• ShortN0te@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    4 months ago

    No. You watch too many Movies. Yes there were attempts from state sponsored actors to weaken encryption algorithms. But is encryption easy to crack? No.

    • SomeLemmyUser@discuss.tchncs.de
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      4 months ago

      Dude what encryption are you talking about? Hardware storage encryption is just by now getting more widely adapted, the phone I used till a year ago didn’t even support any encryption.

      Sure, aes-256 with secure password only stored in your mind is quasi 100℅ safe, but that is not how most devices handle their “encryption”.

      If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

      Also also: encryption only helps if the device is off, which is seldom the case with phones.

      • ShortN0te@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        4 months ago

        Isn’t it an open secret that powerful entities (like spying institutions) can get into pretty much every system if they have physical access? Why is this not plausible

        You stated in your original comment: “pretty much every system”. So no, any modern phone if android or iOS is by default encrypted.

        If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

        TPMs are by design encrypted.

        Keys are not stored unencrypted at least not when you encrypt your storage with modern solutions and set it up reasonably. You use either your TPM to store the key or store it on the drive and have it encrypted by itself or use a KDF.

        Also also: encryption only helps if the device is off, which is seldom the case with phones.

        No this assumption is wrong. You still would need to circumvent the Login into the device which is mostly secured by a pin or password or biometrics.

        • SomeLemmyUser@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          4 months ago

          If you think TPMs are always encrypted, a key can be encrypted “with itself” and still be any use to you and android system pin is secure you are right. Might also believe in santa

          • ShortN0te@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            4 months ago

            If you think TPMs are always encrypted, a key can be encrypted “with itself” and still be any use to you and android system pin is secure you are right. Might also believe in santa

            Not sure what you are rambling about the TPM.

            Then prove that the Lockscreen is insecure.