How to Get Out of an InPrivacy Jail By Yury Chemerkin

How to Get Out of an InPrivacy Jail
By Yury Chemerkin
June 7, 2014
[ YURY CHEMERKIN ]
linkedin.com/in/yurychemerkin
http://sto-strategy.com
[email protected]
 MULTISKILLED SECURITY RESEARCHER
 EXPERIENCED IN :





REVERSE ENGINEERING & AV, DEVELOPMENT (IN THE PAST)
MOBILE SECURITY, INCL. IAM, MDM, MAM, etc.
CYBER SECURITY & CLOUD SECURITY (INCL. IAM)
IAM & COMPLIANCE & FORENSICS ON MOBILE & CLOUD SECURITY
WRITING (STO BLOG, HAKING, PENTEST, eFORENSICS Magazines)
 PARTICIPATION AT CONFERENCES:




INFOSECURITY RUSSIA, NULLCON, ATHCON, CONFIDENCE, PHDAYS, HACKERHALTED,
DEFCON MOSCOW, HACKTIVITY, HACKFEST, NOTACON, HACKMIAMI;
CYBERCRIME FORUM, CYBER INTELLIGENCE EUROPE/INTELLIGENCE-SEC, DEEPINTEL;
ICITST, CTICON, ITA, I-SOCIETY;
WILD ANIMALS: ANIMAL PLANET
AGENDA
 Wild Animals :: < Mobile Apps >
 Wild Tools :: < Forensics Tools, Data/Backup Tools >
 Wild Security Concepts :: < Data Protection Concepts, Best Practices >
 Wild Environment :: < OS: iOS, Android , BlackBerry >
 Wild Security Solutions :: < OS Security, MDM, MAM, MIM Solutions >
 State of Facts :: < Mobile Data Application Report - BlackBerry, iOS, Android >
 Recommendations :: < MAM, Development Advices, etc. >
 Other Salvation Ideas :: < BlackPhone >
Forensics Capabilities on Application Data Access
DATA PROTECTION CONCEPTS
Type
Roots
Data-at-Rest (DAR) protection
Depends on sandbox & FS architecture
Data-in-Use (DIU) protection
More about developer’s imagination
Data-in-Transit (DIT) protection
Mix two previous in regards to whole
device
Data-in-motion (DIM) protection (~DIT)
Like DIT but depends on app
Data-in-action (DIA) protection (~DIU)
OS API and developer’s imagination 
App Disablement (similar to DIU &
DAR)
Rule based policies, out of dev activity
Location Masking (similar to DIT/DIM)
Policies & DIM/DIT characteristics
Storing Information on device ::
iOS data-in-rest Specifics
SQLite storage
 any type of data
File Cache
 attachments, files from clouds, etc.
Binary cookies
 depends, usually, credentials, tokens
Error logs
 any data, even credentials
Keyboard Cache
 auto correction, word list counts 600
iCloud
 all data backup to cloud, even
credentials
Snapshot Storage
 any preview info, like email from Banks
Storing Information on device ::
Android data-in-rest Specifics
Where & What stores ::
/data/data/<package>/…
 App
 analytics, dump, misc
 Cache
 up/downloaded files
 Databases
 history, chat, bank info
 Files
 attachments, crypto-keys
 Shared_prefs
 credentials, token, history
How does it store
 Shared preferences (lightweight XML
format)
 Internal storage (/data/data/ + shared docs
& media)
 External storage (cache, debug, db, maps)
 SQLite (DB, discussed earlier)
 Network (logs/event, datestamp,
credentials)
Storing Information on device ::
BlackBerry data-in-rest Specifics
BlackBerry Backup
 What :: app, app data, app config, all
documents, etc.
