We would like to invite you to continue a survey you have started. ...

Do you trust your insurer ?

Strongly agree
Strongly disagree
Insurance provides peace of mind
Insurance is purchased only when compulsory
Terms and Conditions (small print) are clear and easily accessible
Insurance jargon (language) stands in the way of fully understanding each policy
Insurance companies try their best to uphold the details of the policy without cutting corners
Reducing risk, cutting costs and profits are more important to an insurance company than the customer
Insurance companies in the region are as professional as in other more developed markets
Age group
Do you feel your insurance provider works in your interest?
Have you had a rejected claim that you feel was not justified?
Do you trust your insurance provider?
Our Network

Register for our free newsletter

Latest News

Blackberry security explained

Blackberry security explained

What kind of access do US authorities get to BlackBerry messages that Saudi, the UAE and India don’t? Is it even possible to monitor encrypted messages?


August 12, 2010 4:54 by

Research in Motion is at odds with the governments of India, Saudi Arabia and the UAE over their demands that the company let authorities tap BlackBerry messages delivered using RIM’s rock-solid encryption technology.
Here are questions and answers that explain how the BlackBerry system works and why governments consider it to be a potential threat to national security:

Q. How does BlackBerry’s legendary security system work?

A. RIM uses powerful codes to scramble, or encrypt, messages as they travel between a BlackBerry server and the BlackBerry device. If a worker loses their BlackBerry, RIM is able to remotely wipe all messages on the device and deactive it.

Q. Is BlackBerry’s security unique?

A. Yes. All BlackBerry traffic runs through RIM data centers, which help manage the devices. It also runs through BlackBerry servers, which encrypt and unscramble messages.
Those BlackBerry servers are owned and run by RIM’s business and government customers, according to David Goldschlag, chief technology officer of McAfee Mobile, a unit of McAfee Inc. (RIM handles encryption and decryption for smaller businesses and consumers, according to Goldschlag.)
Rivals, including Apple Inc, Google Inc, Nokia and Microsoft Corp, design their products so they communicate directly with ordinary email servers.

Q. Can RIM unscramble the data?

A. RIM says it cannot unscramble data of its large business and government clients because the servers that handle that task are located on the premises of its customers.

Pages: 1 2


Tags: , , , , , , , , , , ,

Leave a Comment