The Blackphone 2 uses a Qualcomm Snapdragon chip. The maintainers (Silent Circle) released a patch a week ago that 'updates to the latest Qualcomm config files' but it's unclear if that fixes this specific vulnerability.
Nope, it doesn't. Still one out of four isn't bad
To the casual (and admittedly distant) observer of Obama's Presidency it looks as if he has finally had to admit that he will be unable to change things as he initially wished and that ultimately he did not fully comprehend the 'complexities' of the office.
Cynics would say that he was naive in believing that he could effect any fundamental change in areas such as government transparency but we need more people that believe they can or we might as well all pack up and head for that island (away from potential cyclones of course...)
I don't think the question is stupid. Dismissing it out of hand seems more so.
1. Asking questions such as this, where we have limited information, often spawns interesting approaches to solving them
2. Any method for detecting 'unwanted visitors' may also be effective in detecting unintelligent (but still unwanted) visitors like significant lumps of fast moving rock which if unencumbered may cause an extinction event
3. It is an opportunity to involve people across national, political, tribal and ethnic divides in pursuit of something important to all of us.
(I'm sure there are many more advantages to at least contemplating what our civilisation could do in this 'hypothetical' situation but this lot should do for demonstrating that the question is at least worth asking...)
Corollary: Don't use MS Word.
I'm in the UK and used to use Zen as my ISP. I found their tech support very helpful in spotting dodgy activity emanating from my home network and advising me on ways to investigate and correct my problems. They did warn that I should take immediate action or they would have to consider suspending my connection. I found this a sensible, helpful and mature approach to the situation.
If done properly involvement of the ISP in identifying and helping resolve infected PCs should be welcomed I would have thought...
Of course they will, it'll be as fair and even handed as the extradition treaties.
When it comes to channels of communication, like Twitter, we get worried when a company takes it over because we worry that censorship or other pernicious activities may commence.
The fact remains that if/when this happens another channel of communication opens up. So why bother about the commercial greed of the less than ideological founders of the latest trendy comms vehicle ?
Base 8 is just like base 10, if you are missing two fingers. -- Tom Lehrer