 How :: ElcomSoft, any other that works with
BB backup
Shared folders
 What :: docs, media, backup with credentials
may happen
 How :: live access, spyware, rarely encrypted
Remotely accessed data
 What :: device entirely plus SD-Card
 How :: BB Link should authorized PC before
gaining access
Android application data files
 What :: cached files, any other like Android
App
 Where :: Device/misc/android/Android/data)
 How :: like a shared folders or remote access
Misc tracks
 Device/Misc
 What :: Misc files, backup like
whatsapp,
 How:: like a shared folders or remote
access
 Device/Android except android data
 What :: any data Android and Android
apps usually store on SD card
 How :: :: like a shared folders or remote
access
The rest data protected except you got an access
to backup or find a way how to root/jailbreak OS 
EMM FEATURES : Vendors
[ EMM FRAMEWORK ]
EMM (Enterprise Mobile Management)
3rd Party Solutions to EMM
MDM: Mobile Device Management
NAC: Network Access Control
(Management)
MAM: Mobile Application
Management
AV: Antiviruses Solution
MEM: Mobile Email Management
Mobile SIEM: Log Management
Solution
MIM: Mobile Information Management
DLP: Data-Leakage Prevention
Devices: Smartphones, Tablets
COMPLIANCE: Standards, BestPractices, Guidelines, etc.
EMM FEATURES
EMM :: MDM
 Password protection & reset
 Remote & Selective device wipe
 Remote lock
 Set VPN, Wi-Fi, APN, proxy/gateway settings
 Configuration monitoring/auditing
 Automated provisioning/enrollment
 Disable basic features (camera, Bluetooth, Wi-Fi, NFC, Cellular, etc.)
 Manage mobile-attached devices (e.g printers, scanners)
EMM FEATURES
EMM :: MAM
 Full-featured enterprise app store
 Containerization/sandboxing
 App containerization using developer SDK/toolkit, app wrapping
 Block copy/paste between apps, from email, etc.
 Restrict which apps can open a given file
 App inventory tracking / usage monitoring
 Remote desktop access to apps and data on desktop from mobile
[ EMM FRAMEWORK :: MEM SOLUTIONS ]
MDM: Mobile Device
Management
NAC: Network Access Control
(Management)
MAM: Mobile Application
Management
AV: Antiviruses Solution
MEM: Mobile Email Management
Mobile SIEM: Log Management
Solution
MIM: Mobile Information
Management
DLP: Data-Leakage Prevention
Devices: Smartphones, Tablets
COMPLIANCE: Standards, BestPractices, Guidelines, etc.
[ EMM FRAMEWORK :: MIM SOLUTIONS ]
MDM: Mobile Device
Management
NAC: Network Access Control
(Management)
MAM: Mobile Application
Management
AV: Antiviruses Solution
MEM: Mobile Email Management
Mobile SIEM: Log Management
Solution
MIM: Mobile Information
Management
DLP: Data-Leakage Prevention
Devices: Smartphones, Tablets
COMPLIANCE: Standards, BestPractices, Guidelines, etc.
[ MOBILE DEVICE SECURITY ENVIRONMENT ]
SPOT THE DIFFERENCE 
SECURE BOOTLOADER
SYSTEM SOFTWARE SECURITY (UPDATES)
APPLICATION CODE SIGNING
RUNTIME PROCESS SECURITY (SANDBOX,
APIs)
HARDWARE SECURITY FEATURES
IN-REST PROTECTION
IN-TRANSIT PROTECTION (SSL, TLS, VPN)
PASSCODE PROTECTION
CENTRALIZED APPLICATION DISTRIBUTION
SETTINGS DELIVERY (PERMISSIONS,
CONFIGURATIONS)
REMOTE MAGAGEMENT
LOG COLLECTION
NO DIFFERENCE, RIGHT 
[ KNOW YOUR APPS – 3RD PARTY REPORTS ]
AFFECTED PLATFORMS
APPTHORITY REPORT HIGHLIGHTS
App Reputation Report , Winter 2014%
31%
91% iOS apps exhibited risky behaviors
22%
83% Android apps exhibited risky behaviors
91%
24%
70% iOS and Android apps allow location tracking
56% iOS and Android apps identify the user’s ID (UDID)
58%
83%
56%
58% free Android apps share data with ad networks
24% paid Android apps share data with ad networks
31% free apps access users’ contact list or address book
70%
22% paid apps access users’ contact list or address book
[ KNOW YOUR APPLICATIONS ]
AFFECTED PLATFORMS
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: BUILT-IN APP
Calls; 93,00%
Email; 73,00%
Messages; 85,00%
Notes; 89,00%
Calendar; 76,00%
Contacts; 95,00%
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: IM APP
Facebook
Messenger; 87,00%
Lync; 61,00%
Kik Messenger;
79,00%
Viber; 87,00%
BBM; 86,00%
Whatsapp; 85,00%
WeChat; 78,00%
Hangouts; 80,00%
Skout; 76,00%
Yahoo Messenger;
75,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Account
 country code, phone number
 login / tokens Facebook wasn’t revealed
 ‘Buy me for….$$$’ 
 Avatars :: [email protected] (jfif)
 Address book
 No records of address book were revealed…
 Check log-file and find these records (!)
