TechCityMall

Get educated, inspired, and triggered in buying decisions across an array of tech-related product and service categories.

  • Home
  • Advertise Here
  • Privacy Policy
  • Contact Us
  • About Us


NG-[C:G.Prom,B:TWTW15,Wk:5015,Dim:320X50]:12:12


2/18/2016

Google, Microsoft back Apple on encryption; Trump blasts Apple

2:13:00 PM  NEWS  No comments


CookFace 
 Earlier this week, a federal judge ordered Apple to provide the FBI with a custom version of its operating system that can bypass the encryption Apple built into iOS 9 and prevent the phone from deleting its own data after 10 failed attempts to unlock the hardware. Apple’s CEO, Tim Cook, released a strongly-worded letter in which he vowed to fight the order in order to protect Apple customers’ right to privacy.
Now, other major voices in the tech industry are publicly backing his statements, while politicians decry Apple’s actions. Google’s CEO, Sundar Pichai, released a statement of his own, saying: “We build secure products to keep your information safe and we give law enforcement access to data based on valid legal orders,” Pichai tweeted. “But that’s wholly different than requiring companies to enable hacking of customer devices and data. Could be a troubling precedent.”



Sundar Pichai
Google CEO Sundar Pichai
The Reform Government Surveillance organization, of which Microsoft is a member, released a statement that indirectly backed Apple, even if the group didn’t mention the company by name. It recognizes the need for legitimate law enforcement activities, but states: “[T]echnology companies should not be required to build in backdoors to the technologies that keep their users’ information secure. RGS companies remain committed to providing law enforcement with the help it needs while protecting the security of their customers and their customers’ information.”

Donald Trump weighs in

None of this sat well with Donald Trump. During an interview on Fox and Friends, the presidential candidate blasted Cook for his stance on encryption. “To think that Apple won’t allow us to get into her cell phone, who do they think they are? No, we have to open it up.” (The phone in question actually belonged to Farook, the man involved in the San Bernardino shooting, not his wife, Tashfeen Malik.)
Donald
“I agree 100% with the courts,” Trump said. “In that case, we should open it up. I think security overall — we have to open it up.”
I suspect Trump’s statements will resonate with many people, if only because the San Bernardino shootings, which killed 14 people, were the worst terrorist attack within the United States since 9/11. The FBI wants Apple to unlock a terrorist’s property so it can conduct counter-terrorism operations. Why would Apple stand in the way of that?

Why Apple won’t back down

It’s important to understand the precedent the government is attempting to create with this case. Apple has been ordered to create a modified iPhone software file that does three things:
1). Bypass or disable the auto-erase feature that deletes all phone data after 10 incorrect login attempts.
2). Enable the FBI to automatically submit mass codes in an attempt to crack the device without being required to type them on-screen.
3). The software must not introduce a delay between entering passcodes other than that required by the underlying hardware.
The court order mandates Apple must customize this software in a way that only allows it to run on the target device. This is clearly meant to assuage concerns that the software might be deployed indiscriminately — but it’s not clear that Apple can actually implement that restriction in a way that absolutely guarantees the file couldn’t be modified to run on other devices.
Apple, in other words, is being ordered to create software that deliberately compromises its own product’s security. While the judge clearly believes that the software can be kept from leaking to the Internet, history tends to suggest otherwise.
Thorin
Magic backdoors that only open for the right key one day of the year belong in stories about elves and dragons

Once this precedent is set, it will be used. Again, history is an effective guide. Law enforcement officials in the United States have justified extensive surveillance programs and data sweeps because the 1979 case Smith v. Maryland allowed investigators to install and use pen registers. A pen register is a device, typically installed at a telephone company’s central offices, that records the outgoing phone numbers dialed by a single user (but not the conversations).

