Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

When a person, who doesn’t have access to a device, tries to get into the device through one of the options, whether it be code, pattern, or biometric access, they are repelled. Without entering the credentials or biometric data that allows for a device to open, it will remain closed to the user. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

Apple
The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that has the incorrect access controls entered repeatedly will lock, stopping unwanted parties from getting into your iPhone.

Android
Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fair share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for the user’s benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Business Innovation Network Security Cloud Hardware IT Support Internet User Tips Malware Phishing Email Efficiency Computer Privacy Google Workplace Tips Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Smartphones Mobile Device Mobile Devices communications Android Workplace Strategy Saving Money Business Management Smartphone VoIP Managed IT Services Data Recovery Microsoft Office Managed Service Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Artificial Intelligence Automation Covid-19 Remote Cloud Computing Server Remote Work Managed Service Provider Windows Facebook Miscellaneous Encryption Gadgets Spam Outsourced IT Information Employee/Employer Relationship Holiday Windows 10 Government Business Continuity Data Management Wi-Fi Productivity Blockchain Windows 10 Business Technology Apps Compliance Two-factor Authentication Data Security Bandwidth Virtualization Current Events Employer-Employee Relationship Networking Office Mobile Device Management Chrome Vendor Budget Gmail Apple Managed Services Voice over Internet Protocol App Conferencing Computing Information Technology Hacker How To BDR Avoiding Downtime Mobile Office Office 365 Applications Access Control Retail Operating System Computers Risk Management Managed IT Services AI Website Marketing Analytics Office Tips HIPAA Router Augmented Reality BYOD Storage Password Virtual Private Network Training Bring Your Own Device Health WiFi Help Desk Big Data Healthcare Going Green Document Management Telephone Free Resource Cybercrime Project Management Customer Service Scam Windows 7 Data loss Cooperation Microsoft 365 Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability IT Support Vendor Management Windows 11 Firewall Display Excel Printer Paperless Office The Internet of Things Monitoring Infrastructure Remote Workers Social Tip of the week iPhone Managed IT Service Settings Data Privacy Printing Downloads Customer Relationship Management Wireless Vulnerabilities Maintenance Content Filtering Antivirus Licensing YouTube Images 101 Hacking Entertainment Presentation Multi-Factor Authentication Mobility Cryptocurrency Wireless Technology Virtual Desktop Telephone System Cost Management Data storage LiFi Robot Employees Integration Outlook Word Money Humor IT Management Meetings Holidays 2FA VPN Modem User Tip Supply Chain Processor Data Storage Mobile Security Sports Mouse Safety Computer Repair Video Conferencing Managed Services Provider Virtual Machines Professional Services Smart Technology Administration Saving Time Machine Learning IBM Writing Smartwatch IT Human Resources Lenovo Identity Smart Tech Azure Virtual Reality Cortana Bookmark Procurement Cables Telework Download Cyber security Server Management Alerts Tech Alt Codes Private Cloud Identity Theft Downtime CES Communitications Google Apps Superfish Connectivity Break Fix Hosted Solution Twitter Browsers Supply Chain Management IT Maintenance Competition FinTech Business Intelligence Upload Term Typing Error Multi-Factor Security Social Engineering Social Network IT Assessment Shortcuts IoT Value Google Drive Dark Web Remote Computing Knowledge Flexibility Ransmoware Organization Vendors Trends Tablet Google Calendar Digital Security Cameras User 5G Customer Resource management Smart Devices Be Proactive Regulations Star Wars Memory Google Docs Microsoft Excel Unified Communications Alert Experience Data Analysis Remote Working Workforce Running Cable Dark Data Threats Gamification Data Breach Managed IT Staff Google Play Bitcoin File Sharing Google Wallet Legislation IP Address How To Videos Electronic Health Records Workplace Strategies Social Networking Wasting Time Notifications Fileless Malware Meta Laptop Amazon Content Trend Micro Wearable Technology Security Cameras Windows 8 Travel Drones Google Maps Comparison Recovery Health IT Software as a Service Techology Motherboard Directions Outsource IT Assessment Managing Costs Permissions Hard Drives Domains Halloween Environment eCommerce Media SSID Unified Threat Management Unified Threat Management Virtual Assistant Specifications Surveillance Microchip Small Businesses Internet Exlporer Virtual Machine Fraud Refrigeration Hacks Public Speaking Scary Stories Network Congestion Reviews Displays Username Medical IT User Error Transportation Black Friday Lithium-ion battery Physical Security Fun Development Outsourcing Entrepreneur Database Hypervisor Deep Learning Point of Sale Shopping Optimization IT Technicians PowerPoint Cookies Employer/Employee Relationships Cyber Monday Education Proxy Server Workplace Undo PCI DSS Hiring/Firing Tactics Network Management Hotspot Navigation Tech Support Mobile Computing Monitors Gig Economy Paperless Mirgation Nanotechnology Teamwork Search Internet Service Provider Co-managed IT Regulations Compliance Technology Care Addiction Language Evernote Best Practice Websites Buisness Management Memes Business Communications Chatbots SharePoint Screen Reader SQL Server Legal Distributed Denial of Service IT solutions Electronic Medical Records Application Net Neutrality Scams Financial Data Hybrid Work Service Level Agreement History Computing Infrastructure Business Growth

Blog Archive