// Real Life Situations

Use Cases

Who is SGBA for, against which threats, and what does it provide?

Checkpoint · official inspecting
09:41●●● 4G
⚠ Device Inspection Active
Being inspected by official
System Status
Secure FolderInvisible ✓
Hidden AppNot Detected ✓
Sensitive FileEncrypted ✓
SGBA TraceZero ✓
AppearanceNormal Phone
📞
Phone
📷
Camera
🗺️
Maps
⚙️
Settings
📰
Ayşe Kaya
Investigative Journalist · Field Reporter
Risk: Device Confiscation SGBA: Zero Trace
Reporting from a region under pressure. The phone contains source identities, audio recordings, encrypted documents.
Stopped at a checkpoint. The official wants to inspect the phone.
The screen shows a normal phone. No Secure Folder icon, no suspicious app. SGBA is completely invisible.
Source identities, documents and communications were protected. Phone returned.
Protection Provided
Source identity and communication history are protected
Even the existence of the security app cannot be detected
Sensitive documents are hidden with Knox encryption
Zero clues in forced unlock attempts
%0
Visual Trace
Knox
Encryption
Source Prot.
Phone given to child · no hidden section
09:41●●● 5G
📞
Phone
🎮
Game
📷
Camera
🎵
Music
📺
YouTube
🌐
Browser
🎨
Drawing
📚
Education
Bank · Work Apps · Personal Notes → fully hidden
📞
💬
📷
🎮
👨‍👩‍👧
Mehmet Yılmaz
Freelance Accountant · Father of Two
Risk: Child Access SGBA: Parental Shield
His 8-year-old son wants the phone to play games. The phone has client data, banking app, tax documents.
Hands over the phone. The child opens it — sees only games and kid-friendly content. No banking app, no work files.
The child never even became aware of the hidden section's existence. Mehmet never had to offer any explanation.
Protection Provided
Child access to financial apps and data is blocked
The existence of the hidden section is never felt by the child
Parent behaves naturally, makes no explanation
Client data and personal communications are protected
Corporate panel · Knox MDM active
09:41●●● WiFi
💼
Corporate Zone
Knox MDM · AES-256 Encrypted
📊
Teams
📧
Outlook
🔒
VPN
📁
SharePnt
🔐
2FA
📋
Jira
IT control active · policies applied
💼
Elif Arslan
Senior Software Developer · BYOD Policy
Risk: Data Leak SGBA + Knox MDM Enterprise
Company BYOD policy requires corporate apps to be isolated from the personal space.
SGBA + Knox Workspace integration: corporate zone is completely separate, invisible and encrypted. IT policies apply only to this zone.
Personal space remains untouched. Company data isolated, employee privacy protected.
Protection Provided
Full isolation between work and personal data
Knox MDM supports corporate policies
IT department cannot access employee personal data
AES-256 encryption + biometric lock
Protest area · detention risk
09:41●●● LTE
✓ SGBA Active · Hidden Panel Locked
External access impossible
Current Status
Location HistoryHidden ✓
Messaging LogEncrypted ✓
ContactsProtected ✓
Brute ForceBlocked ✓
📞
Phone
📷
Camera
🗺️
Maps
⚙️
Settings
Kerem Demir
Human Rights Advocate · NGO Volunteer
Risk: Detention · Forced Access SGBA: Digital Protection
At the protest site. Phone contains organization members' contact info, meeting notes, documented evidence.
In case of detention, authorities are expected to attempt forced access to the phone.
SGBA + Knox encryption active. Zero feedback on failed attempts — the attacker cannot know what they are looking at.
All member data and organization info was protected. No one was exposed.
Protection Provided
Member identities and communication network remain hidden
Zero clues in forced decryption attempts
Location history and message logs are encrypted
Vector space protection against brute force attacks
Border crossing · customs inspection
09:41●●● WiFi
NOTIFICATIONS
✈️
Turkish Airlines
Istanbul → Berlin boarding started
9:38
🗺️
Google Maps
Airport terminal in 8 min.
9:35
💬
Messages
Mom: Have a great trip!
9:30
Work FilesHidden ✓
Corporate VPNProtected ✓
Customs ScanTemiz Appearance
🌍
Selin Öztürk
International Project Manager · Frequent Traveler
Risk: Border Control SGBA: Clean Appearance Travel
Making a transit through a high-risk country. Phone contains negotiation documents, partner communications, confidential project files.
Customs requests a phone inspection. In some countries device cloning is practiced.
Screen shows flight info, maps and family messages — completely innocent appearance. Corporate data invisible.
Phone was returned. Confidential project files could not be cloned, business partners protected.
Protection Provided
Corporate documents and work communications are hidden
Even if device is cloned at border, hidden zone is unreachable
Innocent appearance raises no suspicion
Business partners and partner identities are protected
127
Country Risk
%0
Data Leak
AES
Encryption