![]() |
ios 8 depends encryption mechanism automatically do with the system without providing a special key for decryption |
Since the advent of leaks former contractor with the US Agency for National Security Edward Snowden, technology companies are trying hard to distance itself from involvement in espionage operations on the users of its products, and for that I worked on the development of new ways to protect users data and encrypted, and increased user interest Safe Browsing similar programs "Tour" and VPN software "in me that."
And pay orientation technology companies such as Google and Yahoo about this that show views implementation of the US law At occasions Adh- concern of the new encryption systems, claiming they hinder the work in the inquiry and investigation, they prevent or make it difficult to access the users of modern technology data, which it considers necessary to prevent acts of "terrorism" and discover the facts.
The back of this anxiety evident in the statements made by the US Federal Bureau of Investigation, James Comey, who expressed in September / September last "deep concern" of security procedures that the two companies Apple and Google began to do to protect the privacy of users.
The cause of concern to the new security steps taken by these two companies, which where essays based on encryption does automatically in each of the two operating systems smart devices "Aye OS 8" and Android 5 "Don could provide private keys to decrypt their systems to encrypt, and thus become accessible to the existing user data apparatus impossible to law enforcement agencies, and even the developer of the system.
Android 5 uses a private key associated with each device separately (Associated Press)
Without key encryption
The Apple has announced on its inability to access the latest version of the "EOS" system users data, which prevents it from responding to requests for government data revealed, as Google has provided the copy of Android 5 encryption technology that uses a private key associated with each device.
And benefit technology companies from a variety of encryption to protect their data systems, but it is different for both versions of "any and S8" and Android 5, as the encryption keys used in these systems do not appear on the network servers, and each device has a unique his key, which remains inside, which prevents the manufacturer of access to the encryption key and decrypt the phone.
The encryption provided by Apple and Google on that constitutes an important advantage for law enforcement agencies threat must get rid of it, where the cross-Kumi about it, saying, "The encryption threatens all of our leadership to a dark place."
And get law enforcement agencies during investigations usually approvals from the courts to plant malicious software in the suspicious devices, allowing them to register transit words, but encryption systems that impede such operations.
Professor pointed at John Jay College of Criminal Justice in New York and Adam you to the difficulty of breaking new encryption systems used in both versions of operating systems, " IOS 8" Android and 5 compared to the previous two versions.
Although some argue the importance of enabling governments to access users' information because it would contribute to the protection of society, which described the terrorist attacks, others believe that it would be a violation of individual liberties may hurt, especially in third world countries political activists
Source: Portal Arab Technology News
Comments
Post a Comment