Member-only story
Strategically asserting, in order to avoid the type of attacks that have been mentioned it Part 1, it is vital to protect smartphones not only from external unauthorized access, or attacks that are passed down through applications but also by working on the entire physical architecture of the device.
This can also be done by redesigning the entire architecture at the hardware level along with the software level, in search of a new high-level security standard.
Today, we are essentially witnessing the rise of hardware or cold-storage devices, that are very similar to USB devices, permitting us to have an existent e-wallet that is completely disconnected from the network. Even though this is certainly interesting, but focusing on the e-wallets alone does not completely solve the problem. Also, it does not provide utmost security or grant privacy when we use our own smartphones or PCs.
On the other hand, as basic users, we suffer the result of all of these successful protection-break attempts as mobile applications and system developers, being very cost-extensive, have bluntly focused on security without taking into account the much-needed ease of use and compatibility of smartphone applications which has accustomed us in connecting with the world.