05.01.2014 Views

Blackberry Proof-of-Concept: Malicious Applications - Hacker Halted

Blackberry Proof-of-Concept: Malicious Applications - Hacker Halted

Blackberry Proof-of-Concept: Malicious Applications - Hacker Halted

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Uniqueness <strong>of</strong> BlackBerry Security<br />

RIM provides a device, a network<br />

and a service all bundled together.<br />

Provides an overlay access network,<br />

called BIS (<strong>Blackberry</strong> Internet<br />

Service)<br />

RIM network access as a gateway to<br />

the internet.<br />

All the information transferred over<br />

RIM servers is encrypted with<br />

proprietary encryption.<br />

Mobile operators cannot inspect the<br />

traffic between BlackBerry and RIM<br />

servers.<br />

16 Copyright © 2010 Juniper Networks, Inc. www.juniper.net

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!