- Twitch star Amorounth caught driving while streaming 3 Years Ago
- John Mulaney rails on e-scooters after ‘baby boomer’ nearly hits his dog 3 Years Ago
- How to stream Chelsea vs. Newcastle 3 Years Ago
- How to stream Atletico Madrid vs. Valencia 3 Years Ago
- ‘Bully. Coward. Victim.’ dives deep into the life of an ‘evil’ man 3 Years Ago
- Paul Rudd acts his tail off in Netflix’s ‘Living With Yourself’ Today 8:15 AM
- Amazon’s ‘Modern Love’ adaptation feels like an ad for love Today 7:00 AM
- Paul Dano will play the Riddler in ‘The Batman’ Today 6:59 AM
- How Fakku pulled classic dating game True Love ’95 out of licensing hell Today 6:00 AM
- This Twitter account is parodying Amazon customer service Thursday 8:52 PM
- How to live stream Oleksandr Gvozdyk vs. Artur Beterbiev Thursday 7:00 PM
- Shaggy says an online scammer is impersonating him Thursday 6:53 PM
- IRL Barbie Malibu Dreamhouse available to rent on Airbnb Thursday 6:16 PM
- Men’s Humor trolled for unknowingly tweeting Grindr conversation Thursday 5:29 PM
- How to stream Dominick Reyes vs. Chris Weidman Thursday 5:00 PM
The vast world of cybersecurity features secret portals of access to the deep web and undocumented encryption backdoors that most people look past unknowingly. It’s a bit difficult to wrap one’s head around the terminology in recent news on data breaches and secret servers, especially when the term “backdoor” has several definitions.
A backdoor in a computer system or other software is a portal that administrators can go through to help with troubleshooting. Here’s where it gets tricky: That same portal can be exploited by hackers and governmental entities to gain unauthorized information—and sometimes they’re added intentionally for that very purpose. Backdoors are typically undocumented and are kept a secret; otherwise, the software it’s embedded in will become vulnerable to hackers and viruses.
Although it puts the software or computer at risk for a breach of data, software developers can manually build a backdoor into any software or computer for easy access to information regarding the program. These administrative backdoors are typically secured through a set of private usernames and passwords.
When it comes to encryption, however, backdoors are particularly problematic. Encryption’s job is to keep data secret except for those who hold the keys. Encryption backdoors are weaknesses in the code that allow any person with the right skills—like the FBI, NSA, or independent hackers—to access the private data anyway.
The term backdoor has surfaced in the mainstream throughout recent years as the U.S. faces national security issues, particularly after lawmakers proposed a mandate for backdoors in encryption. The bill, however, was hotly debated by many, including President Barack Obama‘s White House, FBI Director James Comey, and NSA Director Michael Rogers. Backdoors also caught interest internationally, as Russia may soon be implementing required backdoors to social media apps like Viber, WhatsApp, and Telegram.
In short, backdoors make systems inherently insecure, and that’s especially problematic when it comes to encryption. If you leave a key under your doormat, eventually, the wrong person is going to find it.
Backdoors aren’t just for software makers. Attackers can also create their own backdoor, allowing them go through their victim’s computers whenever they want to, stealing their private data along the way.
That’s a terrifying thought, of course. If you’re looking to improve your own security, check out some of our personal guides:
Kristen Hubby is a tech and lifestyle reporter. Her writing focuses on sex, pop culture, streaming entertainment, and social media, with an emphasis on major platforms like Snapchat, YouTube, and Spotify. Her work has also appeared in Austin Monthly and the Austin American-Statesman, where she covered local news and the dining scene in Austin, Texas.