 Messages
 Messages
 Date & Time
 content of message
 ID :: [email protected]
 Attachments (as is)
FORENSICS EXAMINATION
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Account
 country code, phone number
 Device Hardware Key
 login / tokens of Twitter & Facebook
 Calls history
 Name + internal ID
 Duration + date and time
 Address book
 Quantity of contacts / viber-contacts
 Full name / Email / phone numbers
 Messages
 Conversations
 Quantity of messages & participants
per conversations
FORENSICS EXAMINATION
 Additional participant info (full name,
phone)
 Messages
 Date & Time
 content of message
 ID
 Attachments & Preview (as is)
 VoiceMessages
 Media
 Snapshots (iOS only)
 Snapshot of active chat
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
FORENSICS EXAMINATION
 Account ::: PIN , Names, Status "74afbe19","Yury Chemerkin“, "*fly*“, "@ Holiday Inn (MOSCOW)"
 Information
 Barcode / QR history (when, what)
"QR_CODE","bbm:2343678095c7649723436780","1382891450014"
 Transferred files
"RemotePin“, "Path","ContentType“, "image/jpeg“, "23436780“,
 "/storage/sdcard0/Android/data/com.skype.raider/cache/photo_1383731771908.jpg“
 Transferred as a JFIF file :: FFD8FFE000104A464946
......JFIF
 Invitations: "Pin","Greeting","Timestamp",”LocalPublicKey/PrivateKey","EncryptionKey«
 Messages (Date, Text,…) :: "1383060689","Gde","Edu k metro esche, probka tut","Park
pobedy”,"Aha","А щас","Belorusskaja","Долго"
 Logs
 Revealing PINs, Email, device information,
 Applications actions associated with applications modules *.c files, *.so, etc.
 It helps to analyze .apk in future
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Contacts
 Full Name
 Work Info
 Phone number (00-country-code-….)
 Email
 Is AppName user
 App Info
 App Name (list of app)
 App Icon
 Misc
 Friends group,
 Friends requests
 Members
 Messages
 Country Name
FORENSICS EXAMINATION
 FB number ID
 G+ number ID
 Twitter numeric ID
 Foursquare numeric ID
 FB access token
 NickName (Device name is like iPhone (Yury)
 Media
 Snapshots
 Profile photos
 App icons
 Credentials
 Nothing revealed
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: SOCIAL APP
SlideShare; 67,00%
Scribd; 63,00%
Facebook; 83,00%
So.Cl; 42,00%
Instagram; 67,00%
Groupon; 68,00%
Twitter; 81,00%
MySpace; 61,00%
Pinterest; 57,00%
Vkontakte; 78,00%
LinkedIn; 59,00%
Google+; 55,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Media
 User images/avatar (first of all, of those
who're on messenger/chat)
 Snapshot of app screen (iOS only)
 Pic/avatar URL,
 Image cache .jfif
 Conversation
 Thread ID, Name , Date & Time
 Quantity of Messages
 Message / body
 ID of sender/recipient
 Status :: Unread/archived/can reply
 Account
 Tokens, incl. private
 Lot of configs
FORENSICS EXAMINATION




 Numeric ID of account
(100001827345335.plist)
Address book / Synchronized
 Full Name, Email , Phone number
Users
 User ID, User Name , User NickName
 Has a mobile messenger? Is a Friend ?
