Google using lock screen passwords to encrypt Android Cloud backups

Haythem Elmir
0 1
Read Time2 Minute, 33 Second

Google’s got your back when it comes to your backups, it says –  and it’s even promising to keep its own peepers off the goods.

On Friday, Google announced that it’s brokered a marriage between Android’s Backup Service and Google Cloud’s Titan Technology to keep your backups encrypted so that even the Googlemeister itself can’t decrypt your stuff.

It’s using its newish Titan security to do that. Rolled out in July, Titan technology includes a tiny USB device – a Yubico-esque security key that offers hardware-based two-factor authentication (2FA) for online accounts to keep them from getting hijacked.

In the case of Android backups, starting with its ninth operating system – that would be Android Pie, released in August – Android devices can take advantage of the new encryption by way of a decryption key that will be randomly generated on the device. The decryption key is encrypted using the user’s lock screen PIN/pattern/passcode, which Google doesn’t know.

That passcode-protected key will then be encrypted to a Titan security chip on a Google server. Google says its Titan chip is configured to only release the decryption key when presented with a “correct claim” coming from a user’s passcode. The Titan chip will keep track of how many attempts are made while inputting a passcode, thus blocking brute-force account attacks.

Google says custom Titan firmware will “strictly enforce” the limit on incorrect attempts. That firmware can’t be updated without erasing the chip’s contents. This will keep anyone – including Google – from getting at your backed-up app data without knowing your passcode, Google says.

Google wants us to trust that this new technology is going to keep snoopers, data thieves and hijackers from getting at your backed-up app data. To earn our faith, the company hired NCC Group to run a security audit on it.

Some issues did crop up, but Google says its engineers fixed them quickly. Here’s a detailed report on NCC’s findings, as well as details on how the new service works end to end, if you’d like to judge for yourself.

Google’s not kidding when it says end to end: the NCC report touches on physically crushing the tiny Titan chip with a grommet press when ready for the scrap yard. These chips are super small, so they actually do have to be given special care to ensure your data goes ten-toes-up if a chip fails.

Google hasn’t listed which Android smartphones are going to get this special Titan encryption/decryption treatment beyond mentioning that they’ve got to be running the latest version of Android 9 Pie.

In other words, if you’re using a Google Pixel, you could well have this already: Google’s hardware chief Rick Osterloh said on Friday that over 75% of Pixel users have already updated to Android Pie.

To read the original article

https://nakedsecurity.sophos.com/2018/10/16/google-using-lock-screen-passwords-to-encrypt-android-cloud-backups/

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Expert disclosed a new passcode bypass to access photos and contacts on a locked iPhone

iOS passionate Jose Rodriguez disclosed a new passcode bypass bug that could be to access photos and contacts on a locked iPhone XS. The security passionate Jose Rodriguez has discovered a new passcode bypass bug that could be exploited on the recently released iOS 12.0.1. A few weeks ago, Rodriguez discovered a passcode bypass vulnerability […]