Information privacy is the ability to stop the flow of information to unknown entities who may use them for nefarious purposes. Without the basic essence of privacy, your digital life is at the mercy of the unknown people exploiting your vulnerability. Internet and the rise of smartphones logs every activity of their user including the location and generated data when you interact with the product. Every aspect of the digital access is possible to be intercepted and this has become clearer from the recent PRISM revelations.

As expected from the shrill media outcry in US, the real focus of the debate was moved away from the persistent tracking by Google, Microsoft, Apple and the big names in the industry. These corporations have implemented and pushed proprietary systems (whose code cannot be accessed), but instead give the users no real choice for their own data. Google sucks everything in its own giant platform tracking every bit out of its servers in order to display better advertisements. This author reiterates that it is impossible to avoid the government tracking because they own the infrastructure. However, proactive steps can be taken to avoid tracking by these evil corporations.

A full blown ideological debate about privacy is not possible due to restrictions of space. It has been repeatedly stressed in these columns about the need for data integrity. Large corporations need to maintain security for their sensitive business information while small businesses have been targeted or become victims of internet criminals wherein their sensitive

financial information is hacked out. User stupidity is the first aspect that is top of mind recall and the fall out is breach of data.

That is why this author is amused by the constant charade and din of bring-your-own-device (BYOD) movement where highly insecure operating systems like Android and iOS platforms are plugged in central databases. Samsung has taken the lead in introducing initiatives like Fort Knox; the name is gimmicky and sounds like a clownish attempt to sell security. Meanwhile analysts of all hues (those who fail to

disclose their fiducial arrangements with above mentioned firms) have made it their single point agenda to denounce BlackBerry 10.

This author?s approach to secure and private systems is set in stone. iOS and Android (which is a malware ridden ecosystem) are generally an anathema for usage. Popularity doesn?t translate into a better product but instead denotes a horrible fragmentation of the ecosystem. As more and more unknown entities jump in the fray, Android makes it easier to port the bug ridden system on cheap hardware, the ensuing costs are associated with advertising and marketing alone.

It is in the interest of Google to subsidise the phones to suck in more gullible and naive users in its ecosystem all the while making claims to the contrary about Android being an open source. There is enough anecdotal data about identity thefts through various means. An Android phone can easily be hacked by means of viruses, microphone switched on surreptitiously to record your conversations and the nightmarish possibilities are endless. It also runs on insecure code and applications making it impossible to firewall it in when the security for sensitive data is paramount.

In this background, BlackBerry 10 with its Blackberry Balance makes inherent sense. With a flick of a gesture, the work and personal data is segregated and each container is encrypted. The phone has been designed from ground up with security in mind and is the only phone that exceeds the requirements of security for secure government channels. For the individual user, BlackBerry offers granular controls to the different applications. It exposes each application?s potential aspect of data leakage and you can individually turn them off. For example, WhatsApp needs permission to the microphone and your location, which can be turned off easily. It is a good security practice to delete this useless application anyway.

BlackBerry App World uses a system wide scanning technology that ensures no malware can be installed on your system. It has initiated a BlackBerry 10 certification programme, which ensures compatibility with the underlying OS. This author strongly recommends sticking to the native applications alone because most of them leak your sensitive information to foreign servers wherein you have no control. Your device remains a custodian of private information, which is all, leaked out in data logs on other platforms. BlackBerry 10 has extensive checks on this practice. Even if any application is packaged and sent across to you in the mail, it cannot be installed directly. In effect, BlackBerry remains the platform of choice, both for finely tuned privacy and encrypted security that has the official seal of approval from the highest certification standards.

The writer is a practicing doctor with keen interest in technology