The thing is if somebody sends you a message from a non-secure phone then the Sim card of the government in the country they are sending it from does have a copy of what was sent and received so one secure phone is no good unless the other phone it is communicating with is also secure. Means you can't call anybody with it or message anybody with it except another agent or person, with exactly the same phone
5:20 - "super secure phone for politicians.. easy to combine professional life and private life" wow BIttium dude says this? NEVER use your professional device for private purposes. Do not mix those things together unless you are completely clueless as to security! A device is only as safe as the behavior of its user. Plus it doesn't matter how secure a device is, once you send something, it has to pass through public land lines or satellite radio waves, can be intercepted and encrypted. It is great however that Bittium has its own back end boot OS, to deactivate all google android services.. but, somehow, i think there is no such thing as a secure phone. If it is on the internet, it is accessible. If you can decrypt or access the data.
High tech seems like the wrong direction to go for high security. A very exclusive product with a very exclusive clientele makes it more of a target. I'd rather use a ten dollar burner phone from Walmart, purchased in cash. And you can toss 180 burners for the price of one Bittium.
Pretty soon you won’t be able to use cash to buy those burners. Just imagine when the fed comes out with CBDCs and can control/trace everything you can and can’t buy
Nah man, I make devices you can use no problems for atleast 6 months, so much more handy. Even if it is obtained and someone is trying to crack into it, anti-encryption software would take 12,000years (with today fastest quantam supercomputer) to crack, and the while the software is amazing, the hardware is even better. 5 layers of tamper-proof protection. Nowadays burners are good but there not needed when you can hide your location, microphone, camera, actual GPS, dodged triangulation, use multiple other security measures to hide your location and even your personality. My devices will last a businessman, councilman, politician, sex workers, etc for years and they have no problems, because the security is always top notch and updated way ahead of the curve, but some lines of work require a 6 month better safe then sorry protocol. And the best part is, its a smartphone so you can do your business much more efficiently and send encrypted pics and receive them, saving lots of time
I just do what snowden does and remove the microphone and the camera Physically from the device,, and block outgoing traffic to any IP addresses I wish to forbid. I also write messages in mixed languages using pig Latin backwards
Got to admit the phone looks good and as alot of security features. But if it as Google on it then all the security becomes obsolete. Any Google services and Facebook, Twitter, WhatsApp, snap chat, ect ect once used on this phone will just compromise it, you will be basically just opening the phone up to millions of marketing organisations that will share the contents of your phone. You have to remember that with all Social media you have to except there terms that they have access to your phones content to be able to use them, and this phone will not stop that once you give them permissions. The key to using this phone and its security also depends on your responsibility to keep it safe.
There is a version without google mobile services and a dual boot version. Also the Bittium Secure Suite backend software can limit the phone to whitelisted apps only.
Update: Conversation continues there www.reddit.com/r/privacytoolsIO/comments/htfb3x/a_message_to_privacy_phone_makers_the_case_of_the/ I have sent the questions below to the company 6 months ago through 2 official channels. They did not even bother to answer. Before buying, I'd recommend to go through that. Then one can say that they are selling a secure phone or not. 1/ Can the phone be shipped free of proprietary Google Apps? Most people who want a secure phone don't want spyware with admin rights loaded on their phone. 2/ There are cases where the phone will erase itself. Is there an integrated backup software to do external (non cloud) backup of the configuration and apps? 3/ Is it possible to have the phone ringing in privacy mode? 4/ Is the software open source? How can your customers audit the code? 5/ Do you have reproducible builds for your source code? 6/ How easy is it to execute AT commands on your device? 7/ How well do you isolate the modem chip from memory? Do you have access to its source code or do you use proprietary blobs? Basically are you better than Librem 5 or PinePhone on that? 8/ What do you do to mitigate Simjacker attacks? This is one possible vector for AT commands. 9/ Do you have real hardware kill-switch? for: - microphone (privacy mode but is it hardware?) - mobile network - wifi 10/ Is your encryption similar/better than the Google Pixel 3? 11/ Is your bootchain security similar/better than the Google Pixel 3? 12/ What does "Always-on security monitoring non-dependent on battery level" mean in practice? 13/ Is the software in use for "Bittium Secure suite" installed by default if "Bittium Secure suite" is not in use by the customer? 14/ Why does the "Multicontainer feature" require the "Bittium Secure suite" cloud platform? 15/ Does "iZat positioning framework" send data such as nearby Wifi SSID/MAC addresses to a remote server? Is it possible to disable it? 16/ Is it possible to replace Google's Wifi positioning software (Wifi SSID/MAC to coordinates) by Mozilla's or DéjàVu? 17/ Now regarding manufacturing. how do you make sure that no slavery/war is involved in your supply chain for raw material? 18/ How sustainable is your supply chain? Of course every phone needs rare metal extraction so it will never have a neutral impact. 19/ In your manual, you have: "Any modification to this product is prohibited and will invalidate the warranty. Opening the device and using the components for purposes not otherwise authorized by this document, including any use in airplanes or any other Aviation application, is prohibited and will invalidate the warranty. Allow only authorized personnel to service the device and its accessories. Unauthorized service will invalidate the warranty " What does it mean regaring airplanes? Should it be switched off when flying? 20/ Do you have a refund policy if the customer is not satisfied with the product? 21/ Is there a way to prevent choosen apps from accessing the Internet? 22/ Is there mac address randomization on the go to prevent tracking in places like shopping malls and JCDecaux advertising spots?
