Smartphone Encryption: What You Need to Know
The debate over encrypted smartphones and smartphone apps refuses to die down, as demonstrated by the latest headlines.
Law-enforcement authorities demand that Apple, Google and app makers decrypt their devices and services, or else provide "back doors" by which they can read data and messages. Silicon Valley companies respond that because encrypted data is fundamental to privacy, helping law enforcement would be betraying their customers. And politicians who have little grasp of the issue nevertheless have a lot to say about it.
In perhaps the best-known case, in mid-February 2016, Apple refused to help the FBI decrypt an iPhone used by one of the San Bernardino shooters, generating immense publicity and debate. Apple later responded with a 65-page motion to vacate the court order compelling it to assist the FBI.
But there are dozens of other criminal cases around the United States that involve encrypted smartphone data or communications, and the overall issue has global impact. We here at Tom's Guide don't have the answer to this dilemma, especially since both sides have valid points. But we do have answers to basic questions about smartphone encryption.
What is smartphone encryption?
There are two main kinds of smartphone encryption, both designed to stop unauthorized persons from reading private information. First, there's encrypted messaging software, which covers what law-enforcement experts call "data in motion," or messages going from one device to another.
The most secure kind of communications encryption, called "end-to-end" encryption, prevents even app makers, cellular carriers or phone makers from being able to read the messages. This is what Apple's iMessages offers, and it's what counterterrorism officials have trouble encrypting and decrypting. But Apple says that because it doesn't have the keys, it can't help.
The other kind of encryption is encryption of the stored data on a device itself, which law enforcement calls "data at rest." This is more often sought by regular cops who want to read what a drug dealer, kidnapper or pimp has on his phone. Android and iOS both offer full-device encryption, and both Google and Apple have fought court orders to help law-enforcement authorities decrypt phones.
Why is encryption on a phone important? I have nothing to hide.
Apple CEO Tim Cook provided a succinct answer to that question in a "60 Minutes" interview in December 2015.
"On your smartphone today, on your iPhone, there's likely health information, there's financial information," Cook said, referring mainly to "at rest" data. "There are intimate conversations with your family, or your co-workers. There's probably business secrets, and you should have the ability to protect it. And the only way we know how to do that is to encrypt it."
Why is smartphone encryption so controversial?
The problem is that encryption has gotten so good that no one can crack it — not even the smartphone makers. So U.S. law enforcement authorities want a "back door" to decrypt even the strongest encryption software.
Democratic presidential candidate Hillary Clinton demonstrated a fairly good grasp of the issue during a debate in December 2015.
"It doesn't do anybody any good if terrorists can move toward encrypted communication that no law-enforcement agency can break into before or after," she said. "There must be some way. I don't know enough about the technology ... to be able to say what it is, but I have a lot of confidence in our tech experts."
But, Clinton added, "maybe the back door is the wrong door, and I understand what Apple and others are saying about that."
Can you explain the notion of a back door?
A back door is a secret method of defeating the security of a piece of software. Law enforcement wants such secret methods to be able to read any message sent via any method, provided a warrant has been issued.
Would it be a big deal if Apple and Google let the government disable encryption in certain cases? Would it even be possible?
It would be a big deal, because it would restore the access to private communications that U.S. law enforcement has traditionally had (usually with a warrant) — to an extent. Law enforcement is very worried about communications "going dark" to authorities.
But Apple, Google, many encryption experts and dozens of other Silicon Valley companies argue that if a so-called "back door" were created for exclusive law-enforcement use, it wouldn't be exclusive for long. Hackers, criminals and repressive governments would soon find the keys.
"If there's a way to get in, then somebody will find the way in," Apple's Cook told CBS' Charlie Rose. "There have been people that suggest that we should have a back door. But the reality is if you put a back door in, that back door's for everybody, for good guys and bad guys."
And it may not even be possible. Some cryptography experts say that, due to the complex math involved in creating encryption algorithms, a single flaw would render an entire algorithm useless. Many encryption algorithms have been abandoned after mathematical flaws were found.
Furthermore, U.S. law would have no effect on foreign companies. Telegram is run by Russians and based in Germany, and Germany has very strong privacy laws. Silent Circle is run by Americans, but it's based in Switzerland and its servers are in Canada. CryptoCat is run by a single Lebanese student who's currently based in Paris.
Basically, you can't stop encryption. The issue really is whether we should try to. One solution might be for Apple to give the government access without telling anyone — but such an arrangement would be found out eventually.
Do law enforcement back doors already exist?
Yes. Thanks to the Communications Assistance to Law Enforcement Act (CALEA) of 1994, law enforcement has nearly instant access, upon presentation of a warrant, to landline and cellular telephone calls. Companies such as Verizon and AT&T have long-standing relationships with law enforcement. Law enforcement can also demand traffic logs from Internet service providers such as Comcast or Time Warner Cable, but some of those companies have fought back in court.
But CALEA doesn't cover software-based communications such as instant messaging. The FBI has spent the past few years trying to get them added, but has not received White House support. Hence, Apple and other companies — and even private individuals — are free (for now) to create unbreakable encryption for software-based communications. That may change under the next president.
What's going on in Britain with government-mandated back doors?