 Email
FB Messenger
 configs
 User Phone Number
 Friend avatars
Credentials
 Nothing revealed
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Media
 Snapshots
 Profile Info
 Friend profile URL + Full Name + Photo
 Twitter User name
 FB Permissions – publish stream
 FB token key & expiration
 Login name
 Actions
 Comments & profile name of those who
comment photo
 Cache of uploaded photos plus date & time
 Stored on Amazon S3 
FORENSICS EXAMINATION
 Credentials
 Nothing revealed
 Network (in-transit)
 Profile Name + URL
 Friends’ Name + Url
 Upload /Download photos
 Comments
 Seems everything except credentials
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Media
 Snapshots
 Messages time
 Conversations
 Attachment Info, URL
 Uploading attachments in plaintext
 Sending messages in plaintext
 Friends
 Full Name
 Profile URL Avatar
 Birthday
 Misc tokens (?)
 Credentials
 Nothing revealed
FORENSICS EXAMINATION
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: GEO APP
Trover; 69,00%
Banjo; 62,00%
Google Maps;
73,00%
FourSquare; 85,00%
2GIS; 61,00%
Yandex Maps;
76,00%
GeoBucket; 54,00%
TrackMe; 51,00%
Navitel; 64,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Media
 Snapshots
 PNG map shots of friends & check-ins
 Uploaded photos via app on check-in event
 User/Credentials
 Search request info by name/location/etc.
 Like, Comments + friend username per
check-ins
 Badges + description and who unlocked it
 Credentials weren’t revealed
FORENSICS EXAMINATION
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: OFFICE APP
AsusWebStorage;
Google Disk; 57,00%
51,00%
eFax; 73,00%
Box; 67,00%
Dropbox; 67,00%
OneDrive; 51,00%
Office Mobile;
51,00%
QuickOffice; 71,00%
AdobeReader;
51,00%
DocsToGo; 71,00%
Yandex.Disk; 65,00%
Mail.Ru; 65,00%
Amazon Cloud
Drive; 67,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Logs
 iOS version as a log-file-name
 Settings like upload_over_cell or
geofence_state
 User_id (numeric)
 Perms like “permission.photos.granted”
 Extension
 Connection time – WiFi, Cellular
 Size
 Download info (started, finished, failures)
 Device ID
FORENSICS EXAMINATION
 Uploads
 Images, resized images
 Other files as is even (cpp )
 Cached PDF as separated jpg pages
 Media
 Snapshots (iOS only), profile photo
 Credentials
 Nothing revealed
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 OneDrive + OneDrive for Business
 Uploads
 Images, resized images
 URL to download (have to login via liveID)
 Full url to download file
 Full user name
 Downloaded files as is
 Permissions info
 PDF stored NOT as separated jpg pages
 Credentials
 Nothing revealed
FORENSICS EXAMINATION
 Office Mobile
 login name (= email)
 cached files w/o name
 Images, resized images
 Sharepoint URL even it's not public
 Media
 Snapshots (iOS only)
 holiday inn reservation pdf as a jpeg
[ KNOW YOUR APPLICATIONS ]
FEATURES VS PRIVACY :: TRAVEL APP
Taxi (any); 31,00% Yelp; 57,00%
AnywayAnyday; 74,00%
Hotels.com;
64,00% Travel;
BlackBerry
S7; 62,00%
73,00%
KLM; 64,00%
Hilton; 78,00%
Lufthansa; 26,00%
Miles & More; 27,00%
HotelByMe; 23,00%
JetBlue; 43,00%
American Airlines;
56,00%
United Airlines; 61,00%
Aeroflot; 73,00%
British Airways; 23,00%
Delta; 67,00%
IHG; 81,00%
Hilton; 73,00%
SPG; 79,00%
Booking.com; 54,00%
Marriott; 56,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 AeroExpress
 Account & Credentials
 Email address = login
 Password
 Phone Number
 Products
 Tickets number & QR-ticket
 How to use e-Ticket
 What time train departs & arrives 
 Payment Info
 Full Name
 Card number
 Expiration Data
 CVC/CV2 wasn’t revealed
 Repack app and grab any type of data
FORENSICS EXAMINATION
 Aeroflot
 Account
 ID , email, password
 Other id & tokens
 Information
 Loyalty (bonus) of your membership
 all you ever type
 Date of birth
 Passport details
 All PASSPORT INFO (not only travel data)
 Your work data (address, job, etc.) you have
never typed! (except preparing member
card)
 Flights tickets
 Repack app and grab it
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Account
 ID , email, password
 Information
 Loyalty (bonus) of your membership
 all you ever type
 Date of birth
 Passport details
 Book/order history
 Routes,
 Date and time,
 Bonus earning
 Full info per each order
FORENSICS EXAMINATION
 Connected cards
 Encryption?
