Feeds

Nokia paid off extortionist in 2007: Finnish TV

Envelopes full of cash handed over to protect Symbian app-signing keys secret

Intelligent flash storage arrays

A Finnish broadcaster has revealed that Nokia paid a ransom to keep the app-signing keys of its Symbian operating system secret, in an extortion case dating back to 2007.

According to MTV News, the former mobe giant, whose Symbian phones were market leaders back in the day, paid out “millions of Euros” in the extortion.

As El Reg readers will know, the keys provided a proof of authenticity for apps running on Symbian. While it wasn't the only way for a developer to ship a third-party app for the operating system, only those that passed Nokia's quality control could ship as “Symbian Signed” apps.

If the keys had escaped into the outside world, anybody would have been able to pass off their apps as having been okayed by Nokia – including malware.

MTV News says the country's National Bureau of Investigation confirmed the case is still unsolved. The payoff to keep the keys secret happened “at a parking lot nearby Särkänniemi amusement park” in the city of Tampere, in what seems to have been planned as a drop-and-arrest operation.

“Then things went wrong. The blackmailer took the bag. Police, however, lost track of the blackmailer and the money was gone.” ®

Remote control for virtualized desktops

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.