Be Aware

"The Headlines About Smartphone Hacks Don’t Pertain to Me"

Posted by Nox R. Landa on Oct 19, 2017 7:00:00 AM

The topic of smartphone hacking isn’t likely to make it into Monday morning watercooler conversation. That is of course, unless you are a security professional and the very survival of your organization may hang on understanding it and protecting against it.

Read More

Topics: Proximity Data, Smartphone Hacking, Smartphone Vulnerabilities

Proximity Data: Data collected in the presence of an electronic device

Posted by Blake Kotiza on Oct 4, 2017 10:04:00 AM

In today’s digital-driven world, just about everything we do creates a data trail that can live forever. Clicking on a website, opening the garage door, adjusting the temperature in our houses, taking a rideshare to the airport, making a dinner reservation, scanning our boarding passes, “liking” a photo, recording a television show, sending a text to a client, making a request into a digital assistant … all create an unwitting data trail. That data is stored, analyzed, brokered, distributed, parsed, combined and attributed to individuals, companies and nation states.

Read More

Topics: Proximity Data, Privoro

Mobile Tracking: "I've Got Nothing To Hide"

Posted by Nik Souris on Oct 2, 2017 9:00:00 AM

We hear this when we discuss the breaches to smartphones with people who are often not government intelligence or security professionals – users who are all too aware of these mobile security concerns. Breaches that are executed by competitors, governments and malicious actors of all types like those mobile surveillance attempts on a human rights activist being or a Mexican journalist. When we elaborate on how everyday apps over-reach their intended purpose to pry into the personal lives of users with mobile tracking to listen in on conversations or to track user location data; people say they have nothing to hide. To help shed some light on smartphone vulnerabilities, your phone privacy and what’s really at risk when your phone has been compromised, we set out to hack a smartphone and reveal the information that may be accessed through its sensors.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking

Why did we start Privoro?

Posted by Mike Fong on Sep 16, 2017 12:00:00 AM

Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.

Read More

Topics: Proximity Data, Mobile Security, Privoro

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts