privacyblog.com
Severe Silent Circle Blackphone Vulnerability Lets Hackers Take Over
I have written before about the Silent Circle Blackphone. (The articles are available at and at These cell phones give users complete control of app permissions and include encrypted services such …