Back in 2005, before the iPhone, Apple purportedly helped a U.S. Department of Energy contractor modify a 5th-generation iPod to secretly record and store data. The exact reason why remains a mystery, but an ex-Apple engineer involved in the project thinks it could have been a surreptitious Geiger counter.
With hackers becoming increasingly savvy, many Australians have turned to encrypted messaging apps to cloak messages between friends, colleagues and whoever else they’re speaking to. But beyond knowing it’s one of the safest ways to communicate digitally, end-to-end encryption remains a bit of a mystery. Here’s how it works and…
Now you can get the top stories from Gizmodo delivered to your inbox. Enter your email below.
By subscribing you agree to our Terms of Use and Privacy Policy.