Home >> News >> Android Full-Disk Encryption is Weak, Study Finds

Android Full-Disk Encryption is Weak, Study Finds

Android full-disk encryption is weak, says expert Gal Beniamini. You might want to consider switching to iOS for better encryption, brags Apple. Android depends on multiple partners to develop security policies, and the encryption keys are stored in the software. This makes the keys more vulnerable to attacks.

Furthermore, many Android devices that have been upgraded to more secure versions can still be rolled back to the old, vulnerable versions of the software. Thus, exposing them once more to possible exploits. When it comes to numbers, the amount of devices susceptible to getting hacked is huge. More than a third of the Android devices can face broken encryption.

Android Full-Disk Encryption is Weak

It is because of Android’s architecture that these attacks are possible. Storing keys in the software and not the hardware makes room for possible exploits. Still, it is only the case with Qualcomm CPU powered Android devices.

Getting to these keys is still a hard job for your average hacker, but the problem remains – the encryption is far from being perfect, and iOS has a lead on this feature as well.

These security flaws have been discovered by Qualcomm developers, and they quickly came with patches to protect their customers and partners. However, these patches are not “bulletproof” either.

Users usually turn Android full-disk encryption off because encryption is too slow. Google’s encryption implementation does not provide a hardware accelerated one. Furthermore, efforts to mandate Android full-disk encryption in Android 6 have not been put into practice.

When it comes to iOS, the matter is simpler. The approaches are entirely different. This OS doesn’t rely on a software to read the key. It is a chip, the Secure Enclave. It communicates with the application processor through an interrupt-driven mailbox.

The weak encryption is not the only problem Google faces. Last year, it was noted that Android also needs an auto-rooting adware so that users can still keep their phones after being infected with Shuanet, Shedun, or ShiftyBug. Furthermore, Android allows malicious apps to gain root access to features such as camera, GPS location, and other personal data. Yet Google has yet to address the issue adequately and patch those users. And Android 6 Marshmallow doesn’t seem to win much ground, managing its way only into a tenth of the software installed last year.


About Sara Rose

She has spent the past 4 years playing the role of an IT consultant, and has now joined The Next Digit as a full time blogger. Her current profession is a result of her deep experience in computer gadgets, laptops, gaming accessories and other tech updates.

One comment

  1. I basically make around 6000-8000 bucks monthly working from home online. Everyone willing to do easy at home jobs for few h a day at your house and make solid income in the same time… Try this job https://www.facebook.com/Online-job-opportunity-for-US-UK-Australia-Canada-and-New-Zealand-627027550788002/app/190322544333196/

Leave a Reply

Your email address will not be published. Required fields are marked *