The first hack-proof phone
With the unstoppable rise of mobile phones enabling us to perform a massive variety of different tasks on the go, we are frequently using personal and financial data digitally in order to achieve our objectives.
However, this comes with the many risks, as using such sensitive data can often leave us exposed to hacking attempts with cybercriminals developing ever more ingenuous ways to infiltrate our devices. This is why much has been made recently about the development of the first hack-proof phone.
Previously, many large mobile phone manufacturers have been happy to rely on storing encryption keys on third-party servers, and then using outside companies to issue certificates that fulfil a satisfactory level of security.
However, such third-party security does have limitations in that the servers can be relatively easily hacked in order switch certificates and change authentication procedures. In order to avoid this, companies have tried developing patches for SSL certificate flaws to limit the threat of cyber attacks such as the Spamhaus attack of 2013.
But with many people using mobile devices for internet banking and even to access online gambling sites like SpinPalace.com that offer a variety of games from slots to poker, it’s becoming evident that a more watertight security procedure is necessary.
And so, it was with much fanfare that the Turing Phone was announced this month. This promises to become the world’s first hack-proof phone and it aims to do this through some revolutionary technological adaptations.
Rather than storing encryption keys on third-party servers, the Turing Phone will instead store the encryption keys on the phone itself. This type of end-to-end encryption will be able to keep phone calls and data completely confidential by decentralising the crypto key distributions.
Such a development comes at a time when over sixteen million mobile devices had been infected by malware in the last year, and this trend is showing no signs of slowing down. But by taking the encryption procedure off the internet so that no keys pass through external servers, it is thought that this will be the best and biggest change in cyber security yet.
The limits of innovation
But like any innovative new product, the biggest limitation faced by the Turing Phone will be encouraging its new techniques to be adapted in other products.
This is especially significant as the end-to-end encryption system will only work when information is passed between one Turing phone and another. And despite the developer offering his technology to the main mobile manufacturers, they were all reportedly content with the current levels of cyber security.
But as cyber criminals become ever more inventive in the way that they are able to steal our data, it looks like being only a matter of time before devices like the Turing Phone become increasingly essential.