What I found particularly troubling was "penetrating the security of BlackBerry phones". Not to sound naive, but I thought this was not possible without the tacit collusion of BlackBerry themselves. If government security agencies can do this to BlackBerrys, imagine how easy it must be with iPhones and Android devices?
Make a difference if one party was not using BES? Blackberry caveats their response by saying BES is secure. No mention of BIS. No mention of penetration from the non-Blackberry end. Maybe I'm giving governments too much credit. But I'm under the impression that the only thing not possible is the "near real time" statement.
Make a difference if one party was not using BES? Blackberry caveats their response by saying BES is secure. No mention of BIS. No mention of penetration from the non-Blackberry end. Maybe I'm giving governments too much credit. But I'm under the impression that the only thing not possible is the "near real time" statement.
I guess my knowledge is out of date. Memory says that BES had some security capability that was superior to BIS. But, to take advantage of it all data had to go through the BES server.
I guess my knowledge is out of date. Memory says that BES had some security capability that was superior to BIS. But, to take advantage of it all data had to go through the BES server.