Detections
This feature is available ✔️ for: Plan: Standard, Pro, Enterprise, and Guardian Platform: Android and iOS
Security Hub Overview
The Glacier Security Hub protects your device, data, and communications by detecting if your device has been compromised. In addition, Glacier verifies that your device security settings are configured for optimal security. When a threat or issue is detected, Glacier will send you a notification within the app.
The items below are included in Glacier's Security Hub:
- System - Detects any intrusions or anomalies in the user's device, and if the device has been rooted, jailbroken or proxied.
- Device Lock - Informs the user if the device has an active locking mechanism when not in use.
- Latest Glacier - Alerts the user if the current version of Glacier Chat is not the latest released version.
- Latest OS - Shows the user if the device is using the most recent version of the operating system.
- Application Lock - Reflects whether or not the user has enabled Glacier's app lock feature in the app's Settings menu. If enabled, the app requires unlocking via pattern, pin, fingerprint, or facial recognition even if the phone is unlocked.
- Biometric Lock - Indicates that the user has enabled fingerprint or facial recognition as an additional unlocking option.
- Core Connection - Displays whether or not the Secure Core Connection feature of Glacier has been enabled. This feature is not dependent on the Core profile being connected, but at least enabled.
Alerts and Recommendations
System alerts
Glacier can detect if your device is compromised. If you receive an alert from Glacier that your device has been compromised you should immediately disconnect from WiFi and cellular or power off the device and contact our support team.
Jailbroken device (iOS)
iOS jailbreaking is the process of removing the limitations imposed by Apple on their iOS operating system. This is achieved by exploiting security vulnerabilities in the software and installing a custom boot loader, which allows the installation of apps and tweaks that are not available in the App Store.
Jailbreaking can allow users to customize their iOS devices beyond what is allowed by Apple, including installing unauthorized apps, customizing the user interface, and accessing the device's file system. However, it also carries certain risks, such as security vulnerabilities, instability, and loss of warranty.
Rooted device (Android)
There are various methods that attackers may use to root an Android device. One common approach is to exploit a vulnerability in the Android operating system or in a specific app running on the device. Attackers may use a specially crafted app, website, or message to trick the user into downloading or installing malware that can exploit the vulnerability and gain root access.
Once the attacker has gained root access, they can use various attack techniques, such as installing malware, stealing sensitive data, or launching a denial-of-service attack. Malware may include keyloggers, spyware, or ransomware, which can allow the attacker to monitor the user's activities or lock the device and demand payment for its release.
Attackers may also use network-based attacks, such as man-in-the-middle attacks, to intercept and modify the user's network traffic, steal sensitive information, or inject malware into the device.
Proxied device
A mobile proxy is a type of proxy server that is designed to handle traffic from mobile devices, such as smartphones and tablets. A mobile proxy can help to improve the performance and privacy of mobile devices by caching frequently accessed content, compressing data, and filtering out unwanted traffic.
However, a mobile proxy can also be dangerous if it is used by an attacker to intercept and modify the user's network traffic. This type of attack is known as a man-in-the-middle (MITM) attack, where the attacker intercepts the communication between the user's device and the server, allowing them to read, modify or inject malicious content into the user's traffic.
For example, an attacker may use a mobile proxy to intercept the user's web traffic, modify the content of the web pages the user is visiting, or steal sensitive information such as login credentials, banking details, or personal data.
Additionally, some mobile proxies may also collect and store user data, such as browsing history, search queries, and location information. This data can be used by the proxy provider or sold to third-party advertisers or data brokers, which can compromise the user's privacy.

File system modifications
Glacier analyzes the file system to detect any changes to the operating system, such as the presence of files or directories associated with jailbreaking or known malware. These files can be detected by comparing the system files against a known good reference image or hash value.
Device PIN and biometric locks
A PIN or biometric lock provides an additional layer of security to your device, helping to protect your personal information and data in case your device is lost, stolen or accessed by someone else. Without a lock, anyone can access your device and view your personal information or install malicious apps.
Glacier periodically checks if the device has a PIN lock set on the device. If the PIN is removed the user will get an alert. Additionally, if the device supports biometrics an alert will also be provided.
Some security experts advise against relying solely on biometric unlock features, as they may be less secure than traditional passcodes or passwords. Therefore, it's important to use a combination of security measures, such as biometric unlock and strong passcodes, to maximize the security of your device. Glacier will not consider the device insecure if biometrics are disabled.
Latest OS and Glacier
From a security standpoint, keeping your operating system (OS) up to date is crucial to ensure that your device is protected against known security vulnerabilities and threats.
Mobile device OS updates typically include security patches that address known vulnerabilities and bugs, improving the overall security of your device. Hackers often target vulnerabilities in outdated software, so it's important to keep your OS up to date to reduce the risk of compromise.
Glacier will verify that your device OS and Glacier apps are up to date.
Core Connection
Enabling Glacier Core VPN on your device is important for several reasons:
- Security: Core VPN encrypts all the traffic that passes through it, making it more difficult for hackers or other unauthorized parties to intercept and access your data. This is particularly important if you use public Wi-Fi networks, which are often unsecured and can be easily compromised.
- Privacy: Core VPN can also help protect your privacy by masking your IP address and location, making it more difficult for websites and other online services to track your online activities.
Glacier will not alert the device if Glacier Core is not enabled. However, Security Hub will show the status of Glacier Core.