As we mentioned a US court ordered Apple to create a backdoor, namely the new version of iOS. Its installation on the iPhone 5C belonging to a terrorist who with his partner murdered last year 14 people during the shooting, would, according to the authorities, to make the data unreadable.
Read also: If you see it on the screen of your computer better than get ready at once thick cash …
Apple claims that it does not meet the expectations of the court for two reasons. First create a backdoor, which would serve to familiarize themselves with the contents of your phone this particular terrorist is actually to create a key that can open the “hundreds of millions of iPhones.” Secondly, according to Apple’s security built into the latest iPhone simply can neither break nor get around. If you want to turn it on its own device, , we encourage you to read our handbook.
Serious accusations Daily Mail
Daily Mail his yesterday’s material, however, accuses Apple is that not playing the whole matter clear.
“Apple refused FBI to break into the iPhone belonging to Syed Farooka (the perpetrators of the massacre last year – ed.), while earlier there was resistance by releasing at least 70 produced by myself devices. “
Newspaper raises serious accusations and asks: how is it that before privacy was not that important, and in this situation it is for Apple so important?
photo. Apple
“It’s not like”
Tech Crunch portal technology, responds to these accusations and defends Apple. He says that it is a misunderstanding that results from ignorance of technology.
So far, Apple, at the request of the services supporting the appropriate paragraph, only the data was coming from iPhones. Same Device remained locked , but their data could be within a certain range to obtain, because they were not encrypted. The situation was so the FBI or another service point to the Apple device, the court appeared in this regard judgment, and Apple, not unlocking the device itself, mined data.
Privacy in the price
devices, which Apple data pulled run on older versions of iOS. However, eg. A message in iMessage, Apple communicator, in the current version of the encrypted. Why? After the revelations disclosed by Snowden, after a lot of press denunciations of it as Google, Microsoft and Apple co-operate with the authorities in the transmission of data, technology companies need to come down on either side. Privacy began to be included in the price. That’s why Apple took the side of their customers and gave them an effective tool for blocking access to information. Access to them no one: neither thieves nor the cybercriminals, or the FBI or NSA. If it were otherwise there would be no judgment ordering the Apple iPhone breaking.
FBI demands universal key
The case is therefore different Farooka – the data on the device is encrypted. FBI de facto demands from Apple: Create a key that will unlock the phone, and thus make data encryption ineffective. The FBI does not explain, however, already, that exactly the same key you can unlock any iPhone, without recourse to the Apple out of control.
In fact, the FBI demands from Apple that the company abandoned the encryption iMessage messages that made the data will be available, and the password to the device susceptible to brute force. In the current version of the system is not vulnerable, because after 10 unsuccessful attempts, the phone recognizes that one to him breaks and erases stored data.
And therein lies the secret, the Daily Mail does not understand. Data stored on the iPhone terrorist, as well as the data of people using the latest Apple smartphone are encrypted. Previously, they were not, therefore, impossible to recover them without giving the FBI universal key.
It is therefore necessary to assess whether the secrets that hides iPhone 5C belonging to the bomber is worth the price that they have paid all users of iPhones? Or maybe it is different – our privacy is less important than the life of even one person that could be saved if the service had unlimited access to our data. With this dilemma we will struggle for a long time.
No comments:
Post a Comment