FBI Once Again Asks Apple To Unlock Encrypted iPhones - Tom's Hardware
FBI Once Again Asks Apple To Unlock Encrypted iPhones - Tom's Hardware |
| FBI Once Again Asks Apple To Unlock Encrypted iPhones - Tom's Hardware Posted: 08 Jan 2020 12:00 AM PST ![]()
This confrontation could turn into a new test case in which either Apple will have to unlock the devices or the FBI will have to retreat once again, as it did in two previous cases. In the San Bernardino case, the agency was forced to admit that it had other ways to unlock the devices, and the judge sided with Apple in a New York case. The FBI has confirmed the existence of the new letter to Apple. The agency had checked internally and with other intelligence agencies to see if there was a way to unlock the device without Apple's help, but the response came back negative, according to someone familiar with the investigation. Apple's previous argument against the FBI's criticism was that it can give the FBI "all the data in its possession" (meaning any messages and files that were backed up to iCloud, or related services metadata, as those don't use end-to-end encryption), but only the owner of the device can decrypt the local phone's data. As Alshamrani is now dead, that most likely means that nobody will be able to unlock the data. The FBI now claims it doesn't want an encryption backdoor (at least for now), but instead simply wants Apple to open the devices for the agency, according to the NYT report. However, Apple has also said the only way to unlock a device's data is to put all iOS devices at risk by creating a compromised version of its operating system. The company recently renewed its pitch to protect user privacy to the best of its ability. The company has been working on end-to-end encrypted cloud backups for a couple of years now, too, but so far it has kept that technology unused. It's not clear if that's so it doesn't draw more criticism from the U.S. or other governments. Attorney General William P. Barr recently attacked Facebook's efforts to switch Facebook and Instagram chat services to WhatsApp's end-to-end encryption, so Apple may want to avoid similar attacks for now. So far, Facebook has ignored the government's threats, and is said to be moving ahead with its encryption plans. |
| How to protect your smartphone from hackers and intruders - Digital Trends Posted: 18 Jun 2019 12:17 PM PDT Having your smartphone hacked kind of feels like someone robbed your house — or maybe even worse. It's a massive invasion of privacy, a violation of your personal space, and it may take a while to figure out what is missing. Your smartphone doesn't just hold your valuables; it signals to intruders which of your valuables are the most important to you. If something is on the phone you always have with you, then by definition, it rates. Smartphones are small devices that can easily get lost or stolen, and they are constantly online sending and receiving signals, so they are always a target for criminals. To keep your phone and its contents away from prying eyes and sticky fingers, you need to develop a strategy for protecting your valuable information. Here are some tips on how to protect your smartphone from hackers and intruders. Update your OS and appsSoftware companies are constantly updating software, and not only for cosmetic reasons. Many software updates and bug fixes contain security improvements that help guard your smartphone against data breaches and intrusions, and close off vulnerabilities, making it harder for hackers to break through. When an update is announced for your smartphone's operating system or for any of the apps you use, install it without delay. Avoid public Wi-FiBy now, everyone should know about the dangers of using open Wi-Fi for anything, because free public Wi-Fi in shopping centers, cafes, airports, or any other public venue, is open season for all kinds of online mischief. Try to use only your private cell connection whenever possible and switch off Wi-Fi on your mobile phone altogether whenever you are in a public place. If that is not possible, consider using a VPN app, a utility that tunnels network communications through an encrypted connection. But choose carefully — not all VPNs are equal in quality. Also consider disabling Bluetooth while you're out and about unless you are wearing a smartwatch that requires it. Lock your smartphoneAlways engage a four or six-digit passcode to enter your device. Passcodes may not be super convenient, but peace of mind dictates that if your smartphone falls out of your pocket while you're trying out new sofas at Ikea, the first person who picks it up should not be able to get your life story from your email, contacts, photos, and banking information. Consider setting an even longer passcode with both numbers and letters. Not a big passcode fan? No worries. Fingerprint scanning and Face ID are easy, fast alternatives to punching in numbers. While you're at it, make sure apps with personal information are also locked behind passwords. Keep your mobile phone number privateJust like you wouldn't give out your old landline phone number to anyone who asked for it, don't automatically offer your mobile number to any app that prompts you. The more places that have your number, the more vulnerable you are to SMS intrusions and scams, and even invasion of your protected 2FA accounts. Consider adding a second line to your mobile phone. Google Voice is an excellent way to shield your phone number from online miscreants, as are apps like Sideline, Line2, and Hushed, which facilitate adding a second line to your mobile phone. Don't overshare on social media![]() While it's fine to use your real name on social media outlets like Facebook and Twitter, avoid sharing a ton of revealing information about yourself on social networks. Avoid listing home towns, specific addresses, specific work locations, phone numbers, family names, and other details hackers can use to track you. These days, Facebook lets you conceal the vast portion of information about yourself with its privacy settings and tools, including most photos, friend lists, and more. Curate and streamline your feed to get rid of old, outdated information that may reveal more about you than you'd like. Better still, use Facebook on your home computer, as opposed to accessing it on your phone, if you can. Travel lightDon't store personal information, documents, or files on your phone, and limit the number