精品国产_亚洲人成在线高清,国产精品成人久久久久,国语自产偷拍精品视频偷拍

立即打開
自殺開關:手機防盜終極大招?

自殺開關:手機防盜終極大招?

Jane Porter 2014年05月29日
一旦手機被盜,機主就可以遠程啟動手機中的自殺開關,小偷偷來的手機最終就會變成一塊毫無用處的板磚。但它真的能夠從源頭上阻止手機被盜嗎?

??? 純粹依靠軟件的技術手段必然有可以動手腳的空間,因而也必然會被聰明的小偷利用。基于硬件的加密技術提供商Wave Systems技術總監格雷格?卡茲米耶爾扎克說:“如果有人偷了一部手機,那就有辦法阻止它從外部接收自毀指令。”比如小偷只要把偷來的手機放在一個能阻絕無線信號的手機殼里,就能阻斷這部手機的所有電磁通訊。據卡茲米耶爾扎克表示,將被盜手機放在這種手機殼里,然后再進行各種阻斷接受自殺信號的操作,的確具有可能性。

????另一種手機防盜方案是用硬件、而不是使用軟件,讓手機變“板磚”,而且這種方法已經受到業界越來越多的認可。這種方案要求在手機內部植入一個硬件設備,它可以防止小偷繞過軟件程序竊取手機內部的加密數據。

????卡茲米耶爾扎克表示,硬件技術提供了一種更加安全的解決方案。但是現在就斷言應該使用哪種技術仍然是武斷的,它應該取決于小偷盜竊手機的動機。卡茲米耶爾扎克認為:“加裝解決方案之前,我們需要了解一下小偷盜竊手機的動機。你的手機里最有價值的究竟是硬件,還是儲存在手機里的數據?”

????基于軟件的技術可以防止手機被格式化或者重設為出廠設置,但它不能有效保護儲存在手機硬件里的加密數據。而基于硬件的技術雖然令小偷有可能重新激活手機用來轉賣,但是卻能保護原機主儲存在手機里的加密個人信息。對此,卡茲米耶爾扎克說:“隨著我們放進智能手機的東西越來越多,手機里儲存的數據往往比機器本身更有價值。”

????有些廠商已經針對這個問題推出了自己的防盜工具。比如蘋果就在2013年與iOS7一道推出了一款防盜軟件“激活鎖定”,上個月三星也推出了“重新激活鎖定”功能。這兩項功能都能讓消費者遠程鎖定被盜的手機,防止小偷抹除手機中的數據,重新激活設備,再轉賣給其他人。

????有些手機廠商還在最新款的手機中采取了硬件與軟件技術相結合的模式。比如三星在最新款的手機中整合了Knox技術,新款iPhone也內置了用來保護加密數據的專有硬件。不過硬件解決方案的缺點是沒辦法遠程“種”到老款手機里,不像軟件方案只需一次軟件升級就能解決這個問題。

????不管手機廠商使用的是軟件方案、硬件方案還是軟硬件相結合的防盜方案,目前他們仍有一個最大的挑戰沒有解決,那就是由誰來監管手機的“自殺”功能。比如說,如果有人想要合法地轉賣自己的手機,那么他應該如何把“自殺”功能安全地轉讓給新用戶?坎普說:“你怎樣證明這個讓手機‘自殺’的人不是小偷?因為只要有人知道你的密碼,他就可以讓你的手機‘自殺’。目前還沒有人搞清楚這個問題。”

????除了“自殺開關”之外,也有人嘗試了一些其它防盜方案,比如給被盜手機IMEI串號或驗證碼建立一個“黑名單”數據庫,再比如紐約參議員杰弗里?克雷恩的提案建議,出售一臺以上二手手機的人必須提供購買發票以避免黑市交易。但是CTIA在2012年提出的“黑名單”方案并沒有起到降低犯罪率的效果,而克萊恩的議案自從去年十月提出之后,至今仍卡在參議院委員會未能通過。

????參議員雷諾在一份聲明中稱:“隨著搶劫智能手機的案件達到有史以來的最高峰,既然就這個問題已有解決方案可用,那么加州就不能繼續坐視不理。”但是盡管已有備選的防盜方案可用,但它們是否能有效降低手機盜竊案,目前仍然有待觀察。(財富中文網)

????譯者:樸成奎

????Software-only based approaches have the potential to backfire. For one, they can be worked around by clever thieves. "If someone steals a phone, there are ways to block it from receiving communications that would kill a device," says Greg Kazmierczak, CTO of Wave Systems, a provider of hardware-based encryption technology. For instance, a thief could place the stolen phone in a signal-blocking phone case that would prevent all electromagnetic communications from reaching the device. According to Kazmierczak, it could be possible to put it into one of those cases and perform whatever you need to in order to stop the kill signal from coming in.

????Another alternative solution is to use hardware, rather than software to make stolen phones inoperable -- an approach that's becoming more widely recognized in the industry. This would involve embedding actual hardware into the phone that would prevent thieves from circumventing software technology to get access to data encrypted on the phone.

????Hardware technology offers a much more secure solution, says Kazmierczak. But the question of which technology to use is not arbitrary. It hinges on what drives thieves to steal phones in the first place. "We need to understand what the motivation is in the theft before instilling a solution," Kazmierczak says. "What's the most valuable component -- the hardware or the data you are storing in your device?"

????A software-based approach could protect a phone from getting wiped and reset to factory default, but it would not be as effective in protecting the user's data encrypted on hardware in the device. A hardware-based approach, on the other hand, might make it possible for thieves to reactivate the phone for resale, but would protect encrypted personal data about the original owner from getting stolen. "As we put more and more into these devices, the data is more valuable than the device itself," Kazmierczak says.

????Attempts to offer a solution to the problem are already in place by some providers. Anti-theft software like Apple's Activation Lock rolled out in 2013 as part of iOS 7 and last month Samsung released a "Reactivation Lock," both of which would allow consumers whose phones were stolen to lock them remotely and prevent thieves from wiping and reactivating their devices to be resold.

????And a few phone manufacturers are putting a hybrid of hardware and software technologies in place in their newest models. Samsung phones with Knox technology in them do this, as do newer iPhones that include proprietary hardware to protect encrypted data. The downside of such a hardware solution, of course, is that it can't be introduced remotely to older modeled phones in the same way a software update can be.

????Regardless of whether smartphone makers take a software, hardware, or combined approach to theft prevention, one of the biggest challenges they have yet to figure out is where the manpower to monitor and regulate a kill switch function will come from. When someone wants to resell a used phone legally, for example, how can they transfer kill switch capabilities to the new owner safely and securely? "How do you validate that it's the right person trying to kill the device? Someone could kill your phone if they know your password," Kemp says. "So far no one has figured that out yet."

????Other solutions beyond the kill switch have been attempted, including a database of blacklisted IMEIs or identification numbers for stolen phones, better policing and a proposed bill by New York senator Jeffrey D. Klein, that would require those people selling more than one used phone to provide receipts of purchase to prevent black-market business. But CTIA's blacklist, which was proposed in 2012 hasn't helped reduce crime numbers and Klein's bill has been stuck in a Senate Committee since it was proposed last October.

????"With robberies of smartphones reaching an all-time high, California cannot continue to stand by when a solution to the problem is readily available," said Senator Leno in a statement. But while solutions to the problem are available, how effective they'll be at actually curbing smartphone theft still remains to be seen.

  • 熱讀文章
  • 熱門視頻
活動
掃碼打開財富Plus App

            主站蜘蛛池模板: 文安县| 重庆市| 双峰县| 璧山县| 南康市| 高陵县| 上饶市| 五大连池市| 大化| 仁寿县| 凌海市| 贺兰县| 黄陵县| 泌阳县| 丰都县| 建湖县| 固安县| 普宁市| 敦煌市| 灌南县| 淅川县| 丘北县| 元朗区| 祥云县| 太仆寺旗| 阜南县| 淳安县| 巍山| 溆浦县| 淮滨县| 阿鲁科尔沁旗| 旺苍县| 易门县| 泾阳县| 沙田区| 昔阳县| 南澳县| 酒泉市| 鄢陵县| 二手房| 白朗县|