Apple aligns with Samsung? The new iPone will have built-in encryption components and private key storage

According to a Bitcoinist report on January 6, Apple's next-generation iPhone series models have attracted everyone's attention. The new iPhone 12 Pro is expected to be released in September this year. Evaluation site PocketLint expects several new features to be added to this series of phones. Will Apple enter the field of encrypted mobile phones this year and compete with its main competitor Samsung?

smartphone-1894723_960_720.webp

Image source: pixabay

iPhone could enter the crypto space

Will Apple really move into the crypto space? This biggest problem remains unknown. The iPhone can of course launch a mobile wallet, which is a basic way of cryptocurrency. But these devices are designed to protect themselves from other encryption-related activities.

In the early days, Apple discouraged mobile-based cryptocurrency mining. The Apple Store is the most popular application hosting library and is fully capable of blocking the distribution of crypto-related applications. But there is a feature in the Apple Development Kit that suggests that Apple is moving towards private-public key encryption.

Built-in encryption component and private key hardware storage function

Apple Crypto Kit is a built-in feature that provides basic key operations. Although this method goes beyond blockchain or cryptocurrencies, it is still a tool to prompt self-signature and achieve cryptographic security.

Apple's Crypto Kit is an advanced encryption and key signing service that can be integrated into applications. But it remains to be seen whether this feature will generate new interest in crypto applications.

Encrypted smartphones have also appeared in the past, but Apple's products are the most sought after. Obtaining basic encryption features may change the rules of the game for self-ownership and data protection. Still, Apple seems to be holding its ground, not allowing any crypto-related applications to enter its store.

So far, Samsung and HTC have enhanced their position in the crypto space by adding wallet functions and built-in key storage to their new series of phones. Samsung Galaxy S10 is the South Korean technology giant's first integrated product in the cryptocurrency field, which has caused a huge response in emerging markets.

Apple's iPhone also has a similar feature called Secure Enclave, which is a separate component for storing private keys without exposing private keys in other data exchanges. In fact, this feature makes the iPhone a secure hardware wallet. This extends the wallet's ability to use private keys in standard memory.

It is rumored that the iPhone 12 series will have four modifications. The design may bring many surprising changes, and the camera may also bring new surprises. But as a powerful encryption tool, its greatest sense of technology is really interesting.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Deep Dive into Uniswap V4: A "Masterpiece" of Decentralized Exchange

Updates to Uniswap V4 could further enhance its position in the DEX space, with the "hooks" feature greatly improving...

Opinion

What do legal experts think of the SBF trial?

If SBF is convicted of one or more charges he is facing, the length of time he will spend in prison will largely depe...

Blockchain

Behind 106 market cases, we discovered the impact of the BTC spot market structure on price discovery

(Onion Note: "Price Discovery refers to the process by which buyers and sellers reach a transaction price for th...

Blockchain

The wave of "absolute deflation" of platform currency is coming. How should the exchange make a choice?

This article Source: Odaily Daily Planet , author: the the Platform currency refers to tokens issued by digital asset...

Blockchain

Guide to secure deposits: How to better hide the Bitcoin in your hands?

In an era of constant economic uncertainty, surveillance, professional cybercrime, and hacking, knowing how to more s...

Opinion

What happened during the first week of the SBF case in a comprehensive article?

In the first week of the trial, SBF found itself in a difficult situation with almost all the testimonies and public ...