The phone starts at 1550Eur, but degoogled version is 1650Eur. Yes, you need to pay to remove google. This phone didn't even has button for phisically shutting off power to celurar modem. It is a security hazard. Look up what Stingray is. Also watch Edward Showden interviews, he explains it better. If you need phisical hardware killswitches, buy Librem 5. It has 3 phisical killswitches for camera/mic, wifi, and celurar. It is also the first and only phone with pgp card slot. And it is a lot cheaper. It also has USA made model, which is closer to this phone cost. This bittium phone runs Android and it is open source, the drivers and other SoC specific software is not. How do you know that there are no backdoors? Librem 5 runs GNU/Linux and is 100% open source, including drivers. Good luck hiding backdoors there.
I'm just learning that secure phones existed, and I was curious why you said that this phone was a 'nice trick to fool criminals.' Do these type phones not really provide the security and privacy they claim? I'm not a CEO trying to keep company secrets secure. I'm just looking for a phone that doesn't steal my data and sell it for profit or use it to try influence me or others in some way. Thank you ahead of time for your response if you provide one. I'd would definitely appreciate it so I don't waste time researching something that isn't going to do what I would like it to, as I firmly believe that time is the most valuable we have since we can't get more when it's gone.
@@extremejustin4611look up “arcane OS”. In brief it was a “secure” OS on a pixel phone that ended up being a HUGE honeypot scheme by the FBI and loads of criminals were busted man. Definitely a good watch or read on that if you look it up.
Privacy button , that switches microphones off by hardware only ,that can not be disabled or bypassed is highly important. It can be learned from Computing defense strategies : en.wikipedia.org/wiki/Defense_strategy_(computing)
These secure smartphones are sold via an official distributor. Depending on where you live the price might change. I am not sure if they sell to individuals.
@@sensesound1359 Bittium sells 3 versions of the Tough Mobile 2. Google-android, non-google android and dual boot with both. The google-android is not secure. The non-google android can be depending on the quality of the implementation.
Great review! With other secure phones using 8 series Qualcomm chips, I’m wondering if Bittium will be upgrading their Tough Mobile 2 670 chip anytime soon?
So why didn't you mention the OS? Android? Unless the OS is Linux, forget it. If the apps and OS are tracking you, that's not secure. Another thing is the IMU. If the switch turns off the speaker and camera, that's good, but the IMU can figure out where you are. And what apps are on it? Any Google apps? If so, forget it.
We’re on this earth a very short time. If you are of the mentality that nothing comes after death, then it’s easy to see why death is such a scary thought. We are not designed to live forever. We’re here to do what we are meant to do then move on. We are always afraid of the unknown. Through knowledge and understanding, and faith, we can eliminate this fear.
Add to that, that TRUTH eliminates fear. This world, this life we live in this Beast system is a lie. The Beast system must be destroyed utterly. Man alone can do nothing about that but a man who loves the One True God, the Lord, the God of Abraham, Isaac and Jacob, Jesus Christ can destroy the whole thing. First he destroys the grip it has in himself then outside through the ultimate power of God now living within. The Beast watches you without technology so you are not secure regardless of phone.
