All Apple news

Why Apple can’t access your data on iPhone

Various governments require Apple to provide law enforcement the ability to decrypt the information on iPhone in case the device owner is suspected of crime. The company not only wants to provide similar access, but can’t do that for devices that are running iOS 8 or later OS versions. Apple has protected user data according to the principle of end-to-end, and the encryption algorithm so complex that it cannot be hacked.

In October last year, an expert on cryptography and a University Professor Matthew green explained that since the commissioning of the A7 chip, Apple has implemented an additional layer of protection iPhone through the implementation of unique unit of the processor called the Secure Enclave. In it separate from the rest of the system is stored in protected user profiles and passwords. The Secure Enclave is quite a large block of SRAM with a capacity of about 3 MB.

Enclave uses the local information from the device in combination with a password to make hacking impossible. Beginning with iOS 9, Apple has improved the security password by going to the six-digit combination is used before the four-digit codes. This ensures that an attacker will not be able to hack the device, even if you would have physical access for many months.

Each chip’s Secure Enclave that is included with the Ax series processors, is unique and guarantees safety from remote attacks. In addition, Apple encrypts application data for communications such as iMessage and FaceTime.

There is one thing that you can’t understand the government: the creation of bendora the iPhone is not the way Apple. Even though this practice may be useful for law enforcement and eventually save someone’s life.

Read also:   Ukrainian member of Parliament after the "exposure" Apple Watch Edition sells 10 times cheaper than their cost

The fact that someone has access to your encrypted information will provoke hackers to search for vulnerabilities. Given that this feature will be included into the software, any trained user will eventually be able to find a “loophole”. So there is no way to make the “white” list of users with the appropriate rights. Either this feature is available to all, or to anybody without exception.

Leave a Reply

Your email address will not be published. Required fields are marked *