{"id":12319,"date":"2013-04-22T14:40:49","date_gmt":"2013-04-22T21:40:49","guid":{"rendered":"http:\/\/rosalindgardner.com\/blog\/?p=12319"},"modified":"2019-02-13T11:23:07","modified_gmt":"2019-02-13T19:23:07","slug":"mobile-or-pc-what-is-the-most-secure-connection","status":"publish","type":"post","link":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/","title":{"rendered":"Mobile or PC? What is the Most Secure Connection?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12320\" title=\"Lock-icon\" src=\"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png\" alt=\"\" width=\"256\" height=\"256\" \/>Remember ages ago (or what seemed like ages ago) when people fretted over the safety of buying items online? What about the security risk? Well, times have changed significantly in a short amount of time. Nowadays, it\u00e2\u20ac\u2122s not merely that people accept online purchases\u00e2\u20ac\u00a6they are now trusting their mobile devices\u00e2\u20ac\u201dportable systems\u00e2\u20ac\u201dmore than their PCs. Why is this?<\/p>\n<h3><strong>In the Beginning There Was No Security<\/strong><\/h3>\n<p>First consider why we know (or at least used to think) that PCs were safer than mobile devices or cell phones. PCs are what introduced us to the concept of online transactions. Because PCs were locally based, and hardwired, they were always perceived as safer means of communication than using a cell phone. (Much like a landline was considered safer than a cell phone) Even when WI-FI was introduced it was considered highly unsafe, because of potential breaches and hacking.<\/p>\n<p>However, as technology improved and people became used to the concept of online transactions (made possible through brand name companies that stood by said transactions, like eBay, PayPal, Amazon and so on) eventually a shift occurred. We were introduced to secure systems and ultra-secure hardware, as in Linux (a Windows alternative so simple and protected, it was the government\u00e2\u20ac\u2122s choice) as well as the Blackberry device, and the VPN (Virtual Private Network) option, which scrambled IP tracing and encrypted information.<\/p>\n<h3>Revolutionary Technology<\/h3>\n<p>And yes, when the iPhone and other notable mobile units first came out, there was a great deal of trepidation about relying on 3G or WI-FI to conduct business. iPhones and particularly unprotected WI-FI connections were said to be highly dangerous in comparison to hardwired PCs. Blackberry was singled out as the best choice in secure usage, followed by the Linux-derived Android system. The Blackberry in particular earned a great deal of ink for being \u00e2\u20ac\u0153too secure,\u00e2\u20ac\u009d thanks to modern encryption technology. In fact, a recent article at ZNet reported how the Indian government\u00e2\u20ac\u2122s intelligence services can\u00e2\u20ac\u2122t even break the Blackberry\u00e2\u20ac\u2122s encryption in hopes of counteracting terrorists threats.<\/p>\n<p>Another issue that bears consideration: more people are starting to trust their mobile phones and tablet PCs than their own desktop computers. Why? Sure, desktop PCs have the hardwiring and the tight encryption\u00e2\u20ac\u00a6but users are now so protective of their smartphones that they are avoiding taking risks downloading suspicious apps. A survey by Metaforic reported that 12% of users stated that the effort and security questions of downloading apps didn\u00e2\u20ac\u2122t justify the convenience for online banking. However, 14% of the users said that using a PC system prevented them from accessing online banking.<\/p>\n<h3>More Changes Ahead<\/h3>\n<p>It\u00e2\u20ac\u2122s easy to see the potential for abuse here; Google\u00e2\u20ac\u2122s Android system is so open to third party developers that it is now considered one of the most insecure systems for popularity alone\u00e2\u20ac\u201ddespite a fairly secure system, better than old iPhones.<\/p>\n<p>On the other hand, mobile banking allows users to securely access their accounts in confidence; they always know where their devices are, and hardly ever leave it unattended. The mobile banking sector, for instance, is now tied to an individual. There is no middle man. Furthermore, fast fraud notification and geo-location features are preventing fraud from taking place.<\/p>\n<p>And just remember this. In the coming years, biometric based security will grow significantly. It\u00e2\u20ac\u2122s not going to be for desktop computers\u00e2\u20ac\u201dit\u00e2\u20ac\u2122s going to be for mobile systems. We\u00e2\u20ac\u2122re already getting devices like the Ice Cream Sandwich, which actually relies on a person\u00e2\u20ac\u2122s face to unlock the phone. Siri for Apple already recognizes voices, and more is coming in speech to text technology.<\/p>\n<p>Lastly, consider that Decisive Analytics compared the latest iPhone and iPad designs and actually declared them more secure than the Blackberry. Now how\u00e2\u20ac\u2122s that for rapidly advancing technology?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remember ages ago (or what seemed like ages ago) when people fretted over the safety of buying items online? What about the security risk? Well, times have changed significantly in a short amount of time. Nowadays, it\u00e2\u20ac\u2122s not merely that people accept online purchases\u00e2\u20ac\u00a6they are now trusting their mobile devices\u00e2\u20ac\u201dportable systems\u00e2\u20ac\u201dmore than their PCs. Why [&hellip;]<\/p>\n","protected":false},"author":578,"featured_media":12320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1222],"tags":[1127,1128,1129,1126,207,1356],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com\" \/>\n<meta property=\"og:description\" content=\"Remember ages ago (or what seemed like ages ago) when people fretted over the safety of buying items online? What about the security risk? Well, times have changed significantly in a short amount of time. Nowadays, it\u00e2\u20ac\u2122s not merely that people accept online purchases\u00e2\u20ac\u00a6they are now trusting their mobile devices\u00e2\u20ac\u201dportable systems\u00e2\u20ac\u201dmore than their PCs. Why [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/\" \/>\n<meta property=\"og:site_name\" content=\"RosalindGardner.