Their day job is making communications equipment for the finnish defence forces. They are in the middle of delivering 207 million euros worth of Tough SDR field radios right now. The Tough Mobile 2 is rated for security level "confidential" by the finnish government. Who do you think their target audience is?
13:30 "existing secure phones for politicians only have work data and they have a separate phone in the other pocket for private (wow! so their private phone is listening in on them,as they chat on their private professional one?)., Second time in one video i hear the company men talk showing NULL understanding of security vulnerabilities! - If a private phone like android is in your pocket when you are talking on a secure government touchphone, then someone is listening, even if only google deep mind. Any high level state secret carrying official should NEVER have their private insecure phone on their person when using a secure phone, as the insecure one could be hacked, and using the camera and/or microphone and location services, to listen in and monitor.. derrrrr. what idiots with no social engineering knowledge trying to make a secure phone and market it with bullshit.
If you can give me 10.000.000$ guarantee that if free using that phone get me in prison...you give that money to my wife!?! Then I will buy 1.000 phones.
Joke of a device, its not even running Linux is it? That is such a privacy advantage! I can bet that I can secure my galaxy phone better than this device lol my otter box case will protect it from viruses better than this phone lol. A FOR WFFORT THO GOOD JOB AND THANK YOU! F for the phone designers. Poor presentation.
The thing is if somebody sends you a message from a non-secure phone then the Sim card of the government in the country they are sending it from does have a copy of what was sent and received so one secure phone is no good unless the other phone it is communicating with is also secure. Means you can't call anybody with it or message anybody with it except another agent or person, with exactly the same phone
Thank god that people are still creating things like this
5:20 - "super secure phone for politicians.. easy to combine professional life and private life" wow BIttium dude says this? NEVER use your professional device for private purposes. Do not mix those things together unless you are completely clueless as to security! A device is only as safe as the behavior of its user. Plus it doesn't matter how secure a device is, once you send something, it has to pass through public land lines or satellite radio waves, can be intercepted and encrypted. It is great however that Bittium has its own back end boot OS, to deactivate all google android services.. but, somehow, i think there is no such thing as a secure phone. If it is on the internet, it is accessible. If you can decrypt or access the data.
High tech seems like the wrong direction to go for high security. A very exclusive product with a very exclusive clientele makes it more of a target. I'd rather use a ten dollar burner phone from Walmart, purchased in cash. And you can toss 180 burners for the price of one Bittium.
Pretty soon you won’t be able to use cash to buy those burners.
Just imagine when the fed comes out with CBDCs and can control/trace everything you can and can’t buy
Nah man, I make devices you can use no problems for atleast 6 months, so much more handy. Even if it is obtained and someone is trying to crack into it, anti-encryption software would take 12,000years (with today fastest quantam supercomputer) to crack, and the while the software is amazing, the hardware is even better. 5 layers of tamper-proof protection. Nowadays burners are good but there not needed when you can hide your location, microphone, camera, actual GPS, dodged triangulation, use multiple other security measures to hide your location and even your personality. My devices will last a businessman, councilman, politician, sex workers, etc for years and they have no problems, because the security is always top notch and updated way ahead of the curve, but some lines of work require a 6 month better safe then sorry protocol. And the best part is, its a smartphone so you can do your business much more efficiently and send encrypted pics and receive them, saving lots of time
@@hunden8404 It’s getting closer and closer but they can’t see I guess…
pure analog; write a paper letter, use ham radio... use morse code.. they forgot these methods now. if it is online, it can be compromised
Very cool tour, thx for making and sharing this vid!👍👏This looks so far to be probably the most secured phone on the market.
Can this devise be use here in the US ? . And what service providers can you use ?
Anyone else die when he took the phones and dipped off on him
So... when it is not in privacy mode, it is spying on you?
😂
Didn't know a mobile phone like this actually existed. Interesting video. 🙂
I just do what snowden does and remove the microphone and the camera Physically from the device,, and block outgoing traffic to any IP addresses I wish to forbid. I also write messages in mixed languages using pig Latin backwards
@@AjarnSpencer wtf are u a drug dealer
@@AjarnSpencer how do you block outgoing traffic?
Got to admit the phone looks good and as alot of security features.
But if it as Google on it then all the security becomes obsolete.
