Apple CEO Tim Cook stood firm on his stance on encryption while attending Utah Tech Tour, a trade and advocacy group which represents 5000 or more lif-sciences and technology companies across the state.
According to Salt Lake Tribune, Tim Cook said, “We believe the only way to protect both your safety and privacy from a cyber attack is to encrypt. Encryption is inherently great. And we would not be a safe society without it.”
Encryption is an algorithm that scrambles your communication and data unreadable except to those with the right, correct key.
Apple has fought with the U.S. government in court cases on whether the FBI of the state can force the company to write back door codes to break its iPhone encryption in a criminal investigation. The case was resolved without the conclusive result of the legal question of whether the government holds this authority.
According to Business Insider, ‘This is one of the biggest issues that we face today,” Tim Cook said. “Encryption is what makes the public safe. As you all know, there are people kept alive because the grid is up. If our grid goes down, if there was a grid attack, the public’s safety is at risk” — hence the necessity for encryption to protect it.
“You can imagine defence systems need encryption because there are a few bad actors in the world who might like to attack those.”
At the question and answers session at Utah Technology Council, Cook kept the emphasis on the encryption that it does more than just protect your iPhones. It also helps to protect the entire defence system and the US power grids,
Share this article
About the Author
Peter Buttler an Infosec Journalist and Tech Reporter, Member of IDG Network. In 2011, he completed Masters in Cybersecurity and technology. He worked for leading security and tech giants as Staff Writer. Currently, he contributes to a number of online publications, including The Next Web, CSO Online, Infosecurity Mag, SC Magazine, Tripwire, GlobalSign CSO Australia, etc. His favorite areas Online Privacy, AI, IoT, VR, Blockchain, Big Data, ML, Fintech, etc. You can follow him on twitter.
More from Peter ButtlerRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...