Boeing Black smartphone, How It Works

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,490
Visit Boeing: Boeing Black Smartphone

How It Works: The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

Download PDF: http://www.boeing.com/assets/pdf/defense-space/ic/black/boeing_black_smartphone_product_card.pdf


Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone has a dual-SIM card that “enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks,” according to the product data sheet.

That’s not to say that everyone in the military can expect to receive one. “The Boeing Black is the device we’re currently working with,” Lynn said. “We’re just now in the test phase,” he said.

Lynn said the Boeing Black phone also works with “a large amount of encryption.” But the encryption alone is not what makes the device so secure. “There’s nothing that lives on the devices,” said Lynn. “It’s close to a VDI,” a virtual desktop infrastructure.

What that means is that the most secure phone in the world is, in the purest sense, just a window to another computer, a remote server on the military’s Top Secret JWICS network. That server does all the real work and holds the data. The phone itself just moves input commands — keyboard, mouse, and other signals — to that server. The result, said Lynn: “We’re not too worried about losing data,” at least not off the phone.
 

christian dougen

Level 1
Verified
Jul 8, 2016
30
Why boeing tries to create this phone ,Even good encription ,all phones with it can be decripted . I didnt understand the reason ,Who will be customer for it ?
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top