100%(1)1 out of 1 people found this document helpful
This preview shows page 10 - 13 out of 14 pages.
Simlar: Developed in Germany, open source app to establish end to end encrypted calls with theZRTP protocol, a cryptographic key agreement for VoIP calls, not even Simlar developers canlisten in to the calls. To protect from man-in-the-middle attacks, Similar shows a small code onthe screen that can be read to your contact to confirm that you are both looking at the same.
APPLE VS ANDROID FEATURES AND VULNERABILITIES 11CoverMe: Full mobile phone communications suite securingcalls, messages, files and phonestorage. CoverMe encrypts your calls, sends self-destructing text messages and creates anencrypted vault in your phone where tostore private data. Adecoy password can be set up in theevent thatyou are forced you to reveal it, the app also assigns you a US phone number that canbe used to receive calls.”(7)Android Privacy Guard app which encodes email messages on the OS makes an open sourceapplication called Open PGP. The K-9 email app works along with APG. First start K-9 andconnect to email server, start APG ,press menu button, to manage private keys and public keysappear, import APG from the desktop then K-9 displays choices to sign and encrypt messages ina current email. It also can take emails and decrypt them. Open Chat Secure encrypts messagesby enabling secure chat sessions with other people over popular sites like Google Talk andFacebook. Lock up your phone to be safe to keep things private use Screen Locker tolock the screen. This app debilitates all kinds of inputs and stops others to see what is on thescreen. To unlock the phone use a preset strategy. Another method is using Privacy Master Freewhich stops admittance to apps and keeps apps from starting, block the task manager and USBcontacts. AppLocker app feature is to create locked profiles, can randomly rearrange the numerickeyboard to keep other people from figuring out the password by watching your fingers. The last way to secure an Android phone is to encrypt information on both ends so data becomesintelligible without appropriate decryption keys. Be sure to back up data securely beforebeginning the process and do not stop the procedure or all data is lost and the phone cannot beused.
APPLE VS ANDROID FEATURES AND VULNERABILITIES 12I believe the problem with an iOS phone by Apple is that it needs to be locked downimmediately so if the phone falls into the wrong hands there is no access to the vital informationcontained inside. I myself have lost my cell phone many time and was in a panic of notimplementing a feature like this so because I did not lock my phone down I was susceptible tohaving criminals have access to my phone. Simple wayto make the iOS phone more secure isquite easy. “The first suggestion fromCNETis to ensure that your iPhone locks soon after youturn off the display. You can change the amount of time it takes for your phone to lock ingoinginto Settings tab, Touch ID & Passcode,Require Passcode, where you will be presented with afew options. I personally have my phone lock immediately after I hit the power button.”(8)