• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Despite strong encryption, human factor remains the weakest link in iOS 8 security

Updated on Oct 12, 2014 by Guest Authors

Apple has recently bolstered the encryption in new updates to the iOS 8 operating system in such a way that nobody, not even the law enforcers or Apple itself, could break into the security boundary. It sounds as though it’s a tough job decrypting iOS 8 data. Fortunately for hackers and law enforcement agencies alike, there’s a certain weak point in the security link, and that is the user itself.

Joseph Bonneau of Princeton University claims that Apple’s new approach to encryption is only as strong as the weakest link, referring to how users choose their pass code for their own devices. And most of the time, users fail to implement a strong password, which undermines Apple’s claim to a strong encryption security.

iphone-6-plus-8

Apple designed to new encryption model to secure sensitive information stored in hardware to block would-be attackers and non-attackers such as law enforcers from gaining access to the data. The announcement of the encryption tool in iOS devices has sent United States government officials worrying that it might increase the rate of cyber crime. Law enforcers sometimes find it apt to obtain data from mobile devices with court warrant as part of the investigation process.

But the protection, however robust, can still be rendered weak at certain circumstances when a user would use a weak password that will be easy for attackers to guess using the cryptographic processor in a mobile device. The cryptographic co-processor known as Secure Enclave contains keys that are responsible for encrypting iPhone user data. Once the Secure Enclave falls in the hands of malicious players, that’s the time when potential data breach of iOS devices could be performed through password guessing. Other attackers would also resort to brute-force attack.

But before an attacker would certainly find it hard at first to boot a device using external firmware as an initial step leading to the copying of data from an iPhone device. According to Bonneau, an attacker first needs to bypass the secure boot stage of iOS 8.

There lies the weak point, because Apple asks users to enter four digits of pass code. That is the default requirement, so most users – and a great portion of Apple users – are probably guilty of this lax security practice. There is of course an option to enter longer pass codes, but that is such an onerous task personally, especially if you do it on a touch screen.

Another thing, if you are using iPhone, never use the same password for all your devices.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

OAK & IRON Launched ONE and ONE PRO Cordless Electric Tire Inflators

bonoch Nursery Bundle Review – Innovative Smart Baby Monitor and OK-to-Wake Clock

WINCENT Multi-Function Gun Safe Cabinet Review

Laifen Swift Hair Dryer Review – How Is It The Perfect Dyson Supersonic Alternative?

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • BLUETTI AC500 and B300S – Achieve Power Independence with The Upgraded Power Station
  • CIGA Design Mechanical Watch – Magician (M-Series) Launched on IndieGogo
  • KOVOL Prime Day 2022 Deals – USB-C Chargers Are Cheaper than Ever
  • Why You Should Buy BLUETTI E-Gift Card?

Copyright © 2022 · All Rights Reserved