The Glacier Security Hub protects your device, data, and communications by detecting if your device has been compromised. In addition, Glacier verifies that your device security settings are configured for optimal security. When a threat or issue is detected, Glacier will send you a notification within the app.

The items below are included in Glacier's Security Hub:

Alerts and Recommendations

System alerts

Glacier can detect if your device is compromised. If you receive an alert from Glacier that your device has been compromised you should immediately disconnect from WiFi and cellular or power off the device and contact our support team.

Jailbroken device (iOS)

iOS jailbreaking is the process of removing the limitations imposed by Apple on their iOS operating system. This is achieved by exploiting security vulnerabilities in the software and installing a custom boot loader, which allows the installation of apps and tweaks that are not available in the App Store.

Jailbreaking can allow users to customize their iOS devices beyond what is allowed by Apple, including installing unauthorized apps, customizing the user interface, and accessing the device's file system. However, it also carries certain risks, such as security vulnerabilities, instability, and loss of warranty.

Rooted device (Android)

There are various methods that attackers may use to root an Android device. One common approach is to exploit a vulnerability in the Android operating system or in a specific app running on the device. Attackers may use a specially crafted app, website, or message to trick the user into downloading or installing malware that can exploit the vulnerability and gain root access.

Once the attacker has gained root access, they can use various attack techniques, such as installing malware, stealing sensitive data, or launching a denial-of-service attack. Malware may include keyloggers, spyware, or ransomware, which can allow the attacker to monitor the user's activities or lock the device and demand payment for its release.

Attackers may also use network-based attacks, such as man-in-the-middle attacks, to intercept and modify the user's network traffic, steal sensitive information, or inject malware into the device.