Encrypt your mobile: advantages and disadvantages

Encrypt your mobile: advantages and disadvantages

Encrypt your mobile: advantages and disadvantages

” Maybe it is good that you encrypt the mobile phone .” Have they ever told you the previous sentence? As soon as you have a friend who controls this topic, surely they have mentioned it to you sideways in a conversation. Encrypting the smartphone is one of the ways that our security is safer than ever , but is it really that good? We tell you positive and negative points , as well as an encryption guide for it.

The positive

The positive point of encrypting your mobile phone is easy: security. At the same time that you want to put more walls than ever before to the content of the smartphone, it becomes an almost impregnable place (which does not mean that someone with knowledge breaks the security, of course).

For example, when we encrypt the mobile it is achieved that all photos, videos, documents or banking applications have an unlock code to be used . Therefore, either we know the digits necessary for operation or you will not be able to access them. In addition, to this we must add that all files will appear as characters in case you want to extract them.

Which smartphone is the best for security and privacy?

The negative

One may think that with such security, nothing is bad, right? Well no, encrypting the mobile phone has its downsides too. One, for example, is that the terminal uses more resources , so if you have a low-end one, it is possible that it slows down too much and its operation is not so stable .

On the other hand, it is also complex to return to the previous system, to such an extent that in some devices there is no choice but to return to the factory state with all that it entails . Also, don’t forget that encrypting your mobile will force you to enter passwords even when you want to see a photo …

How to do it

To encrypt an Android mobile phone it is only necessary to carry out the following steps: go to the Security section and click on the field that allows the device to be encrypted. As simple as that.

It is necessary to have a terminal unlock password, which will be the same that will be used for this encryption.

By the way, the process takes about an hour …

Leave a Reply

Your email address will not be published. Required fields are marked *