{"id":14806,"date":"2016-03-10T19:12:20","date_gmt":"2016-03-10T19:12:20","guid":{"rendered":"https:\/\/www.whizlabs.com\/?p=14806"},"modified":"2020-08-31T12:22:04","modified_gmt":"2020-08-31T12:22:04","slug":"data-privacy-in-the-age-of-the-apple-vs-fbi-debate","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/","title":{"rendered":"Data privacy in the age of the Apple vs FBI debate"},"content":{"rendered":"<p><span lang=\"EN-US\">With most of the technology world glued to the outcome of the tussle between Apple and FBI, \u201cdata privacy\u201d again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/#Our_mobile_world\" >Our mobile world:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/#What_really_happened\" >What really happened?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/#Apple_encryption\" >Apple encryption:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/#What_is_meant_encryption_and_decryption\" >What is meant encryption and decryption?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/data-privacy-in-the-age-of-the-apple-vs-fbi-debate\/#Bibliography\" >Bibliography<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Our_mobile_world\"><\/span><span lang=\"EN-US\">Our mobile world:<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Smart phones, tablets and other mobile devices continue to grow in popularity and we store abundant amount of personal information in it. Chats, pictures, personal data, health data are all examples of some personal information stored on mobile devices. Seizing any mobile device gives you new insights into an individual\u2019s digital and personal habits. <\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_really_happened\"><\/span><span lang=\"EN-US\">What really happened?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 On December 2, 2015, a terrorist attack in San Bernardino, California left 14 people dead while injuring 22 others. The attackers were also eventually killed. The iPhone of one of the attackers has been acquired by the FBI who would like to unlock it to gain access to the data. However, due to Apple\u2019s advanced security features (beginning with iOS 8), it is not easy to:<\/span><\/p>\n<ol>\n<li><span lang=\"EN-US\"> <\/span><span lang=\"EN-US\">unlock the -iPhone as a \u201cpasscode\u201d is needed and<\/span><\/li>\n<li><span lang=\"EN-US\"> <\/span><span lang=\"EN-US\">the entire data is \u201cencrypted\u201d <\/span><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Apple_encryption\"><\/span><span lang=\"EN-US\">Apple encryption:<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Since, hacking a person\u2019s mobile device is equivalent to gaining a passport to the person\u2019s identity itself, Apple beefed up its security features soon after the Snowden revelations. The iOS operating system is now known for enhanced system security, app security, network security features among other security features.\u00a0 It also has additional encryption and data protection standards, privacy controls and device controls.<\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u201cData protection\u201d standards of the iOS running devices, is making sure that encryption of all user data is enabled on all iOS devices. This means that all chats, pictures, contacts, mail, calendar and messages are encrypted on all iOS devices. <\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_meant_encryption_and_decryption\"><\/span><span lang=\"EN-US\">What is meant encryption and decryption?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span lang=\"EN-US\">\u00a0 <\/span><span lang=\"EN-US\">\u201cEncryption\u201d means converting the data into unreadable format commonly known as \u201cciphertext\u201d. This is done by using a \u201ckey\u201d. \u00a0\u201cDecryption\u201d is re-converting the \u201cciphertext\u201d or \u201cunreadable data\u201d into \u201creadable\u201d form by using the \u201ckey\u201d. <\/span><\/p>\n<p><a href=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2016\/03\/encrypt.gif\"><img decoding=\"async\" src=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2016\/03\/encrypt.gif\" alt=\"encrypt\" width=\"437\" height=\"229\" class=\"aligncenter size-full wp-image-14807\" \/><\/a><\/p>\n<p><span lang=\"EN-US\">\u201cSymmetric encryption\u201d is when the same key that is used to encrypt is used to decrypt as well.<\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"EN-US\">The encryption used in iOS devices is AES 256 encryption algorithm which is adopted by US and Canadian governments for effectively encrypting \u201cdata at rest\u201d and \u201cdata in transit\u201d.