Is the data on your phone or laptop encrypted? Should it be? And what does encrypting your data do to it anyway? Here well explain the ins and outs of encryption, and how you can make sure that everything in your digital life is safe from prying eyes.
Despite some of the complicated math involved, encryption isnt difficult to understandsimply put, it locks your files and data away using a secret code, just like a pair of spies might talk in code to hide what theyre really saying. If anyone else overhears that conversation, it sounds like gibberish, and its the same with encrypted files.
To make sense of encrypted data, you need the key to the code, which on your phone is often your PIN numberget past the lock screen, and your files and apps are no longer gibberish. Thats why being able to unlock an encrypted phone is so important to making sense of the data on it.
It applies to data we have stored on our devices and data we send through the air, to and from the internet. Apps with end-to-end encryption cant be spied on, much to the chagrin of law enforcement agencies and governments worldwide, and only the sender and intended recipient gets to see the real message.
You can go a long way down into the technical details of encryption, but it essentially just scrambles the data. The number of bits is often listed next to the type of encryption being used tell you how many possible combinations there are for the unlock codesomething locked with 256-bit encryption would take a bank of supercomputers billions of years to decode using brute force alone.
If the disk is not encrypted your device can easily be booted off a USB drive and the unencrypted data extracted, explains cybersecurity expert Professor Alan Woodward from the University of Surrey. You can even just take out the hard drive and mount it on another machine to examine data unless the disc is encrypted.
Different types of encryption algorithms have been developed for different purposes, with varying compromises between complexity and speed, though most of the time you wont have to worry about which flavor of encryption youre using (most of the time you just wont get a choice).
For example, the encryption on the iPhone is the 256-bit AES standard also used by the US military, which has the benefit of being both very speedy to apply and impossible to crack by running through the various unlock code combinations, as weve already pointed out.
If you do get a choice, Professor Woodward recommends looking for packages and encryption methods that have gone through some kind of public audit or independent testing to verify the methods used.
In some cases, such as the encryption supplied by Apple and Microsoft, you have little choice but to accept their assurances, but if using a third-party package look for audits, he told Gizmodo. Its the same as with secure messaging apps, its a sign of how robust the developers believe their system to be if they put it up for scrutiny.
If your data isnt encrypted, anyone who happens across your phone or laptop can get at the files within pretty easily; with encryption added, accessing the same data becomes very, very difficult (though not impossible, if other security loopholes can be found on the device). But do you need it in place if youre not carrying government secrets or company financials with you?
As security expert and Chief Technology Officer at IBM Resilient Bruce Schneier puts it in his blog: Encryption should be enabled for everything by default, not a feature you turn on only if youre doing something you consider worth protecting.
This is important. If we only use encryption when were working with important data, then encryption signals that datas importance. If only dissidents use encryption in a country, that countrys authorities have an easy way of identifying them. But if everyone uses it all of the time, encryption ceases to be a signal.
Even if you dont mind the thought of other people rifling through your folders of GIFs and angry letters to your Internet Service Provider, any device you own contains a wealth of information about you thats best kept private, from contacts to browsing histories.
Whether you think it worth doing is really whether you think your device has valuable data, says Professor Woodward. Youd be surprised what you do have: Contacts, emails, passwords. People underestimate the value of these to criminals. So, on the whole I think it is worth doing.
Youre building a wall between everything on your phone or computer, and anyone else who might want to look at it who isnt you. The good news is, encryption has become so important that a lot of devices now include it by default, so you dont necessarily need to do anything to stay protected.
iOS has been encrypting data for years, and encryption is now switched on by default in macOS as well: To check, open System Preferences, click Security & Privacy, then open the FileVault tab. If encryption isnt enabled, you can start the process here, and Apple has more information on its official support page.
After lagging behind iPhones for several years, just about all new Android devices are also now encrypted by default, as long as theyre running Android 6.0 Marshmallow or later. If your Android device isnt encrypted, and can be encrypted with its current OS version, then youll find the option by tapping the Security link in Settings.
That just leaves Windowssome PCs that ship with Windows 10 come with something called Device Encryption enabled, as long as you set it up and sign in with a Microsoft account. To check if this applies to you, from Settings click System then About and see if theres a Device Encryption section at the bottom.
