Threats in Cell Phone Encryption