Be the most informed person in the room with Newsy's free e-newsletter

View our privacy policy:
Trump's Conflicts of Interest
Featured Series: Trump's Conflicts of Interest
Donald Trump's international web of businesses creates unprecedented potential for conflicts of interest and corruption. And some picks for his administration might have to face their own...

How Smartphone Encryption Works

New operating systems have a built-in form of encryption that Apple and Google say they can't break — even when law enforcement wants in.

This video is part of a wider Scripps News investigation. Read the full report here.

Encryption isn’t just for espionage. It’s actually all around us.

On a basic level, your smartphone encrypts your texts, notes and other data whenever it’s locked, making them unreadable. It’s your password (or your thumbprint) that acts as the key to access and decrypt all that information. 

That key turns encrypted cipher text into the plain text that we can actually read, based on an algorithm that’s unique to the device and to the key. All this happens without much effort on our part. But something that simple can keep police and even federal agencies from accessing a phone’s data.

Historically, only two parties have had the key: the user and the company behind the hardware. But with new operating systems, that’s changed. Now, companies like Apple say even they don’t have the ability to decrypt their customers’ phones.

Featured Stories
Mike Pompeo and Rex Tillerson

Pompeo Confirmed For CIA Head, Rex Tillerson Approved By Senate Panel

People on the National Mall.

Supporters, Detractors Describe Hopes For Trump's Presidency In 1 Word

Donald Trump signs a memorandum.

With The Stroke Of A Pen, Trump Pulls The US From The TPP

Want to see more stories like this?
Like Newsy on Facebook for More Politics Coverage