The Glacier Security Hub protects your device, data, and communications by detecting if your device has been or could be compromised. In addition, Glacier verifies that your device security settings are configured for optimal security. When a threat or issue is detected, Glacier will send you a notification within the app.
The items below are included in Glacier's Security Hub:
- System - Detects any intrusions or anomalies in the user's device, and if the device has been rooted, jailbroken or proxied.
- Device Lock/Screen Lock - Informs the user if the device has an active locking mechanism when not in use.
- Latest Glacier - Alerts the user if the current version of Glacier Chat is not the latest released version.
- Latest OS - Shows the user if the device is using the most recent version of the operating system.
- Application Lock (Android) - Reflects whether or not the user has enabled Glacier's app lock feature in the app's Settings menu. If enabled, the app requires unlocking via pattern, pin, fingerprint, or facial recognition even if the phone is unlocked.
- Biometric Lock - Indicates that the user has enabled fingerprint or facial recognition as an additional unlocking option.
- Core Connection - Displays whether or not the Secure Core Connection feature of Glacier has been enabled. This feature is not dependent on the Core profile being connected, but at least enabled.
- Glacier DNS (Mobile Threat Detection) - Glacier Mobile Threat Detection enhances iOS and Android device security by blocking access to known malicious domains, including phishing, malware, and tracking sites. It also filters trackers and ads, reducing exposure to surveillance and improving privacy while browsing or using apps. In addition, Glacier detects high-level threats using advanced AI-powered threat intelligence and real-time data from global threat intel feeds, enabling proactive defense against emerging and targeted attacks.
Android

iOS

Alerts and Recommendations
System alerts
Glacier can detect if your device is compromised. If you receive an alert from Glacier that your device has been compromised you should immediately disconnect from WiFi and cellular or power off the device and contact our support team.
Jailbroken device (iOS)
iOS jailbreaking is the process of removing the limitations imposed by Apple on their iOS operating system. This is achieved by exploiting security vulnerabilities in the software and installing a custom boot loader, which allows the installation of apps and tweaks that are not available in the App Store.
Jailbreaking can allow users to customize their iOS devices beyond what is allowed by Apple, including installing unauthorized apps, customizing the user interface, and accessing the device's file system. However, it also carries certain risks, such as security vulnerabilities, instability, and loss of warranty.
Rooted device (Android)
There are various methods that attackers may use to root an Android device. One common approach is to exploit a vulnerability in the Android operating system or in a specific app running on the device. Attackers may use a specially crafted app, website, or message to trick the user into downloading or installing malware that can exploit the vulnerability and gain root access.