Backdoor: What is it and why should I care?

You may have heard the term “backdoor in encryption.” Below we'll explain what it is, and why it's one of the hottest topics in her world s. Of course we will mention how it can affect the devices we use every day.

Most of the systems we use today have some form of encryption. To decrypt a device you will need to perform some authentication. For example, if your phone is locked, you'll need to use a password, your fingerprint, or the person to access your apps and data.

backdoor cuts

These encryption systems generally do a great job of protecting our personal data. Even if someone steals your device, they won't be able to access your data unless they know your password. Moreover, most they can delete the data they contain remotely, or automatically if someone tries to unlock them unsuccessfully.

Here comes the backdoor which is a built-in way to bypass this kind of encryption.

It essentially allows a manufacturer to access all the data of each device it creates. This is not new, as we know from "Chip Clipper” used in the early 90s by intelligence agencies.

We should mention that many alternative solutions can be used as a backdoor. It can be a hidden face of an operating system, an external tool that acts like for each device or piece of code that creates a vulnerability in the software.

In 2015, backdoors in encryption became the subject of intense global debate when Apple and the FBI were involved in a legal dispute. Through a series of court orders, the FBI wanted to force Apple to open an iPhone of a terrorist who had been killed. Apple refused to develop the necessary software to unlock the device, but the FBI collaborated with a hacking company that had a tool (GrayKey) to bypass encryption.

The debate continued between the technology companies and the American s, and almost every major tech company in the US. (Google, Facebook and Amazon) supported Apple's decision.

Most tech companies do not want a backdoor for the government and argue that this makes devices and systems generally less secure because there is already a vulnerability in the system.

Of course, according to the US government, only the manufacturer and the government will know how to access the backdoor. Of course, this is not entirely safe, because hackers and malicious users will at some point be able to find out. So systems and devices from all over the world will be at risk of data leakage, with very bad consequences for the owners.

Another question that concerns experts is whether the US government manages to get a backdoor, the governments of other countries would not ask for it either;

What follows will probably not be so acceptable. Systems containing backdoors will increase the number and scale of cybercrime. Such as He wrote Bruce Schneier in The New York Times, the backdoor method leaves exposed infrastructure that manages large utilities to foreign and domestic threats.

Of course, this also comes at a cost to the privacy of each of us. A backdoor in encryption in the hands of the government will allow the control of the personal data of every citizen at any time without his consent.

Since I have nothing to hide, why should I care about privacy?

On the other hand, governments that support a door to encryption argue that data should not be inaccessible to public security law enforcement. Some investigations into murders and thefts have been delayed because authorities did not have access to locked phones.

The information stored on a smartphone, such as calendars, contacts, messages and call history, is data that the authorities need for the police investigation.

And the debate continues

Creating backdoors on systems remains a very important policy debate. Lawmakers often point out that what they are really looking for is a "front door" that will allow them to request decryption under certain conditions.

However, a front door in encryption or a backdoor is the same. Both involve creating a vulnerability to access a device.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).