iOS 9, Android M Place New Focus On Security, Privacy - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Life
Commentary
6/24/2015
08:05 AM
Pablo Valerio
Pablo Valerio
Commentary
Connect Directly
Twitter
RSS
100%
0%

iOS 9, Android M Place New Focus On Security, Privacy

Google and Apple have publicly challenged calls from law enforcement agencies to weaken encryption on consumer devices. In turn, iOS 9 and Android M will sport a string of new security and privacy features for users.

8 Ways MDM Can Ease IT Pain
8 Ways MDM Can Ease IT Pain
(Click image for larger view and slideshow.)

I've been using an Android smartphone for the past four years. Since the beginning I have been troubled by the number of permissions many apps require before being installed, and by the almost impossible task of disabling those permissions.

If you want an app such as Twitter to be installed on your Android device, you need to accept a bundle of permissions that include: Identity, contacts, location, SMS, photos/media/files, camera, microphone, WiFi Connection, device ID, and call information. This is just to be able to tweet and read your Twitter feed. The only permission you can actually block on Android now is access to your location, which will have to be disabled for all apps at the same time.

Permissions for Apple iOS devices are no different. While Apple allows users to block apps accessing your contacts and location information, the rest of the permissions apply.

(Image: James Anderson/iStockphoto)

(Image: James Anderson/iStockphoto)

If you have the possibility to root your smartphone and install a different Android OS, such as the one from Cyanogenmod -- I use it on my Sony Xperia phone -- then you can enjoy more control of the privacy settings and disable any permission by app.

Basically there are three permissions that app developers are reluctant to part with: Contacts, browsing history, and location information. This information is the Holy Grail for targeting advertisements.

That is why another permission is becoming omnipresent: WiFi connection info. Since many users are turning off location sharing in order to protect their privacy, app developers have found a way to zero in on the location of the device by looking at WiFi data and matching it with that of other users. The WiFi routers your phone sees during normal operation can be mapped to physical locations with great precision. Out of thousands that you may pass every day just a few are necessary to reconstruct most of your mobility.

The only way to avoid it is to turn off WiFi altogether.

Apple and Google have been heavily criticized for not giving users more control. Meanwhile, corporations are investing billions in Mobile Device Management (MDM) software from companies such as AirWatch, Samsung, and Blackberry in order to block access to sensitive data on mobile devices.

Emphasis On Privacy

However, this dynamic is starting to change. Recently, Apple and Google, during their respective developers conferences, announced new versions of their mobile platforms that will give users more control of the information that apps can mine on the devices. That ability will increase encryption and security.

The next version of Android, codenamed M, will allow users to install apps without agreeing to permissions first. Then they will be able to authorize the app to access some information, such as location, on a one-time or permanent basis. It will also enable hardware developers to start using biometric identification such as fingerprints as part of the Android security settings.

[Read about what you missed at Apple's WWDC.]

Apple's iOS 9 will increase security PINs from four to six digits, making it 100 times harder to break by brute force. Both companies want users to get more comfortable with two-factor verification for certain services, something that Google has been offering for some time now.

But one of the most significant changes to iOS 9 is its new "App Transport Security," which helps app developers use the HTTPS to encrypt Internet traffic. Most apps today are sending and receiving Internet data without any encryption.

Android M and iOS 9 will offer encryption by default, something that law-enforcement agencies have been aggressively fighting. But the two companies have publicly challenged the requirement to give US agencies backdoors out of desires to genuinely increase users' security and to protect their businesses in other countries. 

Pablo Valerio has been in the IT industry for 25+ years, mostly working for American companies in Europe. Over the years he has developed channels, established operations, and served as European general manager for several companies. While primarily based in Spain, he has ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Commentary
New Storage Trends Promise to Help Enterprises Handle a Data Avalanche
John Edwards, Technology Journalist & Author,  4/1/2021
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
Commentary
How to Submit a Column to InformationWeek
InformationWeek Staff 4/9/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll