FIPS 140-2 Report .
Interesting brief description of the security keys and algorithms used in Blackberry.
This entry was posted on Thursday, February 7th, 2008 at 10:29 am and is filed under blackberry. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
[...] the BlackBerry platform enjoys one of the highest levels of security around, user awareness goes a long way in completing the circle. Using the built-in features of the [...]
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
Connecting to %s
Notify me of follow-up comments via email.
Theme: Contempt by Vault9.
Blog at WordPress.com.
Get every new post delivered to your Inbox.