Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

These apps are quietly draining your phone’s batteries – how to find them and shut them down

June 20, 2025

Trump’s “All American” gold-plated smartphone promises to rival the iPhone 17.

June 17, 2025

TVOS26 turns your iPhone into a karaoke microphone from Apple Music Sing

June 10, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home ยป A secure Android phone, not an iPhone: The Trump campaign is using it.
Android

A secure Android phone, not an iPhone: The Trump campaign is using it.

adminBy adminOctober 11, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Following a series of cyberattacks and two assassination attempts on President Donald Trump, his presidential campaign has taken significant steps to strengthen security. The Trump campaign is now deploying special encrypted cell phones and secure laptops to protect its staff.

The devices were obtained from Green Hills Software, a Santa Barbara, California-based company, Reuters reported. Green Hills Software is known for its security-focused operating systems, which are already used by several U.S. government agencies. Dan O’Dowd, president and CEO of Green Hills Software, said his company provided the Trump campaign with customized Android phones that run on its own operating system.

These phones have been stripped of most functionality, leaving only basic features like calling and text messaging, with added security protocols to protect users from cyber threats.

Green Hills Software had issued a press release regarding the deal on October 1st, but the news received little attention. O’Dowd said that through mutual connections, he reached out to the Trump campaign and offered the company’s technology.

A Trump campaign spokesperson declined to comment on the matter to Reuters. However, a source familiar with the campaign’s internal operations confirmed that top-level staff had recently upgraded the devices with stronger security measures, although it was unclear which vendor was chosen.

The decision to beef up security for the Trump campaign comes after months of targeted cyberattacks by Iranian hackers. These attacks, led by a group known as APT42, resulted in the theft of internal communications and documents. Concerns about physical threats were also heightened by concerns that hackers could use stolen information to track and compromise campaign staff. O’Dowd revealed that key personnel are already using newly acquired devices designed to withstand remote cyberattacks.

O’Dowd said the phones operate on a closed network, allowing communication only between devices on the same plan. These devices include features such as end-to-end encryption and two-factor authentication, which are standard recommendations by cybersecurity experts. APT42, the hacker group responsible for infiltrating the Trump campaign earlier in the summer, is known for using sophisticated mobile malware. You can record conversations and remotely activate your phone camera.

O’Dowd declined to say how many devices were purchased in the campaign or how much they cost, but said prices will vary depending on customer needs. In addition to the phones, the campaign also acquired specially designed laptops with limited access to the Internet, aimed at preventing cyber intrusions from outside.

These laptops are configured similarly to mobile phones and provide a secure way for team members to collaborate remotely while maintaining strict isolation from potential attackers.

O’Dowd emphasized that the technology is being adopted by legal teams handling sensitive cases where it is important to keep files safe. Green Hills Software, a U.S. government contractor, supplies operating systems to multiple branches of the military, including integration into weapons systems. O’Dowd also noted that the company’s laptop products are used in FBI field offices.

Do you think that’s enough protection?



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Samsung returns to S25 Ultra s Pen Bluetooth Tease

January 27, 2025

My experience using Raspberry Pi for wireless Android Auto

October 31, 2024

This Android malware can transfer your phone to hackers

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard โ€“ here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.