If you dont have Device Encryption on your machine then the next option is BitLockerbut that requires upgrading to Windows 10 Pro. You may think the $100 is worth it, but free options, like the open source VeraCrypt, are available as well.
Were not going to go into too much detail about the data traveling to and from your devices, but encryption applies here toowith encryption in place, if someone should intercept the data going to or leaving from your computer, they wont be able to make sense of it.
A lot of apps apply encryption by default, and its also added when you connect to HTTPS sites such as Facebook, Gmail, Amazon and many others. Adding a password to your Wi-Fi network at home encrypts the data moving across it, and if youre using a public Wi-Fi network that anyone can access you should consider installing a VPN to encrypt your data and keep it scrambled.
Finally, its important to remember that nothing keeps your devices 100 percent protected, not even encryption (though it of course goes a long way towards doing that)dont think because your phone or laptop is encrypted you can become complacent about all the other precautions you need to put in place to stay safe.
- Transparent Data Encryption (TDE) - msdn.microsoft.com - April 12th, 2018
- Encryption Software Market - Global Forecast to 2022 - March 24th, 2018
- What AES Encryption Is And How It's Used To Secure File Transfers - March 24th, 2018
- Encryption vs. Cryptography - What is the Difference? - March 24th, 2018
- Energy-efficient encryption for the internet of things | MIT News - February 16th, 2018
- The Best Encryption Software - TopTenReviews - February 16th, 2018
- File-Based Encryption | Android Open Source Project - February 7th, 2018
- Beyond Encryption | Secure Enterprise email using existing ... - February 1st, 2018
- Azure Search enterprise security: Data encryption and user ... - January 26th, 2018
- Skype finally getting end-to-end encryption | Ars Technica - January 13th, 2018
- FBI chief says phone encryption is a 'major public safety issue' - January 13th, 2018
- Encryption and Export Administration Regulations (EAR) - December 27th, 2017
- Key (cryptography) - Wikipedia - December 21st, 2017
- security - Fundamental difference between Hashing and ... - December 15th, 2017
- What Is Encryption? | Surveillance Self-Defense - December 4th, 2017
- Comodo Disk Encryption Download - softpedia.com - December 1st, 2017
- Encryption - Simple English Wikipedia, the free encyclopedia - November 24th, 2017
- BitLocker Drive Encryption Overview - technet.microsoft.com - November 23rd, 2017
- The Encrypting File System - technet.microsoft.com - November 18th, 2017
- FBI cant break the encryption on Texas shooters smartphone - November 13th, 2017
- DOJ: Strong encryption that we dont have access to is ... - November 13th, 2017
- DOJ Fires Up New War With Apple Over Encryption - November 12th, 2017
- Security Awareness - Encryption | Office of Information ... - October 15th, 2017
- Data Encryption and Decryption (Windows) - October 14th, 2017
- Trumps DOJ tries to rebrand weakened encryption as responsible ... - October 11th, 2017
- How to encrypt (almost) anything | PCWorld - September 22nd, 2017
- Private Internet Access | VPN Encryption - September 21st, 2017
- Encryption Substitutes | Privacy | Encryption - September 21st, 2017
- Data Encryption: Hardware & Software Security: Online ... - September 21st, 2017
- How To Enable BitLocker Drive Encryption In Windows 10? - September 21st, 2017
- PGP Encryption Tool - iGolder - September 21st, 2017
- encryption - How to encrypt String in Java - Stack Overflow - September 21st, 2017
- Encryption Software Market, Size, Trends and Forecast 2020 - September 21st, 2017
- Encryption Definition - Tech Terms - September 20th, 2017
- Black Hats, White Hats, and Hard Hats The Need for Encryption in Mining and Resources - Australian Mining - September 6th, 2017
- How can enterprises secure encrypted traffic from cloud applications? - TechTarget - September 6th, 2017
- Encryption Explained - Arizona Daily Wildcat - September 6th, 2017
- News in brief: Call to link encryption to ID; Facebook maps everyone ... - Naked Security - September 2nd, 2017
- 'Independent' gov law reviewer wants users preemptively identified before they're 'allowed' to use encryption - The Register - September 2nd, 2017
