I am often asked about the potential for the apps on the Play store to be harmful, and therefore make using Android devices unsafe in an enterprise setting. And I think that in the early days of Android this a perceived risk that and was often true.However the Android team have been tackling this problem […]
May 14, 2013
Firstly, what are they ? Secure containers or Trusted Execution Environments are designed to allow you to have two separate work-spaces on your mobile phone, for example one for work and one for personal. Here is en earlier post that looked at how they work. What did I do ? I installed Divide to try one out, […]
December 15, 2012
In my previous post I talked about a scheme that I was involved in back in my Vodafone days (I forgot to say that Tim the Sim was the main man on it, in case you thought it was me) That was a scheme to use SMS to send a code to a previously registered […]
December 15, 2012
Back when I was an architect for Vodafone Group we worked on a system that would use the mobile to create a second factor for authenticating a login. In case your wondering what that means, it like this. when you give your username and password or your email and password you are providing a single […]
October 15, 2012
For a little while I have been engaged in conversations with projects here at work regarding how to authenticate a user on a PC and smartphone. The idea is to think beyond the simple pin/password, and more importantly to make it easier for people to remember. Seems to me there are 3 groups (plus the no-hopers !) […]
August 30, 2019
0