This is an abolutely necessary feature as now smartphones have all the identitiies of the user and almost all private data is in there and many apps take all the permissions to use them before installation. Although it may not be completely possible to block these apps asking for permission but snooping can be definitely blocked.
I'm also wondering if blocking snooping adds any complexity to the code and if so, what do you think it would be? What are the compromises developers of such phones have to make? Or is it just the consumer that may compromise to protect his or her data from non-governmental snooping? (Who knows if you can protect your data from government snoops.)
Agreed. It will be interesting to see how the company deals with the NSA or other government security agency and what guarantees of privacy it can make to the customer. The Blackphone may end up with an asterisk and fine print on its marketing claims.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.