{"id":15066,"date":"2017-01-26T14:22:07","date_gmt":"2017-01-26T21:22:07","guid":{"rendered":"http:\/\/doycetesterman.com\/index.php\/2017\/01\/whats-the-most-secure-phone\/"},"modified":"2017-01-26T15:15:26","modified_gmt":"2017-01-26T22:15:26","slug":"whats-the-most-secure-phone","status":"publish","type":"post","link":"http:\/\/doycetesterman.com\/index.php\/2017\/01\/whats-the-most-secure-phone\/","title":{"rendered":"What&#039;s the Most Secure Phone?"},"content":{"rendered":"<p>The answers range from &#39;not terribly useful&#39; feature phone, to an iPod Touch with a bunch of options disabled (note: is not actually a PHONE), and wander into less secure territory from there.<\/p>\n<p><i>&quot;It&#39;s a security first-principles dilemma: the most secure device is likely to be the least useful to the average person.&quot;<\/i><\/p>\n<p><a href='http:\/\/www.zdnet.com\/article\/want-a-secure-privacy-smartphone-the-experts-suggest\/'><img style='display:block;' src='https:\/\/lh3.googleusercontent.com\/proxy\/9eHpobZAhYiDreGB5vEnb-qJ8b8dJ2EOiRMu-tB9Vsk9_wMVjpf6-k-UrnzRvoiRJjb2CUylWspBnVBarKLddgrQKh5-fZzdelFETS0aLhxUsD8TwbYZ2YGmqSTMje_GD7AnhvvBY2mo3AtLBMqqacMlkizpcSNCforINcInrb3kL1rwITh7Tbi_HJZIVRCeK3jcl73MuuwWRISQVxj7cdk7ypL8yqZxrFwi3zD7OGHBXACX-PDZ1vMlAw=w506-h910' border='0' \/>Need a secure smartphone? Answer is simple, experts say | ZDNet<\/a><br \/>Making a good smartphone choice could be the difference between being hacked and keeping your data safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The answers range from &#39;not terribly useful&#39; feature phone, to an iPod Touch with a bunch of options disabled (note: is not actually a PHONE), and wander into less secure territory from there. &quot;It&#39;s a security first-principles dilemma: the most secure device is likely to be the least useful to the average person.&quot; Need a &hellip; <\/p>\n<p class=\"link-more\"><a href=\"http:\/\/doycetesterman.com\/index.php\/2017\/01\/whats-the-most-secure-phone\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What&#039;s the Most Secure Phone?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[684],"tags":[20,238],"class_list":["post-15066","post","type-post","status-publish","format-standard","hentry","category-news-and-politics","tag-blog","tag-google"],"_links":{"self":[{"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/posts\/15066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/comments?post=15066"}],"version-history":[{"count":2,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/posts\/15066\/revisions"}],"predecessor-version":[{"id":15829,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/posts\/15066\/revisions\/15829"}],"wp:attachment":[{"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/media?parent=15066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/categories?post=15066"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/doycetesterman.com\/index.php\/wp-json\/wp\/v2\/tags?post=15066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}