{"id":8892,"date":"2016-04-18T12:01:07","date_gmt":"2016-04-18T16:01:07","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=8892"},"modified":"2016-04-18T12:01:07","modified_gmt":"2016-04-18T16:01:07","slug":"spotty-android-encryption-is-the-story-behind-the-story-of-apples-battle-with-the-fbi","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2016\/04\/18\/spotty-android-encryption-is-the-story-behind-the-story-of-apples-battle-with-the-fbi\/","title":{"rendered":"Spotty Android encryption is the story behind the story of Apple\u2019s battle with the FBI"},"content":{"rendered":"<p>By <a href=\"http:\/\/www.pcworld.com\/author\/Jonathan-Keane\/\" rel=\"author\">Jonathan Keane<\/a> | <a href=\"http:\/\/www.pcworld.com\/article\/3056715\/android\/spotty-android-encryption-is-the-story-behind-the-story-of-apple-s-battle-with-the-fbi.html\" target=\"_blank\">PCWorld<\/a><\/p>\n<p>Savvy Android users know that Apple\u2019s face-to-face with the FBI is only the beginning of the phone-encryption furor. Google CEO Sundar Pichai <a href=\"https:\/\/twitter.com\/sundarpichai\/status\/700104298600886272\" target=\"_blank\">voiced his support<\/a> for Apple and for strong and safe encryption, but he didn\u2019t give specifics on how Google would deal with this situation if it were in Apple\u2019s shoes.<\/p>\n<p>That\u2019s because if Syed Rizwan Farook, the San Bernardino shooter, had been using an older Android smartphone, we probably wouldn\u2019t be having this discussion.<\/p>\n<p>Encryption has so far lost out to openness in the Android ecosystem. It&#8217;s actually been supported since version 4.0 (KitKat), and the latest iterations of Google\u2019s own Nexus devices have encryption on by default, but the rest of Android has been slower on the uptake, especially internationally.<\/p>\n<p>\u201cAndroid is different because the entire ecosystem is fragmented,\u201d explained Mike Murray, VP of security research at Lookout. \u201cThe version of Android that Samsung installs on their phone is different than the version that Google installs on their phone and it\u2019s way different than the third party aftermarket vendor who\u2019s building low-end phones in India or China.\u201d<\/p>\n<p>It\u2019s those smaller manufacturers making budget devices that have especially stymied Google. They fear that onboarding mandatory encryption will hamper their <a href=\"http:\/\/www.greenbot.com\/article\/2851676\/android-lollipops-default-encryption-devastates-storage-performance-tests-show.html\">phones\u2019 performance<\/a>\u2014for example, lower-end processors can struggle with the encrypt-and-decrypt process. But as standards for processors improve, there\u2019s little reason why encryption could not become the norm when you got a new smartphone.<\/p>\n<h2>So many Android phones, so little encryption<\/h2>\n<p>Google tried again, making encryption <a href=\"http:\/\/www.greenbot.com\/article\/2995438\/android\/google-makes-full-disk-encryption-and-secure-boot-mandatory-for-some-android-60-devices.html\" target=\"_blank\">mandatory across the board<\/a> late last year with Android 6.0 Marshmallow. But there\u2019s another flaw in this plan: <a href=\"http:\/\/developer.android.com\/about\/dashboards\/index.html\" target=\"_blank\">Only 4.6%<\/a> of the Android landscape is running Marshmallow (as of this writing), and the compulsory encryption rule applies only to new phones running 6.0, not older phones that have been upgraded (it\u2019s optional in that case). Once again, Android is a patchwork.<\/p>\n<p>On-by-default makes a huge difference in how a person uses a device or an app. Typically, people don\u2019t change the settings much unless they have something specific in mind. By having encryption off by default, a large number of users likely remain unencrypted and oblivious of their vulnerability.<\/p>\n<p>\u201cEvery company manufacturing devices that store sensitive data should be using full disk encryption by default,\u201d said Evan Greer, campaign director Fight for the Future, which staged <a href=\"http:\/\/www.macworld.com\/article\/3036930\/security\/apple-fans-take-to-the-streets-to-protest-the-fbis-request.html\" target=\"_blank\">rallies<\/a> in support of Apple. She added that corporations need to shoulder more of the responsibility in encrypting devices. \u201cWe need to build a movement to hold companies accountable and demand that they do everything technologically possible to protect our private information from hackers, and from illegal government surveillance.\u201d<\/p>\n<aside id=\"\" class=\"nativo-promo smartphone tablet desktop\"><\/aside>\n<p>Google\u2019s commitment to privacy is regularly challenged, whether it\u2019s in the company\u2019s expansive use of user data, or more specifically in a <a href=\"http:\/\/www.greenbot.com\/article\/3007812\/android\/manhattan-da-report-details-how-google-can-remotely-reset-most-android-passcodes.html\" target=\"_blank\">Manhattan DA report<\/a> that claimed Google could remotely access most Android phones.<\/p>\n<p>Android <a href=\"http:\/\/www.greenbot.com\/article\/2917852\/android-influencer-googles-adrian-ludwig-is-dedicated-to-making-android-as-safe-as-it-can-be.html\" target=\"_blank\">security boss<\/a> Adrian Ludwig <a href=\"https:\/\/plus.google.com\/+AdrianLudwig\/posts\/JFPXLnV3M2f\" target=\"_blank\">fired back<\/a>, saying Google cannot access any device protected with a PIN, password, or fingerprint. \u201cGoogle also does not have any mechanism to facilitate access to devices that have been encrypted,\u201d he said.<\/p>\n<h2>Shut the back door<\/h2>\n<p>But could Ludwig&#8217;s claim be put to the test sooner rather than later? We know the San Bernardino case was never about just one iPhone or Apple. As Fight for the Future\u2019s Greer reminds us, it\u2019s about the FBI\u2019s desire to set a \u201cdangerous precedent\u201d that would be felt for years to come. Enabling end-to-end encryption for all users is just one way of ensuring this doesn\u2019t happen.