iPhone Encryption: 5 Ways It's Changed Over Time - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile
News
2/25/2016
07:06 AM
Dawn Kawamoto
Dawn Kawamoto
Slideshows

iPhone Encryption: 5 Ways It's Changed Over Time

Apple's battle with the FBI has put iPhone encryption in the spotlight. However, some might be surprised that the company's encryption efforts have evolved slowly and are not that different from those of other smartphone makers. Here's a look at the 5 phases of the process so far.
1 of 8

(Image: ymgerman/iStockphoto)

(Image: ymgerman/iStockphoto)

1 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
growson
50%
50%
growson,
User Rank: Apprentice
2/26/2016 | 11:44:41 AM
Re: iphone passcode
Withoiut getting into a whole mathematical background on encryption, the big difference:

 

The contents of the filing cabinet are SCRAMBLED and (for all intents and purposes) melted into the filing cabinet themselves (as in, there's no separate pages of documents to "print out").

 

And the crux:  Apple does NOT HAVE THE KEY to unlock this!

 

 
dwhitney306
50%
50%
dwhitney306,
User Rank: Apprentice
2/26/2016 | 9:19:00 AM
Re: iphone passcode
The purpose of encryption to begin with should be protected.  As a consumer, I would not want anyone to infringe upon my personal data and have a right to the protection against ANYONE including the Big Brother FBI.  All Apple has to do is say they can't be sure there is a method of writing code to break the encryption.  Nuf said. 
DR WILL
50%
50%
DR WILL,
User Rank: Apprentice
2/25/2016 | 3:48:32 PM
iphone passcode
How is private information lockd in a file cabinet different from private information locked in an iphone? In the past courts could order search warrants to access that info, and still do today.  Why can't Apple print out the info without revealing the code and hand the info over to the FBI?
Slideshows
10 Top Cloud Computing Startups
Cynthia Harvey, Freelance Journalist, InformationWeek,  8/3/2020
Commentary
How Enterprises Can Adopt Video Game Cloud Strategy
Joao-Pierre S. Ruth, Senior Writer,  7/28/2020
Commentary
Conversational AI Comes of Age
Guest Commentary, Guest Commentary,  8/7/2020
White Papers
Register for InformationWeek Newsletters
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Video
Current Issue
Special Report: Why Performance Testing is Crucial Today
This special report will help enterprises determine what they should expect from performance testing solutions and how to put them to work most efficiently. Get it today!
Slideshows
Flash Poll