Home >> News >> Is Mobile Encryption Really Working in Our Favor?

Is Mobile Encryption Really Working in Our Favor?

"encrypted computer chips"
The second Crypto War is about to begin.

Last week’s terrorist attacks in Paris got people asking themselves: is mobile encryption really working in our favor? The NSA and the U.S. government are trying to gain back door access to users’ encrypted data, but this could weaken protection against hackers and extremists.

Smartphone developers and tech producers have been involved in many debates concerning their encryption codes. The latter have been created to protect smart devices from unauthorized access to users’ personal data.

On the other hand, the 9/11 terrorist attacks and the subsequent similar episodes of terror have determined the NSA and the U.S. government to look for better ways to improve their control over Internet users. They claim they need back door access to users’ accounts to prevent terrorist and cyber-attacks.

This request was renewed on Friday as Hillary Clinton stated in one of her recent public declarations that the war against terrorism would be much easier if tech developers showed their support to the U.S. government. She alluded to the fact that smart devices, in general, and smart phones, in particular have strong encryption codes that prevent NSA officials from getting access to a user’s data.

This maneuver would be extremely useful in debunking terrorists’ plans, but it could also have repercussions on users, as well. The encryption technology has been purposefully created to keep hackers and terrorist away from our private information.

What the U.S. government is asking software developers is to create back door access for NSA officials. However, these system weaknesses will not be visible only to NSA officials, but also to hackers and evil doers. If evil doers have learned to break much more secure systems, they will most certainly learn how to take advantage of these encryption weaknesses and gain control over people’s private data, too.

In spite of the U.S. government’s insistence, tech developers are not willing to give in. They claim they have the moral and the legal duty to protect their users’ data.

Activists, on the other hand, fear the introduction of a “Big Brother” law, which will make Internet users and U.S. inhabitants completely vulnerable before the prying eyes of the NSA. They are calling this debate the “second crypto war” in an attempt to recollect the “first crypto war” in the mid-1990s. Back then, the U.S. government added special encrypted chips on devices to gain back door access to users’ information.

Image source: www.diamondland.be

About Megan Bailey

Megan Bailey is a true journalist, but it wasn’t easy for her to find her true calling. She worked in a PC service all throughout her college and not she is using her hardware and software skills to write technology articles. The thing she loves most about her job is being able to keep tech lovers up to date with the recent trends.

Leave a Reply

Your email address will not be published. Required fields are marked *