 AES
 256 bit
 On password
anywayanydayanywayanyday
 Store in plaintext
 Sizeof(anywayanydayanywayanyday) =
192 bit
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Delta (Fly with Delta)
 Account
 ID , password is seems encrypted on
Android& BB, password not found on iOS
 Information (android & bb only, nothing found on
iOS, seems not precached)
 Loyalty, Membership 901***** \\ Skymiles
 Flight
 confirmations, depart time, flight #::
GCXXXX || 0467 || 2013-1107T12:40:00+04:00 || DL90
 "checkedIn": "false“, "seatNumber":
"09B",
 Issued date, ticket # :: "2013-1026T15:37:00-04:00", 006xxxxxxxxxxx
 Aeroports ::
 SVO/ "Sheremetyevo Arpt, JFK/"John
FORENSICS EXAMINATION




F Kennedy International“, NYC / "New
York-Kennedy“…
British Airways
Account
 ID , password on Android, BB
 ID on iOS
 Loyalty card number & Info
 Tracked Flights Info (iOS)
 Full Name (iOS), Email (iOS)
Product
 Not revealed (tickets, history or else)
 PassBook Integration (iOS only)
Media
 Snapshots
 Cached images with exif (like NY SkyBridge)
[ KNOW YOUR APPLICATIONS ]
Mail.Ru Money;
15,00%
RBK Money; 22,00%
A
AlfaBank;
4,00% 4,00%
Raffeisen;
RSB; 4,00%
Sberbank; 6,00%
Citibak; 3,00%
Tinkoff; 3,00%
Paypal; 16,00%
Yandex Money;
17,00%
Qiwi; 14,00%
Megafon Money;
17,00%
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Account
 Phone number
 Password, secret code weren’t revealed
 Trace app, find the methods use it
 Repack app and have a fun
 No masking of data typed
 Information
 Amount
 Full info in history section (incl. info about
who receive money)
FORENSICS EXAMINATION
 Connected cards
 Encryption?
 No 
 Bank cards
 Masked card number only
 Qiwi Bank cards
 Full & masked number
 Cvv/cvc
 All other card info 
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Megafon.Money
 Account
 Phone number
 tokens
 Other
 Password wasn’t revealed
 Rest data wasn’t found
 RePack app and find everything
FORENSICS EXAMINATION
 Mail.Ru Money
 Account
 ID (email = payment ID)
 Password , salt hash (seems, SHA_X,
not detected which SHA)
 Payment Info
 Amount
 Masked bank card number
 RePack app and find everything
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Yandex Money
 Account & Credentials
 ID info for Yandex Money
 ID info for Yandex
 Bank name per attached card
 Transaction history
 ID , Amount , User comments
 Status, Time & Date, Favorite or not
 Login per transaction
 misc
 Other
 Password and payment password weren’t
revealed
 RePack app and find everything
FORENSICS EXAMINATION
 RBK Money
 Account & Credentials
 Email = login
 Password
 Payment Info
 Payment /Transaction History
 Phone number on SIM payments
 RePack app and find everything
 Masked bank card number like xxxx****xxxx
[ APPLICATION EXAMINATION ]
ONLY THOSE I HAVE TO USE EVERY DAY
 Bank apps
 Rarely store anything in-the-rest
 Obfuscation happens / NDK instead of JDK
 Alfabank reveals geo data in-the-rest
 Alfabank reveals the latest phone number in
payments
 Repack app and grab everything from
memory (credentials too)
 Tinkoff offers his own input field,
seems protected
 Other
 Password and payment password weren’t
revealed
 Snapshots are protected (!)
