by Mike Kershaw | Jul 22, 2015 | Other, Technology
Wi-Fi is noisy. Not only do access points announce themselves ten times a second, but every phone, laptop, and Wi-Fi enabled toaster broadcasts when it wants to join a network. Any time you’re not connected to a network, your phone is spending its time trying to find...
by Vishal Gupta | Jul 6, 2015 | Other, Security
One of the biggest challenges to the broader adoption of IoT (Internet of Things) is importance of ensuring security and privacy. Given that, the question is what unique aspect of IoT makes addressing security and privacy for it especially hard. There are at least...
by Silent Circle | Jun 11, 2015 | Other
We are greatly humbled and honored We at Silent Circle are simply blown away that the International Spy Museum in Washington, DC has put the Blackphone on permanent display. Concurrently, the Victoria & Albert Museum in London is honoring Blackphone in the All of...
by Silent Circle | Jan 27, 2015 | Blog, Other
How often have you given away your private information? If you go to a restaurant and pay the bill with a credit card, does the card ever leave your sight? If you call a taxi to pick you up at home, what happens with your name and address? If you order things online...
by Jason Pittman | Nov 26, 2014 | Other
We believe that being open and responsive to critiques from the security community is a hallmark of a responsible company. That’s why we implemented our bug bounty program, where we encourage researchers to submit information about potential vulnerabilities in our...
by Mike Janke | Sep 11, 2013 | Other
There have been so many disclosures, revelations and speculations since Snowden fled and the media trickled out one tantalizing slide after the next- that it’s hard not to get overwhelmed. It’s hard not to get angry. Now that the sheer scope and massive...