Friday, May 15, 2009

Peel 'BarackBerry', Special BlackBerry Obama





Saking terrible BlackBerry (BB), up-to make Barack Obama President of the U.S. indirectly 'promote' the product. For, it includes a user-intensive and BB terbantu by many devices are in communication during the campaign. So when you want to be separated from the BB tercintanya, the resistance to the president directly.

In fact the office staff is not excessive because the presidency to President of the United States level, using a BB for official communication affairs office (United States President) is very dangerous. One of the things that ditakuti is the property of BB GPS Obama will give the exact coordinates where she is and this will help those who intend evil to it.

As described previously, including the BB device is actually a more secure compared to other smartphone because of the network provider, it has its own proprietary network. But this only applies if the user and not the people with the essential data communication is important and diincar.

If we can smartphone ibaratkan as cars that can protect users from the mine because the nails have been using tubeless tires, the BlackBerry can diibaratkan with a special car with run flat tire technology. So even though mine is exposed to specific tubeless tires keep the car stable running speed up to 80 KM per hour.

But President Obama needs more than that, other than the run flat tire, Obama also need antipeluru car and the car because antibom threat for far more than the layman. Similarly with the property Blackberry Obama, even though the network is equipped with exclusive and special from the Rim to Rim BlackBerry President Obama also provide additional encryption, this is still not considered safe by NSA (National Security Agency), cryptography government agency that specializes protect information U.S. vital.

This is believed to correct because a famous hacker, Kevin Mitnick is not directly reveal is a strategic step to solve the password protector (encryption) BlackBerry Obama has been strengthened with the encryption ganda. If you talk to solve the most complicated encryption though, in Russian group of hackers in time not too long akan successfully to find ways to find out important information that is sent encrypted by the first black President of the USA.

Not to speak of the other countries concerned that have funds and resources that can be said is not limited to password encryption code to solve this, because in principle there is no encryption is safe in this world and only a problem of time and resources just to solve a complex encryption.

This was in World War II, where the associate works to solve Enigma encryption owned by German intelligence and Purple used by the armed forces Dai Nippon. Therefore, NSA recommended device replacement for President Obama BB produced by General Dynamics, Sectera Edge. Communication device which 'claimed' most secure in the world (at this time) because it has been certified by NSA.

Sectera Edge alias' BarackBerry '

Sectera Edge is a communication device that has been certified by NSA to be so trusted for BB in the communications Obama presidency. One of the key security Sectera Edge network because this is the use of SIPRnet (Secret Internet Protocol Router Network) and does not separate combined with other conventional communications network.

Sectera Edge can use three modules of communication that is Wi-Fi, GSM and CDMA. In addition, it has a superior resistance to dust, water resistant (both rain water and get into the ditch tercebur), resistance to change and extreme weather resistant shocks where if fell from a height of 4 feet to the surface is still hard to function properly.

A quite surprising, Sectera Edge uses Microsoft Windows Mobile OS is included in Word, Excel, Powerpoint and Windows Media Player. Although the computer in the world 'om its' aka the Windows Mobile operating system is Windows is the virus most often attacked, but in the cellular world was the most attacked virus that is the Symbian operating system and take advantage of spreading the majority of Bluetooth and memory card.

This is a logical consequence of the operating system where most tempt the virus is not pointing at one particular brand, but the operating system the most popular because the virus will be zero in the number of potential victims the most.

Need to be confirmed again that this Sectera Edge diplesetkan although often as a 'BarrackBerry', apparently does not have any relationship with the BlackBerry. Blackberry Rim besutan is a product of Canada with the Blackberry operating system, while the product is Sectera Edge General Dynamics, a military contractor United States government is using the Windows Mobile operating system.

Secure Talk

Proportionate security with convenience inverted, so that should be received by the user Sectera Edge. In addition to the large size and clog-like, and so remain firm can still function even if already used to throw the head villain, not any communication equipment can be connected to the Sectera Edge.

For example, because the voice data is encrypted, so to listen to the voice is talking opponents also have to use the device that can mendekripsi data that has been encrypted. So the opponent must use talking Sectera Edge GSM compatible phone or regular phone that has the ability decryption of encrypted conversations Sectera Edge.

This feature is called Secure Talk. In theory, how to know the data is encrypted with key dekripsinya and the possibility that diincar by key stakeholders in the security technology is Sectera Edge Talk Secure this (both software and hardware).

In addition, there is one thing that does not mengenakkan for Obama to use this Sectera Edge, bandwidth SIPRnet kept strictly by the United States Department of Defense, where all communication data monitored by a number of the board of supervisors on duty, filter and measure the level of security of data flow.

Imagine such as film'24 ', what if this is the board of supervisors who successfully disusupi, such as what encryption secanggih akan also useless. Back security law valid, terlemah point in the implementation of security is a human. (Source: Detiknet)

No comments:

Post a Comment