It doesn't seem like separate restricted users for different phone
system parts would be that helpful. The code still needs to be
secure. Say for example gsm gets compromised, then even with separate
users they still have full gsm access and can make phone calls. The
only advantage to isolating
Of course, F-Secure sell mobile anti-virus software, and he could have
easily avoided infection by employing a more sensible use of
Bluetooth, so I always take these sorts of comments with a pinch of
salt. Having said that, the F-Secure blog is pretty good, and probably
essential reading for anyone
Regarding security and mobile phones..
I recently read an interesting interview with Mikko Hypponen, chief
research officer of F-Secure in IIEE Security and Privacy (Nov/Dec 07).
He touched on the topic of security and mobile phones, even mentioned
that he has received four worms on his mobile ph
Hi Brandon,
(I encourage everyone to use meaningful subject lines)
I suspect the real reason was that it was the easiest and quickest thing
to do at the time, and allowed the developers to focus on more pressing
issues, like getting the rest of the system working.
I'm sure this will change i
4 matches
Mail list logo