Nothing in the text of the Smith v. Maryland decision suggests that the justices envisioned a future in which their ruling would be used to justify mass surveillance of the entire Internet. Yet here we are.
Apple isn’t fighting this order because it wants to shield terrorists or prevent the FBI from investigating this specific case. It’s fighting the order because it knows that if the order stands, it will be flooded with demands for device unlocks both in the United States and abroad. The software will eventually leak, it will be abused by law enforcement, and the end result will fatally compromise iDevice security. Google, Microsoft, and every other smartphone vendor will be roped in, in very short order. The government would doubtlessly order Intel, ARM, and every other security vendor to implement similar procedures in their own products (think TPM on Intel systems and ARM’s TrustZone).

Device security is challenging enough already. Forcing companies to compromise their own encryption standards in the name of safety will not improve the situation.

Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home
Related Posts Widget

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Social Profiles

TwitterFacebookGoogle PlusLinkedInRSS FeedEmail
  • Popular
  • Tags
  • Blog Archives
  • Accessories
  • GAMING
  • LAPTOP
  • NEWS
  • REVIEW
  • SCIENCE
  • SELF-EDUCATION
  • Software
  • Tutorials





Namecheap.com
  • Science Says It’s More Than How You Look that Makes You Attractive
    Attractiveness is more than just physical beauty. It is...
  • PhoneRescue Free Download
    PhoneRescue Free Download Latest Version for Windows. It is...
  • Storytelling may be the secret to creating ethical artificial intelligence
    ...
  • New teardown reveals Surface Studio packs ARM CPU core, upgradable storage
    ...
  • Samsung unveils next-generation 960 Pro, 960 Evo M.2 SSDs with blistering speeds, up to 2TB capacity
    ...


NG-[C:G.Vide,B:Allbrand,Wk:5015,Dim:160X600]:Televisions


Ads

Become Expert In Laptop Motherboard Repair!

American Trained Expert Takes You Step By Step Through Repairing Laptop Mb. Diagnosing Faults,troubleshooting Motherboard Power Problems, Upgrading, Component Level Repair, Removing Ics.

About Me

Unknown
View my complete profile

Contact Form

Name

Email *

Message *



NG-[C:G.Comp,B:Allbrand,Wk:5015,Dim:336X280]:Tablets


Archive

  • ▼  2016 (72)
    • ►  November (5)
    • ►  October (1)
    • ►  September (6)
    • ►  July (17)
    • ►  May (1)
    • ►  April (1)
    • ►  March (6)
    • ▼  February (24)
      • Is the $4 Freedom 251 Android phone a scam?
      • Microsoft HoloLens up for pre-order today, if you ...
      • Raspberry Pi 3 launches with faster 64-bit process...
      • Here’s why we don’t have light-based computing jus...
      • Far Cry Primal looks great on consoles, but it’s j...
      • It’s all about precedent: Justice Department wants...
      • Samsung Galaxy S7 vs. S6 vs. S5: How does the new ...
      • AMD clobbers Nvidia in updated Ashes of the Singul...
      • No, mobile GPUs (still) aren’t going to catch dedi...
      • Diesel passenger car sales go on life support — ju...
      • Avast set up rogue hotspots at Mobile World Congre...
      • NASA simulates ‘extreme failure scenario’ to test ...
      • The Windows 10 Store still isn’t working out for M...
      • 25 best Android tips to make your phone more useful
      • How to increase Wi-Fi coverage throughout your who...
      • Vulkan API reaches 1.0, claims broad API support, ...
      • Samsung announces new 14nm, octa-core SoC: Exynos ...
      • Google, Microsoft back Apple on encryption; Trump ...
      • New iOS 9.2.1 update un-bricks iPhones, fixes ‘Err...
      • A Tablet or Smartphone Could Power Your Next Laptop
      • Fallout 4 is a great game but a terrible RPG
      • Star Citizen splits single-player, MMO into separa...
      • Storytelling may be the secret to creating ethical...
      • Which compact SUV has the best all-wheel-drive sys...
    • ►  January (11)
  • ►  2015 (266)
    • ►  December (256)
    • ►  November (10)
NG-[C:G.Prom,B:Allbrand,Wk:4915,Dim:300X250]:Home_Page

 
Copyright © 2025 TechCityMall | Powered by Blogger
Design by Robin Khay | Blogger Theme by