View Single Post
Posts: 196 | Thanked: 224 times | Joined on Sep 2010 @ Africa
#6806
Originally Posted by momcilo View Post
N9 is not targeting governments and corporations.
They are targeting people obsessed with having shiny new iPhone that can be paraded in front of family, friends, co-workers...
And these people are to be enticed by low up-front costs (e.g. 'Look, my new iPhone 4 only costs $100'), and the operator's subsidy of the device has to be recovered by usage and apps and content the user buys.

In this case, the user is not (yet) the owner, the operator is.

The IT departments need secure storage for certificates and corresponding private keys. AEGIS combined with NFC (for external contact-less smart cards), might be a very attractive solution for the IT. It would allow them to enable secure mobile services such as S/MIME, secure voice communication, client based TLS authentication, VPN, filesystem encryption...
Exactly. It would be really nice if aegis could for example allow a device to operate in two different modes, possibly protected by different passwords/pins/hardware tokens, so I could have personal content (social networking accounts, personal email account, photos, videos etc.) on my device, and work content (work email account, calendar, credentials e.g. VPN, documents, presentations etc.), and they would be kept separate. So for example if it is my own device, and I change jobs, the company could wipe the company content, but not my personal content.

Instead Nokia considers NFC as mean to perform some trivial things like device pairing.

At the moment it looks like blackberries and androids are the only able to provide such features.
Yes, this is the depressing part. Security *can* be a beneficial feature to the owner (and the user too, e.g. the company may decide to fund better devices, and the users benefit from them) to have a comprehensive security system (including one that prevents the physically present user from certain actions).

However, there must be a means for the device owner to bypass/disable the security (and, ideally, restore it or access to the protected content as well).
 

The Following 3 Users Say Thank You to buchanmilne For This Useful Post: