The Misused Term: “Encrypted Phone”
In recent years, the term “encrypted phone” has gained popularity in the media. However, from a technical standpoint, it is often used incorrectly. Nowadays, 100% of smartphones on the market, regardless of whether they run iOS or Android, have their data protected through encryption. Likewise, most modern communication apps integrate encryption algorithms to safeguard messages. Therefore, when we refer to “encrypted phones,” we’re really talking about every phone available today—whether it’s your neighbor’s phone, your father-in-law’s, your partner’s, or your own.
So what are the media really talking about when they refer to “encrypted phones”?
The term actually refers to a specialized category of phones used by CEOs, corporate leaders, security professionals, and, in some cases, criminals who need to secure their communications. These individuals have specific privacy concerns that go beyond the standard encryption found in every smartphone. They require a level of protection that ensures their messages, calls, and sensitive data remain secure and inaccessible to prying eyes.
The Difference Between Standard and Secure Phones
From the outside, these so-called “encrypted phones” often look like any other smartphone on the market. The real difference lies in the software, the operating system, and the way these devices handle permissions, access control, and protection against attack vectors. In other words, it’s the security architecture that sets them apart.
These phones typically run highly customized operating systems that block or limit access to potential attack vectors, such as exploits targeting the operating system, apps, or network vulnerabilities. Additionally, the apps they use may be the same secure apps available to the public, often open-source, but they’re sometimes modified or enhanced for even greater privacy.
Apps like Signal, Threema, and Briar are commonly used on these secure phones. These applications often avoid using traditional identifiers like phone numbers, further protecting user anonymity. In a future article, we’ll delve deeper into these apps and provide a comprehensive list of secure apps that enhance user privacy and security.
The Role of MDM in Secure Phones
Another layer of protection in secure phones comes from Mobile Device Management (MDM) systems. MDM is often used in corporate environments to control and limit access to specific phone features, adding a layer of security to standard devices. However, it’s important to note that while MDM provides enhanced control, it also introduces a potential attack vector. A sophisticated attacker could target the MDM infrastructure to gain access to the device itself.
Why “Encrypted Phone” Isn’t the Right Term
The media often misuses the term “encrypted phone” when what they really mean is “secure phone” or “hardened phone”. If we’re being accurate, every phone on the market today is encrypted, thanks to standard encryption practices. However, truly secure phones—those used by high-profile individuals or those dealing with sensitive information—go beyond basic encryption. These phones incorporate hardened operating systems, strict permission management, secure communication apps, and in some cases, corporate-level security measures like MDM.
If you’re concerned about privacy and security, it’s important to understand that not all encrypted phones are equally secure. The term “encrypted phone” should refer to a device that goes above and beyond, offering a comprehensive security framework that includes encrypted communications, hardened software, and secure messaging apps that do not rely on typical identifiers like phone numbers.
Conclusion: Secure Phones vs. Encrypted Phones
While the term “encrypted phone” may sound impressive, it’s a broad and often misleading label. Every phone is encrypted to some degree, but true secure phones offer layers of protection that far exceed what’s available on the average smartphone. When looking for a secure phone, focus on devices that offer hardened security features, avoid centralized attack vectors, and prioritize user privacy through solutions like open-source messaging apps and custom operating systems. This is what separates a truly secure phone from the standard encrypted phone your neighbor might use.