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RosalindGardnerOnline?ref=hl\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-22T21:40:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-13T19:23:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"256\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Melissa Tyler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosalindgardner\" \/>\n<meta name=\"twitter:site\" content=\"@rosalindgardner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Melissa Tyler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/\",\"url\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/\",\"name\":\"Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com\",\"isPartOf\":{\"@id\":\"https:\/\/rosalindgardner.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png\",\"datePublished\":\"2013-04-22T21:40:49+00:00\",\"dateModified\":\"2019-02-13T19:23:07+00:00\",\"author\":{\"@id\":\"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/184a8c0b8c07bd9546e3a82a4e64e0e5\"},\"breadcrumb\":{\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage\",\"url\":\"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png\",\"contentUrl\":\"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png\",\"width\":\"256\",\"height\":\"256\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rosalindgardner.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile or PC? What is the Most Secure Connection?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/#website\",\"url\":\"https:\/\/rosalindgardner.com\/blog\/\",\"name\":\"RosalindGardner.com\",\"description\":\"Learn Blogging &amp; Affiliate Marketing with Rosalind Gardner\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rosalindgardner.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/184a8c0b8c07bd9546e3a82a4e64e0e5\",\"name\":\"Melissa Tyler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/621f52b57ce5593c2e8b5be6b338bca2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/621f52b57ce5593c2e8b5be6b338bca2?s=96&d=mm&r=g\",\"caption\":\"Melissa Tyler\"},\"description\":\"Melissa Tyler is a tech writer at VPN Ten \u00e2\u20ac\u201c a place where you can read reviews about the best VPN providers. She is fond of sharing advice about online security, safety connections and VPN technology. --\",\"sameAs\":[\"http:\/\/www.vpnten.com\"],\"url\":\"https:\/\/rosalindgardner.com\/blog\/author\/melissatyler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/","og_locale":"en_US","og_type":"article","og_title":"Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com","og_description":"Remember ages ago (or what seemed like ages ago) when people fretted over the safety of buying items online? What about the security risk? Well, times have changed significantly in a short amount of time. Nowadays, it\u00e2\u20ac\u2122s not merely that people accept online purchases\u00e2\u20ac\u00a6they are now trusting their mobile devices\u00e2\u20ac\u201dportable systems\u00e2\u20ac\u201dmore than their PCs. Why [&hellip;]","og_url":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/","og_site_name":"RosalindGardner.com","article_publisher":"https:\/\/www.facebook.com\/RosalindGardnerOnline?ref=hl","article_published_time":"2013-04-22T21:40:49+00:00","article_modified_time":"2019-02-13T19:23:07+00:00","og_image":[{"width":256,"height":256,"url":"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png","type":"image\/png"}],"author":"Melissa Tyler","twitter_card":"summary_large_image","twitter_creator":"@rosalindgardner","twitter_site":"@rosalindgardner","twitter_misc":{"Written by":"Melissa Tyler","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/","url":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/","name":"Mobile or PC? What is the Most Secure Connection? - RosalindGardner.com","isPartOf":{"@id":"https:\/\/rosalindgardner.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage"},"image":{"@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage"},"thumbnailUrl":"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png","datePublished":"2013-04-22T21:40:49+00:00","dateModified":"2019-02-13T19:23:07+00:00","author":{"@id":"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/184a8c0b8c07bd9546e3a82a4e64e0e5"},"breadcrumb":{"@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#primaryimage","url":"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png","contentUrl":"https:\/\/rosalindgardner.com\/blog\/wp-content\/uploads\/Lock-icon.png","width":"256","height":"256"},{"@type":"BreadcrumbList","@id":"https:\/\/rosalindgardner.com\/blog\/mobile-or-pc-what-is-the-most-secure-connection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rosalindgardner.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile or PC? What is the Most Secure Connection?"}]},{"@type":"WebSite","@id":"https:\/\/rosalindgardner.com\/blog\/#website","url":"https:\/\/rosalindgardner.com\/blog\/","name":"RosalindGardner.com","description":"Learn Blogging &amp; Affiliate Marketing with Rosalind Gardner","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rosalindgardner.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/184a8c0b8c07bd9546e3a82a4e64e0e5","name":"Melissa Tyler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rosalindgardner.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/621f52b57ce5593c2e8b5be6b338bca2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/621f52b57ce5593c2e8b5be6b338bca2?s=96&d=mm&r=g","caption":"Melissa Tyler"},"description":"Melissa Tyler is a tech writer at VPN Ten \u00e2\u20ac\u201c a place where you can read reviews about the best VPN providers. She is fond of sharing advice about online security, safety connections and VPN technology. --","sameAs":["http:\/\/www.vpnten.com"],"url":"https:\/\/rosalindgardner.com\/blog\/author\/melissatyler\/"}]}},"_links":{"self":[{"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/posts\/12319"}],"collection":[{"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/users\/578"}],"replies":[{"embeddable":true,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/comments?post=12319"}],"version-history":[{"count":0,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/posts\/12319\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/media\/12320"}],"wp:attachment":[{"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/media?parent=12319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/categories?post=12319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rosalindgardner.com\/blog\/wp-json\/wp\/v2\/tags?post=12319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}