Story image

Why the Government needs to leave Apple and Google encryption alone

22 Feb 2016

 

The cat is already out of the bag with all of the advancements in encryption software. Even if Apple or Google were to make it possible for the government to unlock an iPhone or Android phone and read their encrypted communications, there are other encryption applications terrorists and criminals could use on most smartphones that Apple and Google could not help the government crack.

These would be independent encryption programs that are not dependent on a smartphone’s operating system. So in effect these represent encryption engines that live inside an application.

I think Open Whisper is one such encryption program. Snowden recommends using it.

Of course, these ‘operating system-independent encryption engines’ are expensive to build, and a clever hacker could likely find an exploit that enables him or her to ‘crack’ it, so this type of software would cost a lot of money to develop, maintain and keep secure. Nothing is perfect.

But it doesn’t make any sense to put so much pressure on Apple or Google when in the end, they don’t control all the keys to the kingdom, even for apps on their smartphones.

Article by Avivah Litan, Gartner analyst

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.