{"id":891,"date":"2016-04-19T04:06:28","date_gmt":"2016-04-19T04:06:28","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=891"},"modified":"2024-12-23T07:46:09","modified_gmt":"2024-12-23T07:46:09","slug":"how-apple-makes-encryption-easy-and-invisible","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/how-apple-makes-encryption-easy-and-invisible-891\/","title":{"rendered":"How Apple makes encryption easy and invisible"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/04\/apple.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-892 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/04\/apple.jpg\" alt=\"How Apple makes encryption easy and invisible\" width=\"638\" height=\"396\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/04\/apple.jpg 638w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/04\/apple-300x186.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/04\/apple-2x1.jpg 2w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a><\/p>\n<p>Do you know how many times a day you unlock your iPhone? Every time you do, you\u2019re participating in Apple\u2019s user-friendly encryption scheme.<\/p>\n<p>Friday, the company hosted a security \u201cdeep dive\u201d at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we\u2019re less concerned with how Apple\u2019s standards work than the fact that they do and will continue to. But that\u2019s kind of the point behind the whole system \u2014 Apple designed its encryption system so that we don\u2019t even have to think about it.<\/p>\n<p>Apple\u2019s encryption and security protocols have faced a ton of scrutiny during its recent showdown with the government. And if anything, that debate has gotten more people thinking seriously about how data can and should be secured. And the topic is not going away for a while.<\/p>\n<p>We weren\u2019t there Friday, but Ben Bajarin from Techpinions offers some great analysis, and his piece includes some really cool stats. For one, Apple says that the average user unlocks their phone 80 times a day. We don\u2019t know if that\u2019s across all platforms or just iOS. It sounds a little low in my case, however, because I\u2019m generally pretty fidgety.<\/p>\n<p>But because people are checking their phones so often, it\u2019s important for Apple developers to make encryption powerful without causing the end user frustration. Like if they could just plunk their thumb down, and their phone would unlock, for example.<\/p>\n<p>89 percent of people who own Touch ID-enabled devices use the feature, Apple says. And that\u2019s a really impressive adoption rate, but it makes sense when you think about how much easier the biometric system is to use than a passcode.<\/p>\n<p>Passcodes are great, of course, and you have to have one. But as an experiment a while ago, I turned off Touch ID and went numbers-only to unlock my phone. And guess what? It was really annoying. I switched the feature back on by the end of the day.<\/p>\n<p>Apple also talked up its so-called Secure Enclave, which is its slightly intimidating name for the single co-processor that has handled all encryption for its devices since the iPhone 5s. Each Enclave has its own, unique ID that it uses to scramble up all of the other data for safekeeping. And neither Apple nor other parts of your phone know what that UID is; it all just happens on its own. And that\u2019s pretty much how we prefer it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know how many times a day you unlock your iPhone? Every time you do, you\u2019re participating in Apple\u2019s user-friendly encryption scheme. Friday, the company hosted a security \u201cdeep dive\u201d at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we\u2019re less concerned &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/how-apple-makes-encryption-easy-and-invisible-891\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How Apple makes encryption easy and invisible<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[60,52,29],"class_list":["post-891","post","type-post","status-publish","format-standard","hentry","category-news","tag-apple","tag-encryption","tag-security"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=891"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/891\/revisions"}],"predecessor-version":[{"id":893,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/891\/revisions\/893"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}