On the surface, the phone looks like your standard 5.5-inch screened smartphone—the same size as the iPhone 6 Plus. The original Blackphone had an odd rounded back cover and “Blackphone” embossed into its plastic, and the Blackphone 2 is almost anonymous by comparison. The Silent Circle and Blackphone logos are subtly printed on its back and easily covered by a case for those who prefer not to drop a phone that screams, “I am carrying a secure phone!” into a security checkpoint x-ray machine basket.
[…] it might not have a stylus, the fastest processor, or the most powerful graphics engine, but it will serviceably perform as a smartphone while not giving you up to surveillance. The Blackphone 2 is the phone your chief information security officer will want your CEO to carry.
- Onion Pi: Use a Raspberry Pi as a Tor proxy — a fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi.
- Glenn Greenwald: Why privacy matters — the case for why you need to care about privacy, even if you’re “not doing anything you need to hide.”
- ‘1984’ stealth fashion for the under-surveillance society — “Every piece in the ‘1984’ collection is built around a removable stealth pocket made from police-grade shielding fabrics that securely block all Cell, WiFi, GPS and RFID signals to ~100 dB.”