Blackphone: The Future of Secure Smartphones? | Infographic by StudyWeb


With stories of spying and security breaches all over the news, it seems like privacy concerns are at the forefront of everyone’s thoughts.

But while it seems like everyone’s suddenly talking about how the NSA is spying on all of us, our credit card information is getting stolen, and our healthcare privacy is at risk, that doesn’t mean that the average consumer places a priority on privacy.

In fact, it almost seems the opposite is true. Product choices available today clearly show that convenience trumps all. After all, most people would rather have a speedy laptop with a powerful processor and gorgeous display, than one of the two old laptops the Free Software Foundation endorses for “respecting your freedom.” We value the convenience of having a GPS to tell us how to go anywhere and get home again, even though we know it’s also recording our every movement. And we love not having to memorize every friend’s phone number anymore, even though we open up all that information to being accessed by every dubious 3rd party app you download.

But though convenience may be winning the battle today, the tides of war may soon be shifting.

Now that security and privacy concerns are a news constant, they may be influencing product development, and eventually consumer choice. People are looking for ways to enjoy the latest gadgets without compromising their privacy, and smart businesses will follow that shifting demand.

That’s what inspired the new Blackphone, a smartphone that uses a custom, secure version of Android called PrivatOS, and comes bundled with various privacy tools preinstalled.

When it comes to the war between convenience and security, which will win out in the end? Will people be willing to pay the high price tag of privacy? Is Blackphone truly the future of smartphone technology? Here’s how it stacks up to the competition.


Source: StudyWeb

August 25, 2016


Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023