Any Google services and Facebook, Twitter, WhatsApp, snap chat, ect ect once used on this phone will just compromise it, you will be basically just opening the phone up to millions of marketing organisations that will share the contents of your phone.
You have to remember that with all Social media you have to except there terms that they have access to your phones content to be able to use them, and this phone will not stop that once you give them permissions.
The key to using this phone and its security also depends on your responsibility to keep it safe.
There is a version without google mobile services and a dual boot version. Also the Bittium Secure Suite backend software can limit the phone to whitelisted apps only.
@@blegi1245 good to know ty
@@blegi1245 Hey can you educate me more on this thing.
@@michaeljordan2618 what do you want to know?
@@blegi1245 does the secure suite operate similarly to Google where you can download various apps and use it as a regular phone?
Update: Conversation continues there www.reddit.com/r/privacytoolsIO/comments/htfb3x/a_message_to_privacy_phone_makers_the_case_of_the/
I have sent the questions below to the company 6 months ago through 2 official channels. They did not even bother to answer.
Before buying, I'd recommend to go through that. Then one can say that they are selling a secure phone or not.
1/ Can the phone be shipped free of proprietary Google Apps? Most people who want a secure phone don't want spyware with admin rights loaded on their phone.
2/ There are cases where the phone will erase itself. Is there an integrated backup software to do external (non cloud) backup of the configuration and apps?
3/ Is it possible to have the phone ringing in privacy mode?
4/ Is the software open source? How can your customers audit the code?
5/ Do you have reproducible builds for your source code?
6/ How easy is it to execute AT commands on your device?
7/ How well do you isolate the modem chip from memory? Do you have access to its source code or do you use proprietary blobs? Basically are you better than Librem 5 or PinePhone on that?
8/ What do you do to mitigate Simjacker attacks? This is one possible vector for AT commands.
9/ Do you have real hardware kill-switch? for:
- microphone (privacy mode but is it hardware?)
- mobile network
- wifi
10/ Is your encryption similar/better than the Google Pixel 3?
11/ Is your bootchain security similar/better than the Google Pixel 3?
12/ What does "Always-on security monitoring non-dependent on battery level" mean in practice?
13/ Is the software in use for "Bittium Secure suite" installed by default if "Bittium Secure suite" is not in use by the customer?
14/ Why does the "Multicontainer feature" require the "Bittium Secure suite" cloud platform?
15/ Does "iZat positioning framework" send data such as nearby Wifi SSID/MAC addresses to a remote server? Is it possible to disable it?
16/ Is it possible to replace Google's Wifi positioning software (Wifi SSID/MAC to coordinates) by Mozilla's or DéjàVu?
17/ Now regarding manufacturing. how do you make sure that no slavery/war is involved in your supply chain for raw material?
18/ How sustainable is your supply chain? Of course every phone needs rare metal extraction so it will never have a neutral impact.
19/ In your manual, you have:
"Any modification to this product is prohibited and will invalidate the warranty. Opening the device and using the components for purposes not otherwise authorized by this document, including any use in airplanes or any other Aviation application, is prohibited and will invalidate the warranty. Allow only authorized personnel to service the device and its accessories. Unauthorized service will invalidate the warranty "
What does it mean regaring airplanes? Should it be switched off when flying?
20/ Do you have a refund policy if the customer is not satisfied with the product?
21/ Is there a way to prevent choosen apps from accessing the Internet?
22/ Is there mac address randomization on the go to prevent tracking in places like shopping malls and JCDecaux advertising spots?
Jean Dh I only read now your extensive feedback and I surprised that the company did nit get back to you. Would you like me to support you in this?
So basically this is a huge scam
Hi @@GertJanWolf, please do :) I would be great to have a comprehensive answer posted here.
@@GertJanWolf Any news?
Jean, your questions sparked a small attraction in my solar plexus.
The phone starts at 1550Eur, but degoogled version is 1650Eur. Yes, you need to pay to remove google. This phone didn't even has button for phisically shutting off power to celurar modem. It is a security hazard. Look up what Stingray is. Also watch Edward Showden interviews, he explains it better.
If you need phisical hardware killswitches, buy Librem 5. It has 3 phisical killswitches for camera/mic, wifi, and celurar. It is also the first and only phone with pgp card slot. And it is a lot cheaper. It also has USA made model, which is closer to this phone cost.
