End-to-end security
About a decade ago, we stored our music on tapes and disks; our pictures resided in albums, and we used a phone for emergency purposes only. Fast forward to today; more and more of our lives are going digital. Our friends, families, likes, dislikes, pictures, contact lists, and even our purchase histories and credit card numbers are going digital. Imagine the scenario where a user loses their phone. Besides the monetary value of the device and emotional value associated with content stored on it, the biggest risk is the compromise of the user's personal information that is stored on the device. This information could include PII, which can identify an individual such as name, social security number, date of birth, and mother's maiden name. It could also include access to passwords, contact list, and SMS data. This risk lurks even if the user who is in possession of the device and the device is compromised due to malware.
The mobile ecosystem
As illustrated in the following...