From larger screens to a new way to make purchases, the Apple faithful have a lot to be excited for when it comes to the iPhone 6 and the iPhone 6 Plus. Despite the higher definition display and new features, Apple users do need to be aware of a few issues when switching to the iPhone 6.

Moving from iOS7 to iOS8

iOS8 is part of the iPhone 6 package, bringing a variety of features to the table like hands-free Siri operation by voice command and new photo-editing tools. Upgrading to the iPhone 6 can be made easy for Apple users if a complete backup of the old phone is made then restored on the new phone. This is great since it makes the switch easy for users but it still presents the risk of data being stolen from the old phone despite the encryption. Some experts like Wondershare note that personal data can still be stolen and suggest a military grade secure deletion utility. Using a military grade secure deletion utility will cost more than trying to manually delete data but will yield more secure results in the end.

Apple system security

Apple published a security white paper to address concerns about its Touch ID system and like features giving a better understanding on how the company makes its promises on device security. Apple has built its system security so that both software and hardware are secure across all core components of every iOS device. Its system security includes software updates, boot-up process, and secure enclave which is central to security in iOS with the aim of not getting in the way of device usability.

Security is the main focus for the iOS platform in Apple’s efforts to build the best possible mobile operating system, taking lessons learned from past years of design and desktop environment experience. Most of Apple’s security features are running by default to make it easier for users to have a secure experience.

Touch ID

Touch ID is a feature relatively new to Apple devices with the goal of providing a simpler, more intuitive experience to secure a device. It’s a fingerprint sensing system which started with the iPhone 5s with the ability to read fingerprints from any angle. Touch ID learns more about the user’s fingerprint over time as the sensor expands the fingerprint map as more overlapping nodes are identified with each touch. It’s more practical than a passcode because the user won’t have to frequently type in multiple digits. The iPhone 6 immediately locks when the Sleep/Wake button is pressed when Touch ID is enabled. Due to its flexible programming, Touch ID can be trained to recognize up to five different fingers. If the wrong fingerprint is attempting to access the phone, a passcode is required as a security backup.

Users can also configure Touch ID to approve purchases from the iTunes Store, iBooks Store, and the App Store. Authentication tokens are exchanged between the Apple device and store in the process.

Hardware security features

Every Apple device uses a AES 256 crypto engine built into the DMA path between the flash storage and main system memory, increasing file encryption efficiency. SHA-1 is included in the hardware to reduce cryptographic overhead. Apple also puts a high focus in file data protection using what’s called Data Protection to further protect data stored in flash memory on the device. It allows devices to respond to common events like incoming phone calls but still maintains a high level of security. By using passcodes, an Apple user automatically enables Data protection supporting four-digit alphanumeric passcodes. The passcode is connected with the device’s UID increasing device security. For more on Hardware security features, read the security white paper.

Apple Pay

Coming in October, Apple Pay eliminates the need to carry around a wallet or risk losing credit and debit cards turning the consumer experience into a single touch. Credit card and debit card fraud resulted in losses up to $11.27 billion in 2012, which Apple Pay can play a major role in reducing by improving its network security.

iPhone 6 and iPhone 6 plus security

With the developments of the iOS security protocols, the latest iPhones will prove to be the most secure phones in Apple’s smartphone line. Expect to see more improvements as Apple continues to build its systems with security as the main focus.

Rik DelgadoRick Delgado- I’ve been blessed to have a successful career and have recently taken a step back to pursue my passion of freelance writing. I love to write about new technologies and keeping ourselves secure in a changing digital landscape. I occasionally write articles for several companies, including Dell.

(Image source: Flickr)

Previous post

The Cold, Hard Data Behind the Ice Bucket Challenge

Next post

BuzzFeed Acqui-Hires Bitly Co-Founder's Torando Labs to Build its Data Infrastructure Tools