Skip to main content

Why do you hate government agencies Android Aa.o.as 5 and 8?


ios 8 depends encryption mechanism automatically do with the system without providing a special key for decryption
ios 8 depends encryption mechanism automatically do with the system without providing a special key for decryption
Since the advent of leaks former contractor with the US Agency for National Security Edward Snowden, technology companies are trying hard to distance itself from involvement in espionage operations on the users of its products, and for that I worked on the development of new ways to protect users data and encrypted, and increased user interest Safe Browsing similar programs "Tour" and VPN software "in me that."

And pay orientation technology companies such as Google and Yahoo about this that show views implementation of the US law At occasions Adh- concern of the new encryption systems, claiming they hinder the work in the inquiry and investigation, they prevent or make it difficult to access the users of modern technology data, which it considers necessary to prevent acts of "terrorism" and discover the facts.

The back of this anxiety evident in the statements made by the US Federal Bureau of Investigation, James Comey, who expressed in September / September last "deep concern" of security procedures that the two companies Apple and Google began to do to protect the privacy of users.

The cause of concern to the new security steps taken by these two companies, which where essays based on encryption does automatically in each of the two operating systems smart devices "Aye OS 8" and Android 5 "Don could provide private keys to decrypt their systems to encrypt, and thus become accessible to the existing user data apparatus impossible to law enforcement agencies, and even the developer of the system.

Android 5 uses a private key associated with each device separately (Associated Press)
Without key encryption
The Apple has announced on its inability to access the latest version of the "EOS" system users data, which prevents it from responding to requests for government data revealed, as Google has provided the copy of Android 5 encryption technology that uses a private key associated with each device.

And benefit technology companies from a variety of encryption to protect their data systems, but it is different for both versions of "any and S8" and Android 5, as the encryption keys used in these systems do not appear on the network servers, and each device has a unique his key, which remains inside, which prevents the manufacturer of access to the encryption key and decrypt the phone.

The encryption provided by Apple and Google on that constitutes an important advantage for law enforcement agencies threat must get rid of it, where the cross-Kumi about it, saying, "The encryption threatens all of our leadership to a dark place."

And get law enforcement agencies during investigations usually approvals from the courts to plant malicious software in the suspicious devices, allowing them to register transit words, but encryption systems that impede such operations.

Professor pointed at John Jay College of Criminal Justice in New York and Adam you to the difficulty of breaking new encryption systems used in both versions of operating systems, " IOS 8" Android and 5 compared to the previous two versions.

Although some argue the importance of enabling governments to access users' information because it would contribute to the protection of society, which described the terrorist attacks, others believe that it would be a violation of individual liberties may hurt, especially in third world countries political activists
Source: Portal Arab Technology News

Comments

Popular posts from this blog

Nokia reportedly plans a return to smartphones in 2016

Nokia is planning to make a comeback and return to making phones in 2016. That's according to personnel familiar with company plans, who reveal that releasing Android tablets under the brand simply isn't enough. Nokia reportedly plans a return to smartphones in 2016  Nokia reportedly plans a return to smartphones in 2016  With the introduction of the Nokia 2016 has become a company with freedom, where officially ended item that was part of Microsoft's takeover deal, which prevents the company from the competition in the mobile phone market and the issuance of phones under the brand Nokia the day before 12.31.2015. Nokia reportedly plans a return to smartphones in 2016  On the ground for the return of Nokia phones market was waiting and leaks that began to appear in the days abound and the days to come naturally to one of the most prestigious companies in the mobile industry. Nokia reportedly plans a return to smartphones in 2016  Today featur...

The best types of domestic cats

There are a lot of people are taking pet breeding hobby to them, and enjoy spending their leisure time with these animals that way that makes this Anisa them in their unity animals, but sometimes they consider a close friend to them, and the best pet animals raised at home, are cats, Cats are the most common among people household pets, because it has its own form attractive and wonderful show great qualities such as intimacy, tranquility and loyalty to the educators, they also give the home cheery and nice atmosphere for her love of fondling, and here we have put to you a list of the best domestic cats . The best types of domestic cats : Angora Turkish :  The best types of domestic cats  of Turkish origin, has a special dense fur around the neck and chest, and light his coat from the bottom, the head medium-sized, and he has big ears, eyes almond-shaped can be blue or orange or green, and possible to be appointed, including a blue second eye oran...

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria.

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. These victims do not realize they are infected currently  Char that "the editing process" is the most successful of the last century between the operations carried out by the Digital Crimes Unit at Microsoft so far depending on the number of infected machines that could be identified.  Microsoft has identified personal devices infected by intercepting communication with hardware servers in the company, "Vitaloerks" Web Solutions, based in Reno, Nevada.  Vitaloerks criticized the way in which Microsoft has d...