时间:2026-02-22 07:07:59 来源:网络整理编辑:探索
As President Donald Trump takes office, he has also taken up a new, digital symbol of the presidency
As President Donald Trump takes office, he has also taken up a new, digital symbol of the presidency. Before, during and since the campaign, he used an Android smartphoneto conduct his business and tweet prolifically, directly reaching millions of followers. But when he was inaugurated, Trump surrendered that deviceand accepted in its place a smartphone that has somehow been made more secure.
It is a key move for a man who might now be not only the 45th commander-in-chief but also America’s first president with such devotion to Twitter. Many private companies deal with issues like this, in which employees joining the ranks already have a mobile phonethey use for their personal life. Should that device be connected to company systems? Or should workers be issued a cumbersome second phone for work-only purposes? There are federal recommendationsabout that, but few firms are handling data as sensitive as the president’s phone might be.A presidential smartphone is probably the most attractive target imaginable for foreign governments’ hackers. Attacking the phone could provide access to the highest secrets of national security, and near-constant real-time information about exactly where the president is, raising the potential for physical threats. Securing a phone like that requires several layers of protection.Exactly what has been done to protect the president’s phone is intentionally left unclear to the public. But as a scholar of mobile security, I know that beyond overall network security measures, there are several technological approaches to securing a smartphone for special use. The most secure, however, is also among the least practical and least likely: ensuring the phone cannot connect to the internet at all. So how might have government cybersecurity specialists locked down Trump’s new phone?
One level of protection is what is called “security by obscurity.” Many people presumably had Trump’s pre-presidential phone number. Now, relatively few people will have his new number. Similarly, his old phone’s internal device identifiers, such as its unique 15-digit International Mobile Equipment Identitynumber, or IMEI, may not have been as carefully guarded as those for his new phone. Keeping that information secret means the first hurdle for potential attackers involves figuring out which phone to attack in the first place.Another layer of security involves ensuring the device was made by a trusted manufacturer, using trusted components, reducing the risk that the hardware would have any vulnerabilities that an attacker could exploit. Similarly, anyone who worked with or handled the phone at any step would have to be prevented from tampering with it to introduce any weaknesses.Adding even more security in the physical device itself would be a specialized computer chip to add significant encryption capability for data stored on the phone or transmitted to or from it. Called a “Trusted Platform Module,” this hardware element is required by the Defense Departmentin all new devices handling military information. In addition, it could be used to ensure that any attempts to tamper with the phone, its settings or the operating system installed would be identified immediately.
The phone also might be configured to connect only with certain predetermined phone and data networks that are regularly screened against intrusions. Limiting its contact with the internet would, of course, be key – though that would also significantly limit the phone’s usefulness to a president whose routine involves constant connection.To handle that middle ground – finding a compromise between a full, unrestricted internet connection and a completely disconnected device – Trump’s phone likely has some degree of customization. This could include a custom operating system, such as the Android variants the Department of Defense has developed. These would contain security features not typically found in commercial systems, such as special restrictions on logging in and unlocking the phone, as well as specialized encryption settings.

The apps allowed on the president’s phone should be few and limited only to those verified in advance. There should be little, if any, ability to automatically download and install apps, which could carry with them security-breaching code. For similar reasons, automatic updates to apps or the operating system might be restricted.What happens inside a phone’s processor and memory when it’s running an app is already fairly secure even on commercial smartphones. Parts of the memory storing data and other parts handling the software instructions for working with those data are typically separated and identified. For smartphones such as those used by the president, this memory tagging should be done in hardware. This can prevent a number of different types of attacksthat try to trick the device into running software codefrom areas of memory set aside to handle data.Also important is determining which data an app can use. Most operating systems allow users to make that decision. To improve security even more, the phone could be programmed with mandatory limits provided by, say, the secret service. To some degree, this ability is present on many smartphones, preventing users or attackers from corrupting key elements of the system.But it could be stepped up – even enforcing that a particular file could be shared only with people or apps holding a certain level of security clearance, and having the system prevent sharing it elsewhere. For example, even if the president inadvertently told the Twitter app (if it’s installed on his phone) to share a piece of classified information, the phone’s software could step in and prevent that from happening.
Separately encrypting the memory spaces used by each appcan boost security further. That would ensure that even if a malicious app makes its way onto the phone, it cannot see what other apps are doing, nor read the data they are working with.Academic researchers have developed other ways that could be incorporated into a more secure presidential smartphone. The concept of “data tagging” can ensure that data that have been accessed by a certain app are accessed only in restricted ways. For example, the phone could be instructed that information that has passed through the White House’s secure wireless networks should not be accessible to the Twitter app.Additionally, context-dependent settingscould monitor the phone’s location and take note of surrounding devices. Perhaps the phone’s microphone and camera could be shut off, and any active Twitter link disconnected, if the phone itself is in the Oval Office, and whenever the president is meeting with members of his national security team.How exactly the president’s phone is protected is vitally important to our national security. Trump’s agreement to stop using his previous, commercial-grade phone in favor of a government-secured one is a good step toward keeping the president informed and engaged while he and the nation also stay safe.
TopicsCybersecurityDonald Trump
Satisfy your Olympics withdrawals with Nike's latest app2026-02-22 07:00
鋒無力 ?U23國足蓄勢待發:我們有默契要靠團隊進球2026-02-22 06:16
久巴拒絕俄羅斯隊征召 因家裏有許多烏克蘭親戚2026-02-22 06:04
中國隊獲得2022年U17女足世界杯參賽資格 朝鮮隊無法參中國隊遞補2026-02-22 05:34
Cat gets stuck in the most awkward position ever2026-02-22 05:11
西蒙尼險被曼聯球迷水瓶砸中 賽後沒和朗尼克握手2026-02-22 05:07
尤文前瞻 :斑馬軍亟待破16郎魔咒 椰子小魔仙複出2026-02-22 05:05
老帥再出山!前中國女足主帥裴恩才執教廣西平果唄儂女足2026-02-22 05:01
WhatsApp announces plans to share user data with Facebook2026-02-22 04:48
英雄遲暮 !C羅竟90分鍾0射 梅羅連續兩賽季做16郎2026-02-22 04:45
Pokémon Go is so big that it has its own VR porn parody now2026-02-22 06:55
悲喜交加!巴薩基本無緣哈蘭德 但烏姆蒂蒂終於要走了2026-02-22 06:47
羊城晚報:中國球員發聲是火上澆油 困局中應謹記沉默是金2026-02-22 06:42
豎中指?拉什福德:我是受到了辱罵 但伸的是食指2026-02-22 05:40
Snapchat is about to explode in popularity, report says2026-02-22 05:29
歐冠8強出爐!曼城皇馬領英西3V3 大禮包還有倆?2026-02-22 05:07
C羅撞航母!牙嗑後腦勺表情賊痛苦 倆人都沒碰著球2026-02-22 04:57
旺達也出軌 ?和小12歲小鮮肉聊騷 還發自己性感照2026-02-22 04:42
Whyd voice2026-02-22 04:30
國足12強賽名單:武磊無緣 巴西4歸化集體缺席2026-02-22 04:27