Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

When a person, who doesn’t have access to a device, tries to get into the device through one of the options, whether it be code, pattern, or biometric access, they are repelled. Without entering the credentials or biometric data that allows for a device to open, it will remain closed to the user. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

Apple
The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that has the incorrect access controls entered repeatedly will lock, stopping unwanted parties from getting into your iPhone.

Android
Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fair share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for the user’s benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Training Compliance Gadgets Cloud Computing Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Managed Services Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Budget Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Operating System 2FA Computers Router Virtual Private Network Risk Management Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers Managed IT Service Telephone The Internet of Things Scam Data loss Cooperation Free Resource Social Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Excel Display Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Data Privacy Virtual Machines Professional Services Humor Safety Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering IT Management Supply Chain Hacking VPN Employees YouTube Meetings Presentation Integration Cryptocurrency Wireless Technology User Tip Modem Experience Virtual Assistant IP Address Google Docs Unified Communications Database Surveillance Paperless Bitcoin Network Management Co-managed IT Running Cable Tech Support IT Technicians Virtual Machine Google Wallet Proxy Server Reviews Technology Care Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Recovery Tactics Development Business Communications Windows 8 Scams Laptop Websites Mirgation Hypervisor Hard Drives Domains Drones Shopping Hybrid Work Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Human Resources Management PCI DSS Cables Halloween Chatbots Navigation Refrigeration Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Lithium-ion battery Service Level Agreement Internet Service Provider Google Apps Entrepreneur Hacks Server Management Regulations Compliance IT Maintenance Scary Stories Private Cloud Identity Evernote Superfish Bookmark Business Intelligence Identity Theft Smart Tech Memes Fun Twitter Alerts SQL Server Deep Learning Download Net Neutrality Shortcuts Financial Data Ransmoware Error History Undo Browsers Smartwatch Vendors Education Connectivity IT Social Engineering Break Fix Be Proactive Remote Computing Azure Upload Procurement Mobile Computing Social Network Telework Workforce Cyber security Multi-Factor Security Tech CES Threats Tablet IoT Communitications Search Dark Web Best Practice Trends Supply Chain Management Workplace Strategies Alert Application Managed IT Customer Resource management FinTech Meta Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel IBM Legal Data Analysis Amazon IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Organization Outsource IT Travel Social Networking Legislation Cortana Techology Fileless Malware Digital Security Cameras Environment Google Maps Smart Devices Media Alt Codes Content Remote Working Wearable Technology Memory Health IT Small Businesses Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Competition Permissions Unified Threat Management Directions Videos Displays Hosted Solution Assessment Electronic Health Records Typing Wasting Time Outsourcing Trend Micro Network Congestion Specifications Security Cameras Knowledge Fraud User Google Drive User Error Microchip Internet Exlporer Software as a Service Username Workplace Managing Costs Hiring/Firing Point of Sale eCommerce 5G Black Friday SSID

Blog Archive