of geotagged photos in your Camera Roll. Make a habit of keeping your phone relatively pristine by offloading images and documents to your computer, and eliminating confidential emails from financial, employer, and health-related accounts. Use two-factor authenticationHere's another obnoxious security measure that most people can't stand. Two-factor authentication (2FA) is hated because it requires an extra step, and it's really a pain if you forget to have your phone or watch nearby. But like passwords, it serves a purpose by providing an extra layer of protection in case someone gets ahold of your password. Use strong passwords![]() Everyone hates passwords. But when it comes to assigning them, don't take half measures. Use only strong passwords that are not easily cracked by hackers. They should contain 16-20 characters with a mix of letters and numbers, upper and lowercase letters, and symbols. Brute force password crackers will still dismantle many strong passwords, but making it easy for hackers by using your birthday, your pet's name, or the same password for everything is a truly terrible idea. There are plenty of secure password generators online, so you don't have to think them up for yourself. Change your passwords every six months to a year, or as soon as you hear about a data breach of any program you use. Oh, and a word about security questions: Lie. Do not answer security questions honestly, and change your answers for different setups. You can use a password style answer for such questions — comprised of letters and numbers — instead of your first pet's name, for example. This makes it harder for hackers to figure out how to break into your phone based on public information about you online. Beware of spam and phishing emailsOne of the easiest ways for hackers to invade your phone and access your information is through your email inbox. Phishing scams are designed to trick you into handing over access to your accounts. Avoid clicking on links in promotional emails, opening suspicious attachments, or running app updates prompted through email. Do not try to access financial accounts through random emails, but instead, go directly to the financial institution website and sign in with a proper username and password. Use built-in device protectionsThey're not called "smartphones" for nothing. If your phone gets lost or stolen, you can contain the damage using device tracking services, such as Find My iPhone and Android's Find My Device, that can locate your missing phone on a map and, in some cases, automatically erase it. These services can also make your phone ring to help you locate a device you have temporarily misplaced. You can also arrange for the phone to delete all information after a set number of incorrect passcode tries. Use an antivirus appHackers favor malware to steal passwords and account information. But you can combat that with a smartphone antivirus app — some of which are offshoots of popular desktop apps like Avast, McAfee, and Panda. The smartphone app variations provide enhanced security by ensuring apps, PDFs, images, and other files you download aren't infected with malware before you open them. Manage app permissionsCheck the apps on your phone to determine whether they have more privileges than they need. You can grant or deny permissions like access to the camera, microphone, your contacts, or your location. Keep track of which permissions you gave to your apps, and revoke permissions that are not needed. For iPhones, go to Settings > Privacy, where you'll see a list of all apps and the permissions you've granted to them. The exact path to app permissions on an Android device depends on the device, but on a Google Pixel you'll find them in Settings > Apps & notifications > Advanced > Permission manager or on a Samsung Galaxy look in Settings > Apps > App permissions (via the three vertical dots at the top right). Back upOne thing you need to be vigilant about is being prepared for the worst by making sure your phone is backed up to protect critical documents and images in case your phone is lost or stolen. We have a guide on how to back up your Android smartphone and also how to back up your iPhone. At least that way, if your phone is lost or wiped, you can still access those precious photos or files. If your iPhone is backed up, you can program it to automatically wipe after 10 consecutive unsuccessful passcode tries. Know where your apps come fromDon't just download any old app to your phone. While your choice of iPhone apps is limited to Apple's App Store, which vets all apps sold on the platform, it is easy to sideload apps on Android, which simply means downloading and installing them from a source other than the Google Play Store. However, you do have to dig into the settings and allow it. The best way to avoid malware on Android is to stick with the selections available from the Google Play Store, which are vetted by Google. Never download apps via text message, as that is an infamous method hackers use to inject malware directly into your phone. Steer clear of public chargersOnly charge your phone on trusted USB ports like your computer and in your car. Criminals can hack public USB charging ports, like the ones you'd encounter in a coffee shop or airport, to steal personal information. Bring your outlet adapter along in addition to your USB cable if you're traveling. Hackers can't access your phone data through your USB adapter. Don't jailbreakWhile jailbreaking lets iPhone owners access apps and software not available in Apple's App Store (a real no-no in Apple Land), it also exposes your phone to viruses and malware. A jailbroken phone that malfunctions will get you no sympathy from Apple — it will, however, void your warranty, and Apple personnel will probably not assist you if something bad happens. Bottom lineIf you take positive steps to protect your smartphone from hackers and intruders, you should feel confident you've done everything possible to shield your critical information. This makes it much less likely that thieves will be able to steal your identity, delve into your personal life, siphon off your money, control your phone, and generally make your life miserable. Editors' Recommendations |
| You are subscribed to email updates from "phone encryption iphone,zenfone 2 encryption,how does iphone encryption work" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States | |













Comments
Post a Comment