FBIBuildingWashingtonDC

There are two important lessons in this week’s announcement that the Federal Bureau of Investigation has finally succeeded in cracking two mobile phones belonging to Mohammed Alshamrani, the aviation student who killed three people last December at a naval base in Pensacola, Florida.

Thank you for reading this post, don't forget to subscribe!

The first lesson is that cracking an encrypted device takes time and effort even when the federal government brings all its resources to bear. The second is that Apple still refuses to build tools to make hacking its mobile devices easier…

That breaking into a locked mobile device takes time and effort is one of the few guarantees we have that the government will only rarely invest the resources needed to do it…

I’m told that behind closed doors, much of Silicon Valley thinks Apple is wrong to be so intransigent. Cooperation with law enforcement is routine among U.S. businesses; some techies see no reason for Apple to get a pass. Although I see the point, I continue to find the company’s position attractive. I’m left uneasy by the notion that privacy should be restricted because bad people might misuse it.

Still, the pressure has had its effect. Although Apple steadfastly refuses to build a back door into its mobile devices, earlier this year, the company abandoned plans to allow iOS users fully encrypt their iCloud data. Given that iCloud has an estimated 850 million users — and that the service is the only practical way to back up an iPhone — this is no small concession.

To read the rest of the article, click: https://macdailynews.com/2020/05/22/nope-apple-still-wont-help-the-fbi-break-into-iphones/

About Post Author

(Visited 17 times, 1 visits today)


Advertisement


Discover more from CompuScoop.com

Subscribe to get the latest posts sent to your email.

Catch up on what you’ve missed:

Verified by MonsterInsights