There's some editorializing in the title here. The ban only covers two buildings, and any phone that allows them to add the monitoring they require (not just Android phones) would be acceptable.
Opposite to Korea's Samsung, LG etc, Europe soon won't have much (Nokia) to protect or prefer. In addition France and Germany are traditionally week in mobile and software. so i wouldnt expect any bans .
I wonder how they determine that an Android device is actually running their MDM software instead of a fake program that simulates it while being observed by the authorities?
I think the intention is to protect government information from being obtained by someone gaining unauthorised access to the phone (e.g. an employee takes their smartphone into the building, goes to a meeting, and someone else compromises an app on the phone and uses it to listen in to the meeting), not to protect against the legitimate owner of the phone.
So the owner of the phone deliberately faking the MDM software is probably outside of the threat model.
That said, someone who managed to root someone else's phone remotely might be able to tamper with the MDM software in advance while wi-fi is still enabled so that it doesn't function correctly.
People obviously misunderstood me. This article talks about military forbidding camera phones and similar devices like something new. In most sensitive facilities around the world, you can't even get in with your telephone, whatever model it is, and particularly if it comes with a camera. The novel (and somewhat praiseworthy) part is that they decided to selectively allow some phones by "controlling" them.
This is just so they can favor Samsung Galaxy phones. We save their ass in the Korean war and prevent North Korea from using nuclear weapons Seoul. And, this is how they repay us; typical ingrates.
[+] [-] mpd|14 years ago|reply
[+] [-] blahedo|14 years ago|reply
For now, with plans to phase in over a couple years, hence "starts ban".
> any phone that allows [...] (not just Android phones) would be acceptable.
Of which Android phones are the vast majority.
Given that the title field is space-limited, I think the summary is a reasonable one.
[+] [-] stephengillie|14 years ago|reply
[+] [-] huxley|14 years ago|reply
[+] [-] AlexFromBelgium|14 years ago|reply
[+] [-] ars|14 years ago|reply
Ideally the software is installed in a way (rootkit) that can not be duplicated by remotely installed malware.
[+] [-] mattmanser|14 years ago|reply
Although in S.Korea's army's case, perhaps not much justification needed.
[+] [-] oellegaard|14 years ago|reply
[+] [-] trotsky|14 years ago|reply
[+] [-] mh-|14 years ago|reply
[+] [-] diminish|14 years ago|reply
[+] [-] andrewpi|14 years ago|reply
[+] [-] A1kmm|14 years ago|reply
So the owner of the phone deliberately faking the MDM software is probably outside of the threat model.
That said, someone who managed to root someone else's phone remotely might be able to tamper with the MDM software in advance while wi-fi is still enabled so that it doesn't function correctly.
[+] [-] wazoox|14 years ago|reply
[+] [-] wazoox|14 years ago|reply
[+] [-] randomStuff|14 years ago|reply