May 02, 2017 01:36 AM EDT
While John McAfee’s name is almost synonymous with software security, an unhackable phone he is developing relies on hardware switches instead of software to secure the gadget against hacking. The John McAfee Privacy Phone is full of switches at the back to block tracking the user or hacking the device. He claims there is no catcher device or Stingray that could connect to the phone.
Slash Gear reports that the John McAfee Privacy Phone has no markings at its back, except for a camera. It, however, has a lot of switches. There is a switch to shutter the battery, to turn off the WiFi antenna, close the camera, and turn off GPS. Before McAfee made the claim of an unhackable phone, Silent Circle said its Blackphone 2 could not be hacked.
The security expert believes there is a market for the John McAfee Privacy Phone. The unreleased device would cost $1,100. He believes companies that want to protect its businesses as well as individuals who do not want criminals or the government spying on them are his potential market.
In an opinion piece for Newsweek, McAfee explains that he developed the John McAfee Privacy Phone because all software would eventually be hacked. A software is being used to fight another software, and as the balances always shifts, phone users are statistically vulnerable 50 percent of the time.
To power down a phone, the John McAfee Privacy Phone developer points out that a software command is used. However, the command could be intercepted by a spyware or malware, giving the hacker control when and if the gadget is powered down. A spyware could intercept the software switch to turn off the device and then fake a power down with a black screen, but in reality, the phone is still on and spying is ongoing.
Daily Mail reports that the cyber security expert plans to release the John McAfee Privacy Phone in the later part of 2017 through MGT. In turn, MGT inked a letter of intent with the Nordic IT Sourcing Association to design, test, and assemble a high-tech phone with privacy features no hackers or eavesdroppers could break.