BlogHeaderFinal.jpg

SafeCase and Beyond; Safeguarding Smartphone Data

Posted by Matt Shaheen on Nov 27, 2018 4:49:30 AM

Last month, we released our second-generation product, the Privoro SafeCase, which is compatible with the iPhone 7 and 8. While SafeCase can be used by organizations for a variety of use cases, counter-surveillance protection is a core functionality. The case blocks the host smartphone’s cameras and actively masks each of the microphones with randomized noise. At Privoro, we believe that only physical, verifiable protections can overcome the threat of hijacked smartphone sensors targeting national security agencies, publicly traded companies and high-profile individuals.

Read More

Topics: Data in Vicinity, anti-surveillance, Mobile Security, SafeCase, Mobile Espionage

CES 2018, the Year Tech Monetized Our Voices.

Posted by Julie DexterBerg on Jan 15, 2018 8:08:00 AM

CES, that mind-boggling and exhausting annual tribute to tech innovations has changed. More than 25 years ago the event was dominated by the wireless players and Microsoft with a wink and a nod to Detroit. Over time the show has shifted from the pinnacle venue for tech companies to unveil their splashy new consumer products to the place to experience nascent technologies.

Read More

Topics: CES, Artificial Intelligence, Smartphone Security, Data in Vicinity

When Apps Become Peeping Toms

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Data Privacy, Mobile Tracking, Smartphone Vulnerabilities, Data in Vicinity

Who’s Listening to Your Conversation: Facebook? Google? Who else?

Posted by Blake Kotiza on Dec 18, 2017 10:00:00 AM

You either know somebody or it has happened to you – you have a conversation around your smartphone, check your social media or news feed, and boom, the topics of your conversation are being advertised on your smartphone. Most people’s reaction is usually some combination of “WTF?!?” and “Is my phone really listening in on me?” This isn’t new news, but mobile espionage (the modern catch phrase for smartphones listening, watching and tracking your every movement without you knowing) is certainly getting discussed a lot more, and on many levels.

Read More

Topics: Mobile Espionage, Mobile Surveillance, Mobile Tracking, Smartphone Vulnerabilities, Data in Vicinity

U.S. Goverment Officials Plea for Smartphone Security. Is it Enough?

Posted by Blake Kotiza on Nov 1, 2017 4:07:51 PM

You can now add Sen. Ron Wyden (D-Ore) to the growing list of government officials and entities urging national security advisors to provide a higher level of security for government smartphones.

Read More

Topics: Smartphone Hacking, Smartphone Vulnerabilities, Government Security, Data in Vicinity

"The Headlines About Smartphone Hacks Don’t Pertain to Me"

Posted by Nox R. Landa on Oct 19, 2017 7:00:00 AM

The topic of smartphone hacking isn’t likely to make it into Monday morning watercooler conversation. That is of course, unless you are a security professional and the very survival of your organization may hang on understanding it and protecting against it.

Read More

Topics: Smartphone Vulnerabilities, Smartphone Hacking, Data in Vicinity

Data in Vicinity: Data Collected in the Presence of an Electronic Device

Posted by Blake Kotiza on Oct 4, 2017 10:04:00 AM

In today’s digital-driven world, just about everything we do creates a data trail that can live forever. Clicking on a website, opening the garage door, adjusting the temperature in our houses, taking a rideshare to the airport, making a dinner reservation, scanning our boarding passes, “liking” a photo, recording a television show, sending a text to a client, making a request into a digital assistant … all create an unwitting data trail. That data is stored, analyzed, brokered, distributed, parsed, combined and attributed to individuals, companies and nation states.

Read More

Topics: Privoro, Data in Vicinity

Why Did We Start Privoro?

Posted by Mike Fong on Sep 16, 2017 12:00:00 AM

Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.

Read More

Topics: Mobile Security, Privoro, Data in Vicinity

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts