Breaking News
Blog

10 Defenses Against Smartphone Theft

NO RATINGS
View Comments: Oldest First | Newest First | Threaded View
Sheetal.Pandey
User Rank
Manager
defense against smartphone theft
Sheetal.Pandey   12/2/2013 9:22:10 AM
NO RATINGS
That would be great if remotely whole data can be washed out from the smartphone in case of theft. But it would be quite challenging for engineers to do so. But if that happens it would be so much helpful the the consumers as almost all your personal information is in smartphone.

krisi
User Rank
CEO
Re: defense against smartphone theft
krisi   12/2/2013 1:40:04 PM
NO RATINGS
smart phone should be treated like a credit card (which is slowly becoming with all the apps payments)...registration, passwords, etc...people don't get harmed because of the credit cards they carry in their pockets

bart.plovie
User Rank
Freelancer
Re: defense against smartphone theft
bart.plovie   12/2/2013 2:08:46 PM
NO RATINGS
Ideally there'd be a secure way to actively destroy the hardware in the phone given you know the right key, but sadly there'll be abuse of such a system as well.

MeasurementBlues
User Rank
Blogger
Lojack
MeasurementBlues   12/2/2013 4:23:10 PM
NO RATINGS
Funny you should mention Lojack. I just had them remove the alarm from my 1999 Toyota.

Susan Rambo
User Rank
Blogger
Re: defense against smartphone theft
Susan Rambo   12/2/2013 4:31:41 PM
NO RATINGS
I like the idea of the cell phone self-distructing. "This cell phone will self-distruct in 10 minutes."

MS243
User Rank
Manager
Data and smartphones
MS243   12/2/2013 7:05:58 PM
NO RATINGS
--Just get a Nokia or Blackberry -- no one  wants them, and the HUB feature on the Blackberry Q and Z series can store all your information on the cloud so if you lose the phone there are no data loss issues(provided you set a strong password and deactivate it when lost)

ip2design
User Rank
Rookie
Re: defense against smartphone theft
ip2design   12/3/2013 9:43:00 AM
NO RATINGS
100% agree. It is no big deal to make smartphones really secure. The technology is already there with : high-end tamper-proof SIM card, embedded secure element (mostly used for NFC payment transaction) and ARM TrustZone. Technically speaking there is no barrier. The issue is around the business model.

 

August Cartoon Caption Winner!
August Cartoon Caption Winner!
"All the King's horses and all the KIng's men gave up on Humpty, so they handed the problem off to Engineering."
5 comments
Top Comments of the Week
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll
Radio
LATEST ARCHIVED BROADCAST
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.