminatorX on Friday February 28 2014, @12:30AM   Printer-friendly
from the This-phone-will-self-destruct-in-five-seconds dept.

Papas Fritas writes:

"Reuters reports that Boeing has unveiled a smartphone that deletes all data and renders the device inoperable if there is any attempt to open its casing. 'The Boeing Black phone is manufactured as a sealed device both with epoxy around the casing and with screws, the heads of which are covered with tamper proof covering to identify attempted disassembly,' says a letter included in the FCC filing. 'Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable.' Boeing's Black phone will be sold primarily to government agencies and companies engaged in contractual activities with those agencies that are related to defense and homeland security. The device will be marketed and sold in a manner such that low level technical and operational information about the product will not be provided to the general public. 'We saw a need for our customers in a certain market space.' says Boeing spokeswoman Rebecca Yeamans."

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by frojack on Friday February 28 2014, @12:51AM

    by frojack (1554) on Friday February 28 2014, @12:51AM (#8185) Journal

    It doesn't attempt to be non-breakable. It just attempts to flush all content if you try to break into it.

    Voice is encrypted too, which was mentioned in the press a few days ago, but now seems scrubbed from the story.

    --
    No, you are mistaken. I've always had this sig.
    Starting Score:    1  point
    Moderation   +3  
       Insightful=3, Total=3
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 1) by weilawei on Friday February 28 2014, @05:34AM

    by weilawei (109) on Friday February 28 2014, @05:34AM (#8299)

    I think that defeating the tamper-evident part of the product itself constitutes a challenge. It's the modern equivalent of being able to successfully open someone's mail by steaming the envelope and then resealing it without detection.

    • (Score: 1) by tibman on Friday February 28 2014, @06:27AM

      by tibman (134) Subscriber Badge on Friday February 28 2014, @06:27AM (#8321)

      Seems like getting at the data via non-destructive means would be the best. I wouldn't think disassembling a phone would get you much? I can't imagine someone would desolder a flash chip and put it into a custom assembly. Even if they did that the data could be encrypted.

      --
      SN won't survive on lurkers alone. Write comments.
  • (Score: 2, Informative) by BradleyAndersen on Friday February 28 2014, @02:44PM

    by BradleyAndersen (3383) on Friday February 28 2014, @02:44PM (#8515) Homepage

    IIRC, voice and data are encrypted, but only on their network. So if you and your friend each pay $629 for this thing, then it is encrypted.

    • (Score: 2) by frojack on Friday February 28 2014, @06:44PM

      by frojack (1554) on Friday February 28 2014, @06:44PM (#8678) Journal

      Right, both ends have to use this phone for voice encryption.

      I suspect the data encryption would be exactly like any other phone, using HTTPS, and SSL, etc.

      The only data that would be encrypted by this phone's special functions would be data transmissions direct from one of these phones to another of these phones, OR from one of these phones to a VPN, but that is sort of undefined by any of the writeups I can find.

      --
      No, you are mistaken. I've always had this sig.
  • (Score: 1) by Geotti on Friday February 28 2014, @09:28PM

    by Geotti (1146) on Friday February 28 2014, @09:28PM (#8799) Journal

    Watch me playing angry birds until the battery dies then drilling through the power source of the tamper protection, the location of which I obtained by putting it in a TSA x-ray scanner and then taking a picture of the monitor with my iPhone at the right moment.

    What a load of BS... Oh wait a moment it's Boeing we're talking about. Nothing to see here, carry on!

    • (Score: 2) by frojack on Friday February 28 2014, @09:37PM

      by frojack (1554) on Friday February 28 2014, @09:37PM (#8806) Journal

      So then what?
      You have to power it up again to get at any of the data (unless its on a microsd card).
      As soon as the CPU comes back on line, it detects the opening and kills the phone.
      (Think you found all those tiny switches? I'm betting not, besides, its bound to be
      password protected).

      Or you have to unsolder the memory chips, and somehow read them on another
      device. Good luck with that.

      So skip the Angry Birds, Just put a bullet through the processor, then harvest
      the memory chips. Yeah, that will work.

      --
      No, you are mistaken. I've always had this sig.
      • (Score: 1) by Geotti on Friday February 28 2014, @10:13PM

        by Geotti (1146) on Friday February 28 2014, @10:13PM (#8839) Journal

        Well, to be fair, unsoldering those memory chips is rather easy with the right tools (i.e. some tin-foil and a heat gun), but I like your variant; it has a certain Clint Eastwood flair to it.

        • (Score: 2) by frojack on Saturday March 01 2014, @12:57AM

          by frojack (1554) on Saturday March 01 2014, @12:57AM (#8914) Journal

          unsoldering those memory chips is rather easy with the right tools (i.e. some tin-foil and a heat gun)

          And, if you buy this phone, chances are you also have a supply of tin foil close by. ;-)

          --
          No, you are mistaken. I've always had this sig.