On the Silicon Exposed blog, Andrew Zonenberg looks at Apple's announcement that it won't be able to decrypt its phones for law enforcement agencies. Zonenberg argues that "disk encryption isn't as much of a major game-changer as people seem to think."
First off, the changes in iOS 8 are encrypting data on disk. Voice calls, SMS, and Internet packets still cross the carrier's network in cleartext. These companies are legally required (by CALEA in the United States, and similar laws in other countries) to provide a means for law enforcement or intelligence to access this data.
In addition, if Eve can get within radio range of Alice or Bob, she can record the conversation off the air. Although the radio links are normally encrypted, many of these cryptosystems are weak and can be defeated in a reasonable amount of time by cryptanalysis. Numerous methods are available for executing man-in-the-middle attacks between handsets and cell towers, which can further enhance Eve's interception capabilities.
|TOR Users Flagged by NSA as 'Extremists'|
|How the NSA Infiltrates Google and Yahoo Data Centres|
|Advertising Cookies Let You Easily Be Tracked All Over the Web|
|iPhone 6, the First Smartphone to Disrupt NSA's Spying|
|Nineteen Organizations, Including Gun Groups, Join the EFF to Sue NSA Over Illegal Surveillance|
|“It’s taking orders for a real-life flying motorcycle powered by five modified jet engines.”|
|“By day, she visits morgues, observes autopsies, and studies pictures of crime scenes.”|
|What Nothing Really Means in Seinfeld|
|U.S.S. Enterprise Owner's Manual|
|“Featuring over 2,000 flags in motion to Ludwig van Beethoven.”|
|CaptchaTweet: Write Tweets in Captcha Form|
|How to Avoid Jury Duty|
|Fake Name Generator|
|The (Very Scary) People of Public Transit|
|“Without ads, how does Netflix manage to make money?”|
|If Sir David Attenborough Restored Vintage Toys|
|“How easy it is for anyone who tracks our digital activities to gain insight into our personalities.”|