You may have heard the term "backdoor in encryption. ” Below we will explain what it is, and why it is one of the most topical issues in the world of technology. Of course we will mention how it can affect the devices we use every day.
Most of the systems we use today have some form of encryption. You must perform some authentication to decrypt a device. For example, if your phone is locked, you will need to use a password, fingerprint, or face recognition feature to access your applications and data.
These encryption systems generally do an excellent job of protecting our personal data. Even if someone steals your device, they will not be able to access your data unless they know your password. In addition, most phones can delete the data they contain remotely, or automatically if someone tries to unlock it unsuccessfully.
Here comes the backdoor which is a built-in way to bypass this kind of encryption.
It essentially allows a manufacturer to access all the data of every device they create. This is not new, since we know it from "chip Clipper”Used in the early 90s by intelligence services.
To mention that like backdoor many alternatives can be used. It could be a hidden aspect of an operating system, an external tool that acts as a key to any device, or a piece of code that creates a vulnerability in the software.
In 2015, the backdoors in encryption became the subject of intense global debate when Apple and the FBI were involved in a legal dispute. Through a series of court orders, the FBI wanted to force Apple to open an iPhone of a terrorist who had been killed. Apple refused to develop the necessary software to unlock the device, but the FBI collaborated with a hacking company that had a tool (GrayKey) to bypass encryption.
The debate continued between technology companies and the US government, and almost every major technology company in the United States. (Google, Facebook and Amazon) supported Apple's decision.
Most technology companies do not want one backdoor for the government and argue that this makes devices and systems generally less secure because there is already a vulnerability in the system.
Of course, according to the US government, only the manufacturer and the government will know how to access backdoor. Of course, this is not completely safe, because hackers and malicious users will be able to find out at some point. So systems and devices from all over the world will be at risk of data leakage, with very bad consequences for the owners.
Another question that concerns experts is whether the US government manages to get one backdoor, the governments of other countries would not ask for it either;
What follows will probably not be so acceptable. The systems they contain backdoors will increase the number and scale of cybercrime. Such as He wrote by Bruce Schneier in The New York Times, the backdoor method leaves exposed infrastructure that manages large utilities to foreign and domestic threats.
Of course, this also comes at a cost to the privacy of each of us. One backdoor encryption in the hands of the government will allow the control of personal data of any citizen at any time without his consent.
On the other hand, governments that support a door to encryption argue that data should not be inaccessible to public security law enforcement agencies. Some investigations into murders and thefts have been delayed because authorities did not have access to locked phones.
The information stored on a smartphone, such as calendars, contacts, messages and call history, is data that the authorities need for the police investigation.
And the debate continues
The creations backdoor in systems remains a very important policy debate. Lawmakers often point out that what they are really looking for is a "front door" that will allow them to request decryption under certain circumstances.
However, a front door in encryption or one backdoor it's the same. Both involve creating a vulnerability to access a device.