FORENSICS EXAMINATION
[ KNOW YOUR APPLICATIONS ]
PRIVACY LEAKAGE :: % OF DATA LEAKAGE
In-the-Rest; 57,00%
In-the-Memory;
95,00%
In-the-Transit;
71,00%
[ KNOW YOUR APPLICATIONS ]
FORENSICS APPLICATION EXAMINATION :: EXCITING FAILS
App Type/Protection In-Rest
In-Memory
In-Transit
built-in apps
Plain-Text
Plain-Text
Rarely Encrypted
IM apps
Plain-Text
Plain-Text
Weak Encryption or SSL
Social app
Plain-Text & Rarely Store smth
Plain-Text
Best case - SSL/HTTPS
Geo Apps
Plain-Text
Plain-Text
Best case - SSL/HTTPS
Office Apps
Plain-Text
Plain-Text
SSL/HTTPS
Travel Apps
Best case - weak encryption
Plain-Text
Partially Encrypted
Bank apps
Rarely Store smth & Good Encryption Plain-Text
Encrypted
EMM FAILS :: MAM
 PACKAGED/WRAPPED APPLICATIONS
 QUANTITY OF APPLICATION CHALLENGE ( OBVIOUSLY > 100  )
 COOPERATION WITH APPLICATION VENDOR
 SEPARATION OF PERSONAL, WORK, AND SUSPICIOUS APP
 SERIOUSLY DIFFERENCE ON APP INTERFACES PER EACH OS WITH THE SAME APP
 VPN
 ENCRYPTION
 ACCESS RESTRICTION (GEO, CREDENTIALS)
EMM FAILS :: MIM
 LACK OF TYPE FILES’ MANAGEMENT
 LACK OF STORAGE SERVICES’ MANAGEMENT
 LACK OF DEVICE FILES’ MANAGEMENT
 LACK OF VENDOR SUPPORT
 NEED OF A ROOT ACCESS TO DEVICE IN CERTAIN CASES
 MOBILE OS INCAPABILITIES TO BE INTEGRATED WITH MIM SOLUTIONS
EMM :: WHO IS GOOD FOR ?
AirWatch
App47
AppBlade
AppCentral
BlackBerry
(BES/Fusion)
MaaS360
Kony
MobileIron
Nukona
Partnerpedia
an MDM and MAM specialist that helped Lowes deploy and manage iPhones
which offers a platform that allows enterprises to deploy their own App stores (hot
opportunity alert)
which supports application deployments and management across iPhone iPad BlackBerry
and Android platforms.
which also helps enterprises to develop app stores
is good for MDM partially MIM & MAM. Supports all mobile OS
is good with BlackBerry together
which has a platform that allows partners to build enterprise app stores for customers.
focused heavily on MDM
another provider of enterprise app store technology
the former builder of channel partner communities; now focused on private labeled app
stores.
WorkLight
now owned by IBM; focused on mobile development tools middleware and management
Terria Mobile
which offers a platform for app management.
Good Technology supports application deployments and management across modern OS
ANDROID SPECIFIC REMEDIATION
Call ‘setStorageEncryption’ API for locally stored files (new Android OS v4+)
Encrypt externally stored files on SD Card or Cloud (any OS)
Reduce using of ‘MODE_WORLD_READABLE ’ unless it really needs
Avoid hardcoded and debug tracks as much as possible (it’s easy to
decompile)
Add extra protect beyond OS (encryption, wiping, etc.)
iOS SPECIFIC REMEDIATION
Never store credentials on the phone file system. Use API or web scheme instead
Define when encryption signature doesn’t matter, else avoid it
Use implemented protection mechanism in iOS…
But … add extra protection layer beyond OS protection in case of jailbreak
Use any API and protection mechanisms properly but never default settings
Don’t forget to encrypt SQL databases
One More Salvation – Black Phone (?)
