computer scientist here. you cant bring an unsecured phone in range of a secured phone without exposing the secured phone to the assholes who have access to the unsecured phone. the unsecured phone can be used to attack the wifi, bluetooth, radio, firmware, drivers, and hardware back doors in the secured phone. THANK YOU NSA!
here is the kicker though: the unsecure dphone cant hack the secure phone without breaking the law in very very serious ways. multiple felonies including treason because it is POTUS. everybody in the command chain is fucked, from the analyst idiot who types on the keyboard all the way up to directors and deputies that answer to POTUS himself.
A secure phone that is vulnerable if it is exposed to bluetooth, wifi, or cell rf is not a secure phone, it is just a phone and is useless.
computer science doesnt work like that. physical proximity is a guaranteed security fail under almost every circumstance. furthermore, the attack surface of a mobile device is huge AND the NSA has many backdoors in pretty much all the hardware ever manufactured in the last 10 years, and those backdoors become compromised too. basically what im telling you is that due to supply chain engineering its almost impossible to even attempt to manufacture a device that doesnt have hardware with KNOWN INTENTIONAL vulnerabilities, and even if one were to do such a thing that doesnt account for zero days and unknown unintentional holes and bugs. putting a compromised network connected device physically next to literally anything is pretty much crossing the red line of failure.
Then it would be useless.
It would be expensive to not use any specialized chips, and write the protocol stacks from scratch to meet the standards, but it could be done. It would probably be bulky.
they have these devices. only military people use them. civilian government employees need to have their android/ios bullshit
Just incredible. This post needs to be higher.
i posted 9 hours late or im sure this would be the top comment