The last two decades have sparked an Internet Age where digital

advertisement
The last two decades have sparked an Internet Age where digital devices have become
ubiquitous in our lifestyles. A growing portion of modern interactions are being done through
mobile phones. Ever since the debut of the iPhone in 2007, smartphones have dominated the
mobile market. In just the past 5 years, we have seen other competitors crop up, including
platforms like Google and Windows and manufacturers like HTC, LG, and Samsung to dip into
the Apple-dominated market. As a consequence, there has grown a large amount of variation in
hardware and software. However, the sudden burst in this market has meant that software and
hardware may be released before proper considerations. Consequently, the issue of security has
not moved fast enough to match the growth of mobile systems. For example, PCs are very
similar to phones, but have an assortment of security features available to users. Robust antivirus software protect users on PCs; however, these are not available on mobile devices. For
example, AVG Antivirus for Android only scans the SD card portion of phones while AVG
Antivirus for PC scans program files as well. AVG Antivirus is not available on Apple iOS
devices at all. The need for security and antivirus software has grown, as an increasing number
of individuals have used mobile devices for personal finance and other sensitive information. In
the future, a tangible move must be made to protect user data on mobile phones.
Data breaches on mobile devices are occurring right before our eyes. Apps can, and
frequently do, ask for unwarranted access to private data. The most egregious examples of this
include the highly publicized collection of location data by simple flashlight apps that only
require access to the camera. Even popular apps such as the popular “Angry Birds” franchise
have asked for unnecessary permissions. An experiment has shown that denial of access to
location services in Angry Birds breaks its functionality, and renders the game unusable
(Leonard).
Breaches can occur behind the scenes as well. Passwords are stored in an encrypted file
deep in the system data of a phone. If encryption is broken, personal information can be
discovered and compromised. Autofill and GPS settings are also a potential danger that are
stored (and can be compromised) in the same way. It is up to the user to ensure that their logins
and passwords are safe by only providing access to reputable browsers and apps.
To take matters into their own hands, many users are using third party software to protect
their data. For example, CyanogenMod is a third-party operating system that can enhance
security. Notable features include WhisperPush software that encrypts text messages (a tool
missing in stock Android), the ability to individually block certain app permissions, and the
ability to install effective ad blockers (“Features”). However, caveats of using CyanogenMod
include the fact that all personal data can be accessed when the phone is connected to a
computer. Furthermore, users must trust CyanogenMod Inc. with their private information.
Solace to some, in the past there has been no evidence of criminal data collection, and the opensource nature of CyanogenMod allows any programming-literate individual to confirm that its
code is not dangerous. To further build on the legitimacy of Cyanogenmod, it has recently joined
in a hardware business venture with OnePlus, a subsidiary of the reputable Chinese company
OPPO. In the future, both first party and third party operating systems will address these issues,
but in the meantime, there are few alternatives.
The problem today is that very few people use third party alternatives. Alternative
operating systems have less than 0.7% of the market share. As a result, it is Apple and Google’s
responsibility to push for greater encryption, who together have 96% of the market share
(“Smartphone OS Market Share”). The NSA has requested backdoors to mobile security for
government use, causing uproar in the media. In direct opposition to their requests, Apple and
Google have discussed turning encryption settings automatically on instead of automatically off.
Encryption is not available on Apple devices, and only available on Android devices in hidden
developer settings. While a concern to some, current data-mining and identity theft methods rely
on sophisticated tools such as Tor and IP, which are tracking much more powerful than anything
on a phone. As a result, encryption of consumer devices should not affect national security.
Encryption in the future should be taken for granted. The best that individuals can do
today is use Android devices and utilize developer settings. In the future, automatic “on” features
should be instituted, and be more available for casual users. Instead of sharing data for
personalization, individuals should be able to personalize data shared. In all, a world with greater
personal security is a world with greater total and national security.
796/800 words
Works Cited
"IDC: Smartphone OS Market Share." Www.idc.com. IDC, n.d. Web. 12 Nov. 2014.
Leonard, Andrew. "Angry Birds, Tracking Device?" Saloncom RSS. Salon, 18 Jan. 2013. Web.
13 Nov. 2014.
"Features." CyanogenMod. CyanogenMod Inc., n.d. Web. 13 Nov. 2014.
Download