This bittium phone runs Android and it is open source, the drivers and other SoC specific software is not. How do you know that there are no backdoors?
Librem 5 runs GNU/Linux and is 100% open source, including drivers. Good luck hiding backdoors there.
liberm 5 is extra suspect Made IN THE USA!!!!
@@lukejacobs2553 No-one cares where it's made as long as it's not a third world country.
NICE TRICK to fool criminals to use it without fear and spend the rest of life in prison...😂
I'm just learning that secure phones existed, and I was curious why you said that this phone was a 'nice trick to fool criminals.' Do these type phones not really provide the security and privacy they claim? I'm not a CEO trying to keep company secrets secure. I'm just looking for a phone that doesn't steal my data and sell it for profit or use it to try influence me or others in some way. Thank you ahead of time for your response if you provide one. I'd would definitely appreciate it so I don't waste time researching something that isn't going to do what I would like it to, as I firmly believe that time is the most valuable we have since we can't get more when it's gone.
@@extremejustin4611look up “arcane OS”. In brief it was a “secure” OS on a pixel phone that ended up being a HUGE honeypot scheme by the FBI and loads of criminals were busted man. Definitely a good watch or read on that if you look it up.
Question:
Can phone hacking software FlexiSpy be installed onto a Pixel phone -- please explain...
Privacy button , that switches microphones off by hardware only ,that can not be disabled or bypassed is highly important.
It can be learned from Computing defense strategies :
en.wikipedia.org/wiki/Defense_strategy_(computing)
Like everything in Wikipedia is valid . Show me a study or reputable source .
what can be switched on, can be switched off// nothing is un-hackable. They used android, meaning they have no idea how to write an OS
How to order it
These secure smartphones are sold via an official distributor. Depending on where you live the price might change. I am not sure if they sell to individuals.
can it be secure if the OS is android?
Chris CC yes it can
@@ghostphones498 you need to de-googled it
@@sensesound1359 Bittium sells 3 versions of the Tough Mobile 2. Google-android, non-google android and dual boot with both. The google-android is not secure. The non-google android can be depending on the quality of the implementation.
@@ghostphones498 why the name on your chanell but no content?
Is that him on the screen at 2:14 ?
6:09 "let me put these in my pocket cause no ones here" turns the camera and there are nine people there...
Thank you for watching! Yes, that was the fun part 😅
i dont care about how tough it is i want to know about the encrption. how it secure text messges protects photos, calls, etc
It diesnt
Great review!
With other secure phones using 8 series Qualcomm chips, I’m wondering if Bittium will be upgrading their Tough Mobile 2 670 chip anytime soon?
Hi J.P., I am not sure if they will. Please check with Bittium directly.
Do you have any reply? Sound good encrypted phone even it is a smartphone
Hi sir can you upload a video on turing phone they are also secure phone
Well it's a closed source Android, so its insecure by definition.
Just the music is to loud and it's hard a little bit to hear you :)
"most secure phone"
comes with google play services...
It comes in 2 options, on with Google and one without.
@@Victor-rn1zn There is also a dual boot option.
could you do a full review about this awesome phone ?
what is the name and model of the god dem thing
Bittium Tough Mobile 2C
How to get one ?
So why didn't you mention the OS? Android? Unless the OS is Linux, forget it. If the apps and OS are tracking you, that's not secure. Another thing is the IMU. If the switch turns off the speaker and camera, that's good, but the IMU can figure out where you are. And what apps are on it? Any Google apps? If so, forget it.
Android is Linux, and it can be separated from Google.
Dialogue was sometimes hard to hear over music mostly at the beginning.
Thank you for your valuable feedback!
Great video
They stand very close. Must be a European thing.
how close they were standing made me so uncomfortable
I bet the cops can capture it on a GSM network with Stingray
What's stingray ? An Imesi catcher ? If so, no he can't and he can't decrypt too.
acab
A good VPN can give stingray trouble
Thank you great video!
Me: Using Nokia 3310
What is the name of the track from 6:13 😇🕺? Great phone by the way.
Ooyy - Too Fast
search the above on youtube or elsewhere
good but if the fone use google stuff , not secure at all !