\u00a0 It is important to note that all the personal and professional data can be decrypted once the user unlocks a device. <\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Thus, Apple\u2019s encryption should not be taken lightly. \u201c<\/span><b><i><span lang=\"EN-US\">T<\/span><\/i><\/b><b><i><span lang=\"EN-US\">he algorithm is so strong that no computer imaginable for the foreseeable future\u2014even a quantum computer\u2014would be able to crack a truly random 256-bit AES key. The National Security Agency has approved AES-256 for storing top-secret data\u201d<\/span><\/i><\/b><i><span lang=\"EN-US\">\u00a0(MacRumors)<\/span><\/i><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Since the attacker\u2019s seized iPhone cannot be decrypted (as the \u201ckeys\u201d are not known), the only other way to the seized iPhone is to use \u201cbruteforce\u201d to crack the \u201cpasscode\u201d. \u201cBrute forcing\u201d a six character alphanumeric passcode could take as long as 5 1\/2 years!<\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Now coming to the present day, the US federal government thus needs to build a \u201cbackdoor\u201d to break into the attacker\u2019s iPhone which Apple firmly opposes. Creating a \u201cbackdoor\u201d essentially means that a new version of the operating system has to be created bypassing all security features and installed on the seized iPhone. This would enable the FBI to \u201cunlock\u201d the iPhone and attack its own encryption (!) to recover data present on the phone to gain clues to the terrorist attack. <\/span><\/p>\n<p><a href=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2016\/03\/apple.jpg\"><img decoding=\"async\" src=\"https:\/\/www.whizlabs.com\/wp-content\/uploads\/2016\/03\/apple.jpg\" alt=\"apple\" width=\"1024\" height=\"576\" class=\"aligncenter size-full wp-image-14808\" \/><\/a><\/p>\n<p><span lang=\"EN-US\">In the ensuing debate on \u201cdata privacy\u201d,\u00a0\u00a0 Apple contends that creating a \u201cbackdoor\u201d to the iPhone would set a dangerous precedent and other criminals would also hack their way into other Apple devices. Apple has been stating its stand to the US federal government on these points. Silicon Valley has come in support of Apple with companies such as Google, Facebook and Microsoft standing by it. <\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0The next hearing on the Apple vs FBI debate is slated to be March 22<sup>nd<\/sup>, in Riverside, California. \u00a0Stay tuned!<\/span><\/p>\n<p><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<h1><span class=\"ez-toc-section\" id=\"Bibliography\"><\/span><span lang=\"EN-US\">Bibliography<\/span><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><span lang=\"EN-US\"><i>MacRumors<\/i>. (n.d.). Retrieved from MacRumors: http:\/\/www.macrumors.com\/2012\/08\/13\/apples-unbreakable-ios-device-encryption-highlighted\/<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>*All images from Google<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With most of the technology world glued to the outcome of the tussle between Apple and FBI, \u201cdata privacy\u201d again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong. Our mobile world: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Smart phones, tablets and other mobile devices continue to grow in popularity and we store abundant amount of personal information in it. Chats, pictures, personal data, health data are all examples of some personal information stored on mobile devices. Seizing any [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17],"tags":[174,692,736,1441],"class_list":["post-14806","post","type-post","status-publish","format-standard","hentry","category-news-updates","tag-apple","tag-data-privacy","tag-encryption","tag-security"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"profile_24":false,"profile_48":false,"profile_96":false,"profile_150":false,"profile_300":false,"tptn_thumbnail":false,"web-stories-poster-portrait":false,"web-stories-publisher-logo":false,"web-stories-thumbnail":false},"uagb_author_info":{"display_name":"Pavan Gumaste","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/pavan\/"},"uagb_comment_info":0,"uagb_excerpt":"With most of the technology world glued to the outcome of the tussle between Apple and FBI, \u201cdata privacy\u201d again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong.&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/14806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=14806"}],"version-history":[{"count":1,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/14806\/revisions"}],"predecessor-version":[{"id":75864,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/14806\/revisions\/75864"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=14806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=14806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=14806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}