DarkMatter says its Katim phone is secure enough for heads of state, corporations
Ensuring Mobile cybersecurity is no easy task. Protecting against sophisticated hackers, unsophisticated hackers, corporate espionage, organized crime, and state-sponsored attacks is a full-time job. And that’s not to mention the hundreds of cybersecurity threats smartphone users encounter every day. One in five Android users experienced a mobile threat in 2014, according to Kaspersky, and there was a 262 percent increase in the number of iOS vulnerabilities in 2015 compared to 2011. Those who store sensitive information on their smartphone run the risk of data theft … and sometimes worse.
But mobile security firm DarkMatter says it has developed a solution. It’s called Katim, which means “silence” in Arabic, and it’s an end-to-end security platform with ultra-secure encryption, two-factor authentication, and more than half a dozen other security measures designed to deter even the most determined hackers.
“Data is today’s currency,” DarkMatter CEO Faisal Al Bannai said during a press event at Mobile World Congress. “There’s so much that can be accessed through your phone, and data is a treasure mine. Simply by connecting to public Wi-Fi or enabling location tracking on your phone can make you vulnerable.”
The Katim platform is compatible with almost any smartphone running Google’s Android operating system, and DarkMatter has developed its own phone, also called the Katim.
The Katim’s OS-level software comprises a bootloader — the program that loads the phone’s operating system — secured against unauthorized modifications, and a security framework that authenticates every app installed when the phone boots up. It packs secure boot and an encrypted bootloader, as well as two-factor authentication that uses biometric sensors like a fingerprint sensor to ensure the users say who they are. There’s also a hardware switch on the handset’s upper-left-hand side that disables the phone’s cameras and microphones, preventing hackers from gaining access to either.
Comments
Post a Comment