We’re on this earth a very short time. If you are of the mentality that nothing comes after death, then it’s easy to see why death is such a scary thought. We are not designed to live forever. We’re here to do what we are meant to do then move on. We are always afraid of the unknown. Through knowledge and understanding, and faith, we can eliminate this fear.
Add to that, that TRUTH eliminates fear. This world, this life we live in this Beast system is a lie. The Beast system must be destroyed utterly. Man alone can do nothing about that but a man who loves the One True God, the Lord, the God of Abraham, Isaac and Jacob, Jesus Christ can destroy the whole thing. First he destroys the grip it has in himself then outside through the ultimate power of God now living within.
The Beast watches you without technology so you are not secure regardless of phone.
Tye screen looks sooo small
I think Kim Jong-Un's phone is the most secured phone ever built!
Are we reviewing the phone or the building lol
Can I buy this phone in india
What they need to alternative android roms for phones that dont suck, built on android one.
You should checkout CalyxOS & GrapheneOS both are built around privacy & don't suck in the slightest
it's not secure if cellbrite can unlock it
what he so called hardware level if you try to open it, just drain the battery and it can't erase anything
And how do you suggest one drains the dedicated battery for the security hardware?
Can you do a video on the ghost phone
Ghost Phones Am not sure what the ghost phone is about, but basically I can do a review on all secure phones for professional use.
Bittium made all their profits from selling phones and not from data mining and selling tracking data?
Their day job is making communications equipment for the finnish defence forces. They are in the middle of delivering 207 million euros worth of Tough SDR field radios right now. The Tough Mobile 2 is rated for security level "confidential" by the finnish government. Who do you think their target audience is?
Will it get malwhare
13:30 "existing secure phones for politicians only have work data and they have a separate phone in the other pocket for private (wow! so their private phone is listening in on them,as they chat on their private professional one?)., Second time in one video i hear the company men talk showing NULL understanding of security vulnerabilities! - If a private phone like android is in your pocket when you are talking on a secure government touchphone, then someone is listening, even if only google deep mind. Any high level state secret carrying official should NEVER have their private insecure phone on their person when using a secure phone, as the insecure one could be hacked, and using the camera and/or microphone and location services, to listen in and monitor.. derrrrr. what idiots with no social engineering knowledge trying to make a secure phone and market it with bullshit.
Anyone here after Canada announced in Dec, 2021 that they started tracking cell phone data/signals?
Omg what are those.... bezels
weird camera angles
Why is this video taking so long to go anywhere? Tell us how it’s secure, end of story.
How does it beat cell tower triangulation?
Price in tomuch in india same type apple mobile
👌🏻👍🏻
Security features of bittium mobile 2C
4 years later looked at the website and I have to agree to cookies? makes me questions the company
Why?
why do they want to remember me. i just don't trust any cookie what so ever@@GertJanWolf
Alguien en español para resetear bittium de fabrica sin patrón
Bittium or Blackphone?
Best Options right now are:
- Pixel running CalyxOS or GrapheneOS
- Purism Librem 5
- Pine64 PinePhone
- Sony Xperia(s) running SailfishOS
Does this respect privacy.
You're not that bright
only the fools got nicked. get billy big timnes times pay up . wake up money talkes
Illusions Sold to Fools
This stuff mostly hardwer secure. Not help if somebody less smart and surfing wrong place on the web....
I Think Purism is still better
That phone is a scam.
🤔
If you can give me 10.000.000$ guarantee that if free using that phone get me in prison...you give that money to my wife!?! Then I will buy 1.000 phones.
👍🔗🔒📚🚀📟💰🏆💎📉📈👍👍⛓💰🏆📞💎💎💎😊...
Scam phone
It's an android, so, not secure
So, no real kill switch? What a joke.
No one can defeat nokia
Why is that?
Joke of a device, its not even running Linux is it? That is such a privacy advantage! I can bet that I can secure my galaxy phone better than this device lol my otter box case will protect it from viruses better than this phone lol. A FOR WFFORT THO GOOD JOB AND THANK YOU! F for the phone designers. Poor presentation.
Huva vidu
The new ENCROCHAT
This phone will be used by Hitmen and Criminals since they got busted
No doubt about it
what planet r on lol only the stupid dealers got set up got nicked lol
encrochat is a big shit , using commercial server in france , a good company use internal server only !
@@tomloa245 what do suggest Lnix ?
I don't trust any cellphone period!