GeeksPhone – Spanish Hardware StartUp Silent Circle is privately funded (Americans)
Black Phone – Examination of Rumors
Website offers no details on how those extra levels of security will be implemented, but..
 Silent Circle is U.S. based company
 Zimmermann is cofounder of mobile privacy software firm Silent Circle
 GeeksPhone is a Spanish smartphone hardware company/start-up
 GeelsPhone sells open Android phones and developer devices of Firefox OS.
 SPG Technology is a Switzerland-based join venture
 IntelliJ IDEA is used to build applications
Black Phone Software – Examination of Rumors
Computer Retail Week interviews founders and states
 How was the idea for the Blackphone
conjured up?
 Large market of folks who didn't want
to build their own car, but they
wanted a good car
 Why should users want to have a
Blackphone? Security Center
 At $629 is the total package.
 Lot of security magic to stop leaks out
 Who is buying the Blackphone?
 45 percent of orders have come from
Europe and 38 percent from North
America
 Blackphone is gathering as little
information as possible on who is
buying its product
 Who should be buying a Blackphone?
 There are clearly industries that are
already predisposed to seek privacy,
such as stockbrokers, attorneys,
senior executives
 Why is this phone safer than what's
currently out there?
 It's safer because it's more usable
 Every bit of information the phone
sends out is encrypted whether it's a
call or a text. No one can offers it now
 BYOD/Enterprise?
 Absolutely, even MDM tools
 How secure is the Blackphone?
 Anybody who claims that anything is
hackproof is clearly selling snake oil
Black Phone - Software
The Blackphone is an announced smartphone developed by SGP Technologies, that will
provide encryption for phone calls, emails, texts, and internet browsing.
 Silent Circle Apps
 Silent Phone
 Silent Text
 Silent Contacts
 3rd-party Apps
 Disconnect Secure Wireless
 SpiderOak Blackphone Edition
 Kismet Smart Wi-Fi Manager
 Blackphone-built Apps
 Blackphone Security Center
 Blackphone Activation Wizard
 Blackphone Remote Wipe
 Misc
 PrivatOS
 International Power Adapter Kit
Black Phone - Examination
Servers of its custom-built network are located in Canada
Also Supports iOS, Android, Windows Desktop
 Silent Phone: Encrypted voice and
video calls on iOS and Android, it can
be used with Wi-Fi, EDGE, 3G or 4G
cellular.
Encrypted
VoIP
from
Windows computers.
 Silent Text: Encrypted text messaging
and secure cloud content transfer
with “burn notice” feature for
permanently deleting messages from
devices.
 Silent Mail: Discontinued August 9,
2013. Encrypted e-mail on Silent
Circle’s private, secure network and
compatibility with popular e-mail
client software.
 Silent Contacts: App is prebuilt with all
previous
Black Phone - Examination
The company's products enable encrypted mobile phone calls, e-mail, text messaging,
and video chat. Servers of its custom-built network are located in Canada
 Silent Phone/Text/Contact: available for iOS & Android with source code on GitHub
 Remote Wipe: Provides no centralized cloud service to manage device
 Private OS: Android 4.4 KitKat
 International Power Adapter Kit: Android 4.4 KitKat
 Disconnect Secure Wireless: its custom-built VPN client
 Kismet Smart Wi-Fi Manager: Public Wi-Fi Manager
 SpiderOak: Encrypted Cloud Storage
Black Phone /
Smart Wi-Fi Manager
Is that secured ?
 It manages Android phone Wi-Fi
connection by automatically learning
where you use networks. Wi-Fi is only
enabled when you are in a location
have previously used Wi-Fi, increasing
battery life, security, and privacy.
 It is a paid app in Google Play but fully
open source under the GPLv2 license.
 It aims to be smart, invisible and will
manage Wi-Fi state in the background.
 Airplane mode and Wi-Fi Tethering
modes are detected and respected
 Since Wi-Fi will be turned off, your
phone won't be broadcasting your
home network name everywhere you
go! It prevents spoof attacks
 Successfully installed on BlackBerry 10
Black Phone /
SpiderOak
Why not Box or Mega?
