The WTF Series: Encryption and Apple’s predicament

March 21, 2016  |  Ben Kittrell

Apple encryption

For those of you who have been living under a rock the last month, there’s a “little” snafu going on between Apple and the FBI. The FBI handed Apple a court order demanding access to the password-protected iPhone of a mass shooter.

Ben Kittrell

Ben Kittrell

In an open letter to customers, Apple CEO Tim Cook explained that the company had and would continue to deny the order. It would require Apple to build a backdoor into the iPhone’s encryption, compromising the security of all iPhones, he said.

“The implications of the government’s demands are chilling,” Cook wrote. “If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data.”

So, what is encryption anyway?

All of your data is stored on a hard drive somewhere. Without encryption, a hacker could bypass your passcode to see anything stored on your phone, such as photos, location history, credit card information and emails.

Encryption basically jumbles up your data so that it’s unreadable to anyone with direct access to it. Even if someone physically pulled out your phone’s hard drive, the data would be useless without a special key that only you own — in the iPhone’s case, your password. This key is used to jumble up the data, so it’s the only way to make it readable again.

In iOS 8, the software that runs the iPhone, Apple decided to encrypt your data automatically. Without your passcode, even Apple can’t access your data.

Is encryption safe?

For more from a security expert, I spoke with my friend Chris Cooley, director of business development for SpiderOak. The Kansas City-based tech firm uses encryption to provide secure backup and communication tools. I asked Cooley his opinion on whether encryption really works. His response? Sometimes.

“It’s important to know that the strength of encryption depends a great deal on how it is applied,” Cooley said. “It’s not a simple yes or no check box.”

Encryption technology is as secure as it gets. But most hackers don’t look for flaws in tech; they look for flaws in humans.

“We’ve all seen the images of little Johnny using his secret decoder ring to turn random letters into a secret message,” Cooley continued. “In the digital age, much of the encryption happens server-side, meaning that that decoder ring (the key) is on the server.  As you can imagine, a coded message in the same box as the decoder ring is less than ideal.”

“Some companies use a single set of keys, just one decoder ring, for all encryption,” he added. “If it gets copied or stolen, everyone now has a problem. Other organizations will create a new decoder ring for each user.”

Encryption is safe, as long as your keys are managed properly.  As Cooley says, “A military-grade front door is near worthless if you’re just leaving the key under the front mat.”

Where else is encryption used?

We all know that you shouldn’t enter private information on a website unless you see the secure “lock” icon in the address bar, right? Right?! That lock means that all of the information that travels from your computer to the website is encrypted, and no one can read it along the way.

This technology is called Secure Socket Layers or SSL and is becoming a standard for all websites, even if you’re not collecting credit card data. Without it, anyone at the coffee shop could hijack your Facebook login and take those quizzes for you.

Encryption is increasingly incorporated into almost every electronic device that stores valuable personal information. Apple isn’t just fighting for the security of one iPhone, or even for the security of all its iPhones. It’s fighting to prevent a legal precedent of government requiring a backdoor to every device you own. And if you think that’s scary for the government to have control of, imagine if those “keys” eventually fell into the wrong hands.


Ben Kittrell is the co-founder of Doodlekit and an advisor for startups and small businesses. Kittrell also is host of Spare Room Radio, a podcast that features Kansas City entrepreneurs.

startland-tip-jar

TIP JAR

Did you enjoy this post? Show your support by becoming a member or buying us a coffee.

Tagged , , , , , ,
Featured Business
    Featured Founder

      2016 Startups to Watch

        stats here

        Related Posts on Startland News

        Park capping I-670 gets an official name: South Loop project to honor longtime Republican bridge-builder

        By Tommy Felts | April 12, 2025

        Kansas City’s high-profile South Loop Project — a proposed sustainable urban park capping a portion of I-670 — now has a name that pays homage to a leader who played a key role in launching the project: Roy Blunt Luminary Park. “As a working title, the South Loop Project has served us well,” said Jeff…

        Getting Kansas City to the last mile of tech workforce development requires a bridge (and together we’re building it)

        By Tommy Felts | April 7, 2025

        Editor’s note: The perspectives expressed in this commentary are the author’s alone. Kara Lowe is president and CEO of KC Tech Council. The greater Kansas City region faces a sizable workforce challenge; there currently are more tech-focused jobs in the region than local job candidates to fill the openings. At present, employers are seeking more…

        DoorDash Accelerator opens applications to local businesses through KCMO partnership

        By Tommy Felts | April 2, 2025

        Independently-owned brick-and-mortar businesses — think restaurants, flower shops, mom-and-pop supermarkets, and more across Kansas City — that partner with DoorDash for deliveries can now apply to join a new-to-KC entrepreneur-focused accelerator, Quinton Lucas announced Wednesday. Up to 10 local businesses are expected to be selected to receive mentorship, professional programming, and funding through the accelerator.…

        Why managing global teams requires navigating cultural nuances

        By Tommy Felts | March 25, 2025

        Editor’s note: The perspectives expressed in this commentary are the author’s alone. Serial entrepreneur and three-peat exited founder Matt Watson is the host of Product Driven and co-founder of Full Scale, a global staffing company. Click here to subscribe to the free Product Driven newsletter.  Building global software teams is more complex than just finding talented…