Question | Cnil, want a more secure smartphone? Here is the bone recommended by Edward Snowden
Fancy a more secure smartphone? Here is the bone recommended by Edward Snowden
Indeed, at a time when questions relating to our personal data and their confidentiality become essential, it is quite interesting to know the mobile OS that a personality of the Snowden caliber recommends.
Need help
You are looking for information ? The most frequently asked questions are identified here.
Ask your question in the box below, our system will send you questions related to your problem.
My smartphone, how to secure it ?
Your smartphone contains more and more information on your privacy.
- Do not record confidential information In your smartphone: secret codes, access codes, bank details, etc;
- Born not deactivate the PIN code and change the one offered by default. Avoid too easy codes (date of birth, 0123, etc.);
- Put in place a period of automatic locking of the telephone, in addition to the PIN code: this prevents consultation of information in the event of loss or theft;
- Activate the Information encryption Saved on your phone: even if the device is on, no one can access your data without your password;
- Install a anti-virus ;
- Note it “IMEI” number of the phone to block it in the event of loss or theft;
- Do not download applications from Unknown sources ; Prefer official platforms;
- When you install a new application on your device, check which data it will have access to;
- Read them Terms of use of a service or an application before installing it and consulting the opinions of other users on the Internet;
- Adjust them Geolocation parameters in order to always control when and by whom to be geolocated.
> Your request has been taken into account.
An error has occurred.
Fancy a more secure smartphone ? Here is the bone recommended by Edward Snowden
Edward Snowden, the name is certainly not unknown to you. Following his revelations, the whistleblower has indeed become an enemy of the United States. Revelations which revealed to the general public the mass monitoring set up by the NSA, among other highly confidential information concerning this agency and the CIA.
That said, we are not going to relate Snowden’s arms facts. We will rather be interested in another point, just as important when it comes to cybersecurity.
Indeed, at a time when questions relating to our personal data and their confidentiality become essential, it is quite interesting to know the mobile OS that a personality of the Snowden caliber recommends.
If you thought of Android or iOS, you were wrong
For Edward Snowden, things are simple. “” The iOS and Android operating systems that run on almost all smartphones hide an incalculable number of programming faults, known as security vulnerabilities, which mean that current apps like Imessage or web browsers become dangerous: You can be hacked. »»
And when we think of what Edward Snowden has managed to achieve, we can say that the guy knows a radius question cybersecurity. This is why he apparently trusts an operating system for mobiles other than those of Google or Apple. An open source mobile OS focused much more on confidentiality and security.
Grapheneos, the one recommends Edward Snowden (and even Jack Dorsey)
Concretely, Grapheneos is an operating system for smartphones developed for a while by Daniel Micay, a specialized computer security engineer, and his team. It is free and developed in open source, all its ingenuity is based on the security it provides its user. Besides, in addition to Edward Snowden, Jack Dorsey himself made a tweet about this bone.
In broad outline, Graphèneos is a bone based on Android but the comparison stops there. Indeed, this bone does not have No integrated Google applications or services (Google Play and others). Obviously, safer alternatives are offered to replace these.
The emphasis is also to put access to third -party services (ISP among others) to your data. And to top it all, Grapheneos offers a disc encryption system that would make even the most experienced hackers pale, in addition to a whole section of safety features.
You will understand, we are talking squarely about a completely different approach in terms of personal data management and cybersecurity. If that tickles you, it’s here for more details.