Silent OS, security taken to another level

silent os logo

As we have mentioned on other occasions, with the arrival of new terminals, especially those manufactured in China, a series of operating systems have appeared that, despite having all the same base when coming from Android, aim to improve the user experience through a series of added functions as in the cases of Oxygen or Cyanogen.

However, security remains a pending task to be solved for software developers, who constantly have to face serious threats that can compromise the privacy of users through actions such as the theft of data or personal content and that they cannot solve. entirely with new operating system updates. However, we can find some exception like Silent OS present in some terminals such as Nvidia's Blackphone 2 and whose strengths we will discuss below.

silent os interface

Android Product

As in the case of Oxygen, Cyanogen and Flyme, SilentOS also has its base on Android and it is another addition to the popular operating system that tries to reinforce the fullfilment of security requirements of the terminals in which it is present, unlike the previous ones, based on an optimization of the devices and, especially, on a greater customization capacity.

Sober design

When we have talked about other software, we have highlighted points such as a greater selection of themes to customize the icons, backgrounds in which the color makes the use of the terminals more attractive and an intuitive handling that improves the accessibility of the terminals. In the case of Silent we meet some very basic funds that, despite being dark and looking somewhat dull, they do turn out to be elegant.

silent os screen

System created from scratch

Despite picking up Android elements such as open source and the possibility of modifying some aspects to some extent, Silent OS It has been conceived as a software in which security is the base and everything revolves around it. An example of this is the encryption of all communication made by users through devices equipped with this operating system. Despite having applications developed by Google as well as its catalog and its browser, Silent offers the possibility of using its own tools developed by the creators of this system, among which we highlight an alternative browser to Chrome or Firefox that is inspired by Tor.

Confidentiality as a strength

Although Silent has some very curious news such as a sensor that warns of the theft and loss of data and information, the privacy of users is another of the great strengths of this operating system. When downloading applications, we can manage the permissions that we grant to each one of them. On the other hand, and as we have commented when talking about black phone 2, we can create different screens for ourselves thanks to the Spaces option on the same device where we can organize what kind of content hub We save depending on whether it is business information, profiles on social networks or more personal content. On the other hand, the confidentiality agreement With which the main social networks or even Google, cannot know our location or send us advertising. Finally, the creation of private WiFi networks in open spaces that prevent the loss and theft of data when using wireless connections in public spaces.

silent phablet

Who uses Silent?

When talking about the Blackphone 2, we comment that its implantation is somewhat reduced Because it is a device aimed at people with high purchasing power in the business environment. However, according to Forbes magazine, more than 40 governments, with their armies and some of the most influential businessmen on the planet, whose identity is confidential, are users of one of these versions of the operating system, developed by Silent Circle.

An effective system?

The developers of Silent OS They have shown that it is possible to create software that is based on other existing ones and that guarantees the maximum security and privacy of the users without having to reduce other characteristics and functions of the operating systems. However, there are aspects that can disappoint some users, such as the need to give permission when sharing any photo or message.

silent spaces

Its greatest weakness: Its implantation

Silent developers agree that there is still a lot of work to be done, since the existence of brands that present their own software makes it difficult to expand and consolidate this operating system among the general public. The fact that it is currently present in a small number of high-end terminals also makes it difficult to implement.

After meeting a new member of the Android family and seeing that it is possible to maintain good security on our devices, do you think that Silent can be the solution to all the gaps that constantly appear on devices that use Android or yet there are still many aspects to improve that this software is not able to solve either? You have more information available such as lists of applications that will help to better protect your tablets or smartphones.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.