The Conservative government in November 2015 introduced the Investigatory Powers Bill, which would grant British police and intelligence agencies broad powers to collect data from providers of Internet-based communications and from physical devices.
Companies that provide Internet-related services in the United Kingdom would be compelled to collect bulk data on all customers, and cooperate fully with targeted investigations that might involve breaking into encrypted communications and encrypted devices. Companies based overseas, such as Apple, would not be exempt.
In December 2015, Apple submitted an angry letter to a parliamentary committee taking comments from the public while the bill is still being revised. Other Silicon Valley companies are expected to submit their own letters.
"The bill threatens to hurt law-abiding citizens," Apple said in the letter, which was distributed to news outlets. "A key left under the doormat would not just be there for the good guys. The bad guys would find it too."
"The best minds in the world cannot rewrite the laws of mathematics," Apple added. "The bill would attempt to force non-U.K. companies to take actions that violate the laws of their home countries. ... We owe it to our customers to protect their personal data to the best of our ability. Increasingly stronger — not weaker — encryption is the best way to protect against these threats."
What's the National Security Agency's role in all this?
The NSA rarely comes up in these debates, except as the reason why people want smartphone encryption in the first place. If you were to corner security experts and ask them off the record, many would assume that the NSA probably knows how to crack all these services already.
What on my phone can be encrypted? Texts? Calls? Everything?
Everything except text messages and regular calls, because neither of those normally uses the Internet. But there are plenty of apps, such as Silent Phone or Signal, that route voice calls through the Internet using Voice over Internet Protocol (VoIP), and even more apps, such as iMessages, that switch text messages to Internet-based instant messages. The catch is that the person on the other end of the conversation has to be using the same app.
One weak spot is email. You can encrypt the body of an email message, and any attachment to that message, but you can't disguise the accounts that send and receive the message. So emails in transit can usually be tracked. However, you can encrypt email logs stored on a phone.
How does encryption work?
The raw bits and bytes of the digitized information are scrambled with a key, or two keys, using many different encryption algorithms, or methods of encryption. The implementation, or way in which the encrypted information is handled, also matters, because that's often the way encryption can be undermined.
The most secure forms of encryption communication make sure that only the recipient can decrypt the message sent by the sender. Some less secure implementations — such as that used by SnapChat — can allegedly be decoded by the app makers.
The San Francisco-based digital-rights advocacy group the Electronic Frontier Foundation keeps a constantly updated list of which "secure" communications apps are truly secure, and which aren't, with its Secure Messaging Scorecard.
Encrypting all the data stored on a device, equivalent to Apple's FileVault or Microsoft's BitLocker for personal computers, is less complex.
In Apple's case, all devices running iOS 8 or later automatically encrypt the entire device as soon as the user creates and activates a passcode. Because the passcode is mixed up with the device's own ID number to create a key that encrypts the device, the decryption must be carried out on the device itself. Apple theorizes that off-device decryption of data taken from an encrypted device would take several decades.
Android phones do not automatically encrypt themselves, but Google makes it easy for the user to set up. Here's our guide on how to encrypt an Android device.
Is 2-factor authentication for my Apple ID all the security I need to protect my account?
That depends. Apple has taken a somewhat haphazard route to account security, as iTunes, iCloud and Apple accounts were at one point three different things, with different levels of security. Apple has officially merged all three and given users the option to enable two-factor authentication, but people who had more than one type of Apple account in the past may find that there are still holes.
How to do iPhone and Android security differ?
Google's online-account security is a bit more comprehensive. There's one single Google account to cover almost everything, although people can still set up separate YouTube accounts if they choose. Two-factor authentication can be enabled on both — and also on Facebook, Microsoft, Dropbox, Yahoo, Amazon and Twitter. For a fuller list of which services do and don't support two-factor authentication, go to http://twofactorauth.org/.
However, whereas iMessages uses fully end-to-end encryption, Google makes no such security claims with regard to Google Hangouts, formerly known as Google Talk, Google+ Messenger and Gchat.
Is Snapchat still easy to hack?
To our recollection, no SnapChat flaws were disclosed in 2015, following a pretty bad 2014 for the company. But keep in mind that the EFF thinks neither SnapChat nor, until recently. WhatsApp are truly secure. Many experts think Telegram isn't either, but the EFF distinguishes between regular Telegram communications and the more secure "secret chat" option.
Which smartphone encryption apps should I use?
Signal is a good one. So are Silent Circle's Silent Text and Silent Phone, iMessages and CryptoCat. For a full list, head to the EFF Secure Messaging Scorecard linked to above.
Are certain carriers more likely to be snooped upon or give my information away?
You have to assume that all landline and cellular carriers, anywhere in the world, will give your information to a government when asked. (See the part about the CALEA law in the U.S. above.)
There are allegations that T-Mobile, being a German company, is not as cooperative with the U.S. government as are AT&T and Verizon. As for Sprint, U.S. intelligence and law-enforcement officials negotiated an agreement that their relationship with the company would not be affected by the 2013 sale of the majority of Sprint's stock to Japan's Softbank.
But bear in mind that, to our knowledge, a telephone or Internet service provider cannot decipher software-based encrypted communications traveling over their wires and radio signals. That's why iMessage works on AT&T iPhones, and why law-enforcement authorities are not happy with Tim Cook.