HOW DO GERMAN SPECIAL SERVICES CAN TAKE CONTROL OF A SELECTED PHONE BY PHONE CALL INTERCEPTION?

Remote Communication Interception Software. Sounds mysterious and should stay that way. But what are journalists for? Deutsche Welle announced some time ago that at the end of the year (and thus now) German law enforcement agencies would be able to almost take control of the phone of a selected person – thanks to the special spy software.

In other words, the services will be able to even view conversations in messengers, which usually requires the consent of the manufacturer (for example Facebook) to provide so-called backdoor – a “rear door” that bypasses application security.

A pinch of controversy, however, adds to the case additional FinFispy software, which in addition to the correspondence in the messengers, can also turn on and off the microphone and camera remotely, or save phone calls and text messages made by a selected phone. However, what is even more controversial is the fact that FinFispy software is created by an external company – so the services do not even have to submit reports on its use.

THE SAFEST TELEPHONE OF THE WORLD – OR HOW TO DISAPPEAR COMPLETELY

You probably think that now the game is over, or more adequately the walls have ears – privacy is slowly a relic of the past, which will someday be present only in history textbooks. Not so fast. Speaking of history, it is worth mentioning Enigma. But wait … what does the most famous encryption machine of all time have to do with our privacy? Enigma encoded conversations that only the second Enigma could understand ‘ no other way could the secret conversation content be known.

On a similar principle – only of course using the latest security developments – works Enigma E2 designed by the British company Tripleton. This is the safest phone on the market, created largely for the special services, but it is also used by businessmen and bankers.

A unique key is generated for each call that authenticates the connection. However, if the phone is compromised – the SIM card is automatically destroyed.

How does modern Enigma work in practice? Let s imagine that we want to provide our colleagues with confidential information over the phone, add something important to our companys new strategy or conduct key negotiations. What is most important in such a conversation? That everything what happens in the company stays in the company. And such comfort is provided by Enigma E2, which encrypts not only GSM connections but also data transfer. The key I mentioned above, which encrypts the conversation is completely random and unique – interestingly, the entire key generation procedure takes only 7 seconds, so.

Are you interested in more details about the Enigma E2 superphone? Check it out here ‘ in our offer!

error: Content is protected !!