- High-Dimensional Quantum Encryption Performed in Real-World ... - Futurism - September 2nd, 2017
- It's Time to Replace Your Encryption-Key Spreadsheet - Data Center Knowledge - September 2nd, 2017
- Legislation to limit smartphone encryption 'may be necessary,' deputy AG Rosenstein says - Washington Times - August 31st, 2017
- Cloud Encryption Market by Component, Service Model, Organization Size, Vertical And Region - Global Forecast to ... - Markets Insider - August 31st, 2017
- Cipher Suites: Ciphers, Algorithms and Negotiating Security Settings - Hashed Out by The SSL Store (registration) (blog) - August 31st, 2017
- Encryption in Office 365 - Office 365 - August 29th, 2017
- Need-to-Know Only: Use Encryption to Make Data Meaningless to ... - Security Intelligence (blog) - August 29th, 2017
- Four strategies to prevent data encryption from hijacking your network - Digital News Asia - August 29th, 2017
- Amber Rudd is wrong - real people do want end-to-end encryption - ITProPortal - August 29th, 2017
- Why encryption is for everyone - IFEX - August 29th, 2017
- 4D quantum encryption successful in first real-world test - New Atlas - New Atlas - August 29th, 2017
- For the First Time Ever, Quantum Communication is Demonstrated in Real-World City Conditions - Futurism - August 26th, 2017
- High-Dimensional Quantum Encryption Takes Place in Real-World ... - Photonics.com - August 26th, 2017
- Hedvig Bakes Encryption into Software-Defined Storage Platform - IT Business Edge (blog) - August 26th, 2017
- Hedvig storage upgrade adds flash tier, encryption options - TechTarget - August 26th, 2017
- How to use EFS encryption to encrypt individual files and folders on Windows 10 - Windows Central - August 26th, 2017
- Cloud Encryption Market Worth 2401.9 Million USD by 2022 - Markets Insider - August 23rd, 2017
- To Protect Genetic Privacy, Encrypt Your DNA - WIRED - August 23rd, 2017
- Data Encryption in OneDrive for Business and SharePoint Online - August 21st, 2017
- Researchers use encryption to keep patients' DNA private - Engadget - August 21st, 2017
- Additional proof that Lancaster County Commissioners should reconsider encrypting police transmissions - LancasterOnline - August 21st, 2017
- iPhone Secure Enclave firmware encryption key leaked - TechTarget - August 21st, 2017
- Encryption, speed push the modern mainframe into the future - TechTarget - August 21st, 2017
- Hardware encryption vs software encryption: the simple guide - Kroll Ontrack UK (press release) (blog) - August 21st, 2017
- Encryption Technology Could Protect the Privacy of Your DNA - Gizmodo - August 21st, 2017
- Beginner's guide to Windows 10 encryption - Windows Central - August 18th, 2017
- Encryption key for iPhone 5s Touch ID exposed, opens door to further research - AppleInsider (press release) (blog) - August 18th, 2017
- How security pros look at encryption backdoors - Help Net Security - August 18th, 2017
- The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited - Lawfare (blog) - August 18th, 2017
- 72 percent of security pros say encryption backdoors won't stop terrorism - BetaNews - August 18th, 2017
- Ex-MI5 Boss Evans: Don't Undermine Encryption - Infosecurity Magazine - August 14th, 2017
- Despite end to end encryption, apps like WhatsApp, Messenger are still vulnerable to hacking: Study - Firstpost - August 13th, 2017
- What is Encryption? (with pictures) - wiseGEEK - August 12th, 2017
- Ex-MI5 chief warns against crackdown on encrypted messaging ... - The Guardian - August 12th, 2017
- Former UK security service head says weakening encryption would be too dangerous - 9to5Mac - August 12th, 2017
- News in brief: facial recognition planned for Carnival; spy chief backs encryption; ginger emoji planned - Naked Security - August 12th, 2017
- Avoid getting lost in encryption with these easy steps - We Live Security (blog) - August 12th, 2017
- Here's why IBM Z Mainframe Wants to Encrypt the World - Edgy Labs (blog) - August 10th, 2017
- Symantec Announces Plesk Will Integrate Symantec Encryption Everywhere Security Into Its Website Management ... - Business Wire (press release) - August 10th, 2017
- Australia: Shelve Proposed Law to Weaken Encryption - Human Rights Watch (press release) - August 6th, 2017
- IBM India Helps Create Breakthrough Encryption Technology That's Completely Hacker Proof - Indiatimes.com - August 6th, 2017