Silicon Valley has Increased Datacenter Connectivity Security

In the past week, US Homeland Security Secretary Jeh Johnson warned that encryption made it almost impossible to find criminals and terrorists and that iPhones will become the “device of choice” for terrorists. Furthermore, the UK’s leading counter-terrorism official said tech companies are creating systems that are “friendly to terrorists.”

Authorities on both sides of the Atlantic are cracking up for the reason that they will no longer as easily be able to seize your data with or without a warrant.

Since last year, Silicon Valley technology giants such as Google, Apple, Yahoo and others have increased datacenter connectivity security and enacting end-to-end email encryption.

 Apple took a greatest step forward by  encrypting its devices in such a way the government could no longer ask it for data. Google has currently included this option to its own Nexus-branded devices.

The executive chairman of Google, Eric Schmidt said at an event in San Francisco on Wednesday the responses were “proof” that its efforts to lock out the government are working.

Schmidt himself noted at the event that “Companies are required to follow the letter of the law.” That means whenever they are compelled to hand over data, they must adhere to the law. But the drive to “encrypt all the things” means they can’t hand over anything because the users themselves have the decryption keys.

These tech companies have little option but to toughen the hatches and lock the government out, as far as when they are pressurized to drop encryption making everyone more vulnerable to hackers and state-sponsored attackers.

However the wistful reality is that people cannot trust the government to put privacy first over its surveillance operations. Instead they will be trusting Silicon Valley giant to look out for them.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...