 It is US based online backup tool to
back up, share, sync, access and store
data using an off-site server.
 It is accessible through an app for
Windows, Mac and Linux computer
platforms, and Android, N900 Maemo
and iOS mobile platforms
 It uses encrypted cloud storage and
client-side encryption key creation, so
even employees of SpiderOak cannot
access users' information
 It provides automatic de-duplication
of data
Black Phone /
SCMC (MDM)
Oh, God 
 It can be incorporated to the typical
policy and management tools in a
business environment
 A web-based console which grants a
nominated customer administrator
“super user” status within his or her
own network.
 Create, organize and bulk distribute
via email to provide team members
with Silent Phone, Silent Text, and
Out-Circle Access.
 Create groups and sub-groups to
reflect your company’s organization
and allocate encrypted mobile apps
accordingly.
 Dynamically manage and control
(enable/deny access) for all users
under your administration.
 Enable outliers, contractors, and third
parties to communicate securely with
your team on the fly.
Black Phone: Pros & Cons
Fully protected (no any PoC yet)
Impractical & too commercial
Encrypted Contacts, splitted for personal &
business uses
Alike any other app on AppStore or
GooglePlay,WorkBalance MDM Solution
Encrypted Text, Media Messenger
TextSecure,CryptoCat, BBM, etc?
VoIP for encrypted Calls
VoIP is everywhere for the less price 
Smart WiFi Manager to prevent attacks
Gather Geo, Network Data, AutoLearn
Disconnect Secure Wireless VPN
VPN is everywhere too
Privat OS is Android 4.4 KitKat
GeeksPhone offers a root access …
MDM w/o MAM, MIM, MEM
Impractical, MAM need at least
BlackPhone gathers little info on who is buying it
Name, Address, Payment method, Personal or
Enterprise
Black Phone: Pros & Cons : Storages
SpiderOak
Is that only one?
Provider
Encrypted storage
Personal Encryption2
Carbonite
+
+
Copy
+
+
CrashPlan
+
+
ElephantDrive
+
+
Handy Backup
+
+
IASO Backup
+
+
Jungle Disk
+
+
KeepVault
+
+
MediaFire
+
+
MEGA
+
+
Norton Zone
+
+
OwnDrive
+
+
SpiderOak
+
+
Sync
+
+
TeamDrive
+
+
Wuala
+
+
Box (PreBuild on BlackBerry)
+
+
Black Phone: Pros & Cons
PrivatOS
Android
iOS
Search
PrivatOS Enhancement
Anonymous
Bundled Apps
Few, and all privacy-enabled
Wi-Fi usage
Smart disabling of all Wi-Fi
except trusted hotspots
Always on for geolocation
and user tracking
Separate + Per Apps
Global + Separate Per App
App permissions
Fine-grained control in a
single interface
All-or-nothing
Fine-Grained Control
On-Demand Access
Both, need VPN
configuration
Both, need VPN
configuration
Frequent secure updates
from BlackBerry directly
Frequent secure updates
from Apple directly
Cloud account
Delivering secure & privacy
as a default valued feature
last 20+ years
Cloud account
Communication tools
Android Default
Trackable
BlackBerry
Many, with privacy disabled
by default
Least privilege access control
Private calls, texting, video Traceable dialer, SMS, MMS,
browser. Vulnerable to
chat, file exchange up to
spoofed cell networks and
100MB, browsing and
Wi-Fi
conference calls
Frequent secure updates
from Blackphone directly
Supplied infrequently after
carrier blessing
Remote Wipe & Anti Theft
Anonymous (??)
Requires use of centralized
cloud account
Business Model
Delivering privacy as a
premium, valued feature
Management
MDM
Updates
BlackBerry
Both & Flexible
iOS
Both
On-Demand Access
Personal data mining for
tracking and marketing
Music, App, Games :)
Weak MDM
Features/Samsung enhanced MDM, MAM, MEM, MIM,… MDM, MAM, MEM, MIM,…
The end.
Y.O.B.A. hacking