Whichever view you hold, the truth is, if you’re concerned about intelligence agencies (let’s call them I.A.) listening in on your conversations, you’re out of luck. Here’s a few reasons why:
- Apple only encrypts data on your device directly. Phone calls, text messages, internet data packets all cross the carrier’s network and are weakly encrypted. Your carrier is also legally required to provide this data to law enforcement and I.A.
- If this I.A. can communicate with your device directly (via Wi-FI, SMS, man-in-the-middle of the radio link, access to the USB port, or spearphishing via a well made email and more) they might be able to use a zero day exploit to gain code execution ability on your phone and bypass encryption by reading the cleartext out of RAM while the phone is unlocked.
- Often, the contents of text messages and calls are not even necessary. If the law enforcement or an I.A. need to locate you, they can use the existing e911 GPS location or triangulation of your position via cell phone towers.
These are just a few ways an interested third party may gain access to your information. Andrew Zonenberg put together an in-depth article for those interested in a more through examination of Apple’s encryption and its possible breaking.
About the author
Apple has issued an emergency patch after admitting to a major security flaw that enabled anyone to...Read more arrow_forward
A new study by Google has revealed insights to better explain how emails and other accounts are...Read more arrow_forward
Moscow-based cybersecurity firm Kaspersky Labs has denied a Wall Street Journal report that alleges...Read more arrow_forward