The Bee Network – Security Review

The Bee Network is a phone-based crypto currency application for your smart phone

Our Director, Ciaran Kenny, recently gave his security expertise about a new type of crypto currency & the app used to mine it on a mobile phone! The Bee Network is a phone-based digital currency application that you can download to your smartphone & “mine” a form a crypto-currency called “Bee Coin” by clicking a button every day.

Ciaran gave his views on whether the app was safe from a security perspective on a YouTube video with his son, Connor Kenny. He first looked at whether the app accesses any data on your device. Other than the app asking for access to your contacts to pass on referrals, he found that it did not access any data at this time. Even if you do not allow it access to your contacts, you can still use the app fully. Please note that his assessment was about how the app works at present, this may always change in the future.

The pair then discussed whether the app could get data from you based on your behaviour to target ads. He said that currently it does not seem like the app does target ads, but with an aim to recruit one billion users in the future, it would not be surprising if they do monetise the app this way much in the same way as other apps do.

Like this article?

Share on twitter
Share on Twitter
Share on linkedin
Share on LinkedIn
Share on email
Share by Email

Subscribe to our monthly newsletter

Get the best IT tips and Office ideas in your inbox

Further reading


How to add a Shared Mailbox to Outlook Mobile

If you have access to shared mailboxes and you need to view these in Outlook on your mobile, you don’t need to know the username and password for those accounts. You can add them using your existing delegated access rights.

Read More »

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Scroll to Top