<\/p>\n<p>\u201cAssuming Android improves their security and become harder to hack, it\u2019s not a question of if the US or other governments will try to force them to weaken that security,\u201d said Greer. \u201cIt\u2019s a question of when.\u201d<\/p>\n<\/section>\n<p><em>For comprehensive coverage of the Android ecosystem, visit <a href=\"http:\/\/www.greenbot.com\/\" target=\"_blank\">Greenbot.com<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jonathan Keane | PCWorld Savvy Android users know that Apple\u2019s face-to-face with the FBI is only the beginning of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,10],"tags":[65,84,325,355,597],"class_list":["post-8892","post","type-post","status-publish","format-standard","hentry","category-security","category-technology","tag-android","tag-apple-2","tag-encryption","tag-fbi","tag-kitkat"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-2jq","jetpack-related-posts":[{"id":9516,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/02\/03\/to-the-woodshed-with-you-this-week-in-tech-704\/","url_meta":{"origin":8892,"position":0},"title":"To the Woodshed With You! &#8211; This Week in Tech 704","author":"NCCT","date":"February 3, 2019","format":false,"excerpt":"https:\/\/youtu.be\/14UX3TQ0K3Q FaceTime Flaw, Apple Spanks Facebook and Google, Huawei Suspicions, FBI Wants Your DNA, and more. \u2022 How to Watch the Superbowl Commercials Without All That Annoying Football \u2022 Apple's Not So Horrible Quarterly Earnings \u2022 Facetime Flaw Dulls Apple's Privacy Shine \u2022 Apple Spanks Facebook and Google for Data\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/14UX3TQ0K3Q\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9452,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/19\/internal-bug-discovery-security-now-693\/","url_meta":{"origin":8892,"position":1},"title":"Internal Bug Discovery &#8211; Security Now 693","author":"NCCT","date":"November 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ClVI9PMQGCY Australia vs Encryption, Google+ Bugs Hasten its Demise -- Australia's recently passed anti-encryption legislation -- Details of a couple more mega-breaches including a bit of Marriott follow-up -- A welcome call for legislation from Microsoft -- A new twist on online advertising click fraud -- The DHS is interested\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ClVI9PMQGCY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9385,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/07\/23\/this-week-in-tech-676-falling-asleep-as-the-robots-wake-up\/","url_meta":{"origin":8892,"position":2},"title":"This Week in Tech 676: Falling Asleep as the Robots Wake Up","author":"NCCT","date":"July 23, 2018","format":false,"excerpt":"https:\/\/youtu.be\/uV5cQYtuJjU This Week in Tech - The future is flying cars! (Or not-flying cars, perhaps holes in the ground.) - Apple's new MacBooks suffering from thermal throttling - is it the end for Intel? - Google hit with $5 billion fine by EU for Android shenanigans. - Will Fuschia be\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/uV5cQYtuJjU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9812,"url":"https:\/\/nccomputertech.com\/techtalk\/2024\/11\/08\/slow-and-steady-m4-macbook-pro-apple-q424-pixelmator\/","url_meta":{"origin":8892,"position":3},"title":"Slow and Steady &#8211; M4 MacBook Pro, Apple Q424, Pixelmator","author":"NCCT","date":"November 8, 2024","format":false,"excerpt":"https:\/\/youtu.be\/etW5-oInyGA As expected following the end of last week's MacBreak Weekly, Apple announced the new M4, M4 Pro, and M4 Max MacBook Pros. Jason recaps the results of Apple's Q424. And Apple acquires Pixelmator. \u2022 Early Apple M4 Pro and M4 Max benchmarks hint at a massive performance boost. \u2022\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/etW5-oInyGA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9397,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/09\/02\/i-speak-for-the-bezels-this-week-in-tech-682\/","url_meta":{"origin":8892,"position":4},"title":"I Speak for the Bezels &#8211; This Week in Tech 682","author":"NCCT","date":"September 2, 2018","format":false,"excerpt":"https:\/\/youtu.be\/kVcihaMWLmA This Week in Tech iPhone XS, Pixel 3, Trump vs Google, and more Leo is on vacation, so Jason Snell is guest hosting! Apple's next big event is September 12th, and we have a sneak peek at the new iPhone XS and Apple Watch Series 4. The iPhone XS\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/kVcihaMWLmA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9511,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/01\/22\/millsplain-it-to-me-this-week-in-tech-702\/","url_meta":{"origin":8892,"position":5},"title":"Millsplain It to Me &#8211; This Week in Tech 702","author":"NCCT","date":"January 22, 2019","format":false,"excerpt":"https:\/\/youtu.be\/EtTfFJVBZ6s -Apple's Tim Cook Calls for Data Privacy. -773M Passwords Pwned - How to Find Out If Yours Was. -Amazon Tries to Make Alexa Sound \"Newsy.\" -Google Buys Fossil. -74% of Facebook Users are Clueless. -Facebook's 10 Year Challenge. -Atari Founder Making Alexa Board Games. -Stop Using Windows Phone! -Tokyo\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/EtTfFJVBZ6s\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/8892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=8892"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/8892\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=8892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=8892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=8892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}