{"id":2591,"date":"2014-02-25T18:41:37","date_gmt":"2014-02-25T18:41:37","guid":{"rendered":"http:\/\/ncjolt.org\/?p=2591"},"modified":"2020-06-04T20:53:44","modified_gmt":"2020-06-04T20:53:44","slug":"blackphone-the-next-step-in-post-snowden-private-communication","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/blackphone-the-next-step-in-post-snowden-private-communication\/","title":{"rendered":"Blackphone, the Next Step in Post-Snowden, Private Communication"},"content":{"rendered":"<p>In June of 2013, Edward Snowden released information showing that the National Security Agency was collecting data from phone calls, texts, and emails of people all over the world. The resulting revelations sparked mass outrage at the invasion of privacy and a nationwide debate over the amount of access the government should have in our lives. These realizations led many to try and find ways to protect themselves.<\/p>\n<blockquote><p>Blackphone, revealed Monday at Mobile World Congress in Barcelona, promises to be the <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">most secure smartphone<\/a> on the market.<\/p><\/blockquote>\n<p>Enter Blackphone, a <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">new privacy-focused smartphone<\/a> created by Silent Circle and Geeksphone. As Toby Weir-Jones, the general manager of Blackphone, explains, Edward Snowden\u2019s leak of NSA documents has created <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">a demand for privacy.<\/a> Weir-Jones further <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">explains<\/a> that this demand was one that \u201cthe wider market was not equipped to look for a solution [to].\u201d Blackphone, revealed Monday at Mobile World Congress in Barcelona, promises to be the <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">most secure smartphone<\/a> on the market.<br \/>\nWhile the phone doesn\u2019t claim to be unbreakable, it does host a dizzying array of secure technology. The <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">main privacy feature<\/a> will be a custom version of Android, Privat0S, which allows users to \u201ccontrol every part of what data their phone is leaking, their calls, their contacts, their web browsing and what any app put on their phone can do.\u201d The phone will <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">also include<\/a> encrypted communications apps, 5GB of encrypted cloud storage, and anonymous browsing and Virtual Private Network.<br \/>\nThe average consumer, however, may be less interested in what the phone offers and more interested in what it doesn\u2019t. At least at first, the phone will not include an <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">email application.<\/a> Silent Circle, the phone\u2019s creator, <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">chose to discontinue<\/a> their \u201cSilent Mail\u201d service when another encrypted email provider was served with a government subpoena. While the company fully intends to eventually provide this service, it remains to be seen whether consumers will respond to the phone in its absence. According to a 2011 Google survey of more than 5,000 customers, 82 percent of smartphone owners <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">check and send email<\/a> on their phone.<br \/>\nFeatures aside, there also remains questions as to whether the desire for privacy will overcome the desire to not pay <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">$629 for a cellphone<\/a>, which is the current, pre-order price of the phone. Also on the price front, is whether Blackphone can prove as profitable as other technology coming out of Silicon Valley. One reason why the technology industry has been able to be so <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">profitable<\/a> is that it allows companies to thrive by \u201ccollecting and analyzing user data, marketing it to advertisers through services like Google and Facebook ads.\u201d<br \/>\nUltimately though, the question is just how safe is the world\u2019s safest phone. The company\u2019s website offers the <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">disclaimer<\/a> that \u201cas with most things in life, there is no absolute guarantee,\u201d therefore \u201cwe do not claim Blackphone is \u2018NSA-proof[.]\u2019\u201d Bruce Schneier, a security expert, notes the nuanced difference between levels of privacy. He believes that against bulk surveillance, Blackphone could offer considerable protection. As he puts it, <a href=\"http:\/\/www.newsweek.com\/blackphone-aims-privacy-smartphone-229714\">\u201cthe NSA is not made of magic.\u201d<\/a> This being said, the aspiring terrorist or criminal may not want to run to pre-order the device quite yet. <a href=\"http:\/\/mashable.com\/2014\/02\/24\/what-is-blackphone\/\">According to Mike Janke,<\/a> co-founder and CEO of Silent Circle, \u201c[i]f you are on the terrorist wanted list or a criminal, intelligence services will get into your device. . . there\u2019s no such thing as 100% secure phone.\u201d<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In June of 2013, Edward Snowden released information showing that the National Security Agency was collecting data from phone calls, texts, and emails of people all over the world. The resulting revelations sparked mass outrage at the invasion of privacy and a nationwide debate over the amount of access the government should have in our <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/blackphone-the-next-step-in-post-snowden-private-communication\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2591"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=2591"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2591\/revisions"}],"predecessor-version":[{"id":7496,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2591\/revisions\/7496"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=2591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=2591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=2591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}