20
May
08

Cell Phone Security- is NOT!

inbox.gifAs I mentioned back in December, your life on a cell phone is not as secure as we would like it to be.

A recent iPhone Atlas article, that TUAW reported, and Engadget noted, tells of iPhone guru and author Zdziarski clearly demonstrated how difficult it is to truly erase your data, even when you want to, let alone, if your phone just gets misplaced or stolen.

You can be certain that all phones cache data in different little corners users have no access to. The only way to finger2.jpgtruly help ameliorate the problem is to implement some sort of hardware encryption in the phones themselves. Then with the presentation of the proper biometrics, the data becomes available. 

Without the proper biometrics, the data should just be a jumble of data.
But how many phones feature hardware encryption?

What sort of information is available on your phone?

What e-mails with log-in information did you receive?

What phone numbers would you rather not be made public?

I know of several people who use their phone/PDA to keep track of all the various online user names and passwords they have.

Access to this is just a few short steps away from identity theft. 

Commenter to Zdziarski’s article “seika719”  offers a basic way to make it one big step harder to recover data:

Why not just erase/restore to make space, then fill it to capacity with music to overwrite every bit of memory? Do it again with different music if you feel the need. 

While it may not stop high-end recovery tools which can somehow see through new data to the overwritten data (at least on hard drives), this would at least make it hard to casually open up and peruse a phone you are deliberately reselling. 

But a phone that’s lost or stolen?
You don’t get the opportunity to carefully and deliberately wipe it.

As cell phones become far more powerful, we need better security on these things.
So don’t save passwords on your phone.
Don’t leave yourself logged in to e-mail accounts.
Don’t leave copies of important documents on your phone.

Treat your phone like a guest kiosk at an internet cafe.
Use it to access what you want, but leave nothing behind.
Your hundreds of phone numbers are enough!

.

Advertisements

0 Responses to “Cell Phone Security- is NOT!”



  1. Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: