Personal digital assistants and smartphones produced by Research in Motion (RIM) starting in 1999.
Questions tagged [blackberry]
22 questions
34
votes
4 answers
Deleting a Java Object securely
I know that in order to delete a Java object I should use character array instead of String, since I can safely erase (rewrite the character array with other data) its content. This seems not to be feasible for the String objects.
Now on BlackBerry…
smiley
- 1,214
- 2
- 13
- 21
16
votes
1 answer
What did Blackberry do wrong?
The NIST defines a vulnerability in RIM Blackberry encryption discovered last October.
Apparently, Blackberry's flavour of PBKDF2 was weak. They say:
The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses…
Thaddee Tyl
- 273
- 1
- 5
12
votes
4 answers
What security settings are likely used in Obama's Blackberry?
It's widely publicised that Obama has a blackberry, but it isn't clear to me what security settings are employed by the NSA or what private businesses can learn from his configuration?
What is known, or what can you infer about a secure Blackberry…
makerofthings7
- 50,090
- 54
- 250
- 536
12
votes
1 answer
Is there cryptographic material in a phone's SIM card that can be used with RSA encryption?
Given that a smart card stores a private key that can't be extracted, it appears that a SIM card is similar to a smart card in these respects.
I need to store (or use an existing) private key on a phone and use that to decrypt data sent from a…
makerofthings7
- 50,090
- 54
- 250
- 536
10
votes
1 answer
How to properly delete all data from cell phones?
Lately I've been thinking to get rid of some old smartphones; among them an Android device and a Blackberry. Not selling or recycling them is the ideal solution, however, I still would like to know how can I minimize the possibility of recovering…
Kayla
- 203
- 2
- 6
8
votes
3 answers
What makes the Blackberry device and network more secure?
One of Blackberry's strongest assets is the "network" that it uses. Can someone explain, or link to technical information that covers what this secure network is, and what it does better than the rest?
makerofthings7
- 50,090
- 54
- 250
- 536
8
votes
3 answers
BlackBerry handheld penetration testing
Are there any relevant resources, tools or documents about penetration testing of BlackBerry handhelds?
lisa17
- 1,958
- 7
- 21
- 43
6
votes
3 answers
Why would configuring a Blackberry to turn radio off when charging help with security?
A friend's work Blackberry is configured so that phone and Internet access are disabled while the device is charging. I assumed this was a fault, but apparently it's a deliberate security policy.
Has anyone encountered this kind of policy before?…
D. Evans
- 163
- 3
4
votes
4 answers
Are kiosk-style, full screen apps possible on iOS, Android, or Windows phone?
A popular car insurance company in the US has an app that displays "digital car insurance" papers. In the commercials, these apps are opened, and the user gives the unlocked phone to police officers. It's not unreasonable to imagine what could…
makerofthings7
- 50,090
- 54
- 250
- 536
3
votes
1 answer
How do you erase a Blackberry without having direct access to the server?
I have a Blackberry with no access to the BIS or BES server that managed it.
How does one erase and reset the device to defaults?
makerofthings7
- 50,090
- 54
- 250
- 536
3
votes
2 answers
What's the point of buying a Blackberry that runs the Android OS?
Recently, Blackberry began selling smartphones that run the Android OS. If the Android OS has so many security issues out-of-the box, then why bother paying extra for it?
Blackberry claims that the phones have a "hardened" version of the Android OS.…
asdfdsa
- 41
- 2
2
votes
1 answer
How does a BlackBerry handheld connect to BES?
How does a Blackberry device connect to BlackBerry Enterprise Server (BES) for the first time? What are the security mechanisms used to protect against a rogue BlackBerry handheld trying to connect to BES?
lisa17
- 1,958
- 7
- 21
- 43
2
votes
1 answer
Secure implementations of G2/G3/G4 cellular technology
It appears that GSM is like any other technology, and is only as secure as its implementation.
What implementations are known to be secure or insecure due to a fault on the implementor's side, or due to the Moore's law and the ability to easily…
makerofthings7
- 50,090
- 54
- 250
- 536
2
votes
2 answers
What is the correct way to assess and compare Certicom's products to the alternatives?
I'm investigating Certicom's API because they are "free" with the Blackberry implementations, and have come to realize that I have several alternatives for implementing crypto such as BouncyCastle, and others.
I like the idea of using the same API…
makerofthings7
- 50,090
- 54
- 250
- 536
2
votes
1 answer
Possible to use "Blackberry Protect" in conjunction with a BES IT Policy?
Is it possible to use Blackberry Protect in conjunction with a BES IT policy? If so, what settings are incompatible?
So far I discovered that Memory encryption appears to be incompatible, but I'd like to see if anyone has more complete information…
makerofthings7
- 50,090
- 54
- 250
- 536