Home > Uncategorized > Apple vs the FBI

Apple vs the FBI

February 18, 2016 Leave a comment Go to comments

All reasonably modern Apple devices have very good built-in security. If you were worried that your iPhone, or iPad, or Mac (if it is set up correctly) can be “cracked” and all the information on it be made readable then fear no more. Obviously even the FBI can’t crack an iPhone and neither can Apple.

We know this because the FBI have an iPhone 5c which belonged to one of the perpetrators of the recent terrorist attack in San Bernardino. But they can’t get into it and neither can Apple even when the FBI asks them to.

So now the feds want Apple to create a new version of the operating system which disables the automatic deletion feature when the PIN code is incorrect after 10 tries. In fact they have a court order which forces Apple to do this. But Apple has so far refused and will appeal the decision.

But why? Why would Apple want to protect a terrorist’s information when they could instead help with the investigation? Is it because they don’t want to waste the time and money on a project which has no benefit to them? Do they want to protect any guilty parties or hinder the investigation in some way? Or do they want to protect their customers and maintain the security of the platform?

I think it’s obvious that the first two options really don’t make sense so it seems that Apple really do want to make a stand here on behalf of the users and not compromise the security and privacy they currently have.

It’s actually quite a courageous position because I am fairly sure that almost any other company would have simply complied with the legal requirement of cooperation and helped break the security.

So it might be courageous but is it wise? Shouldn’t Apple be prepared to sacrifice privacy in this one case to help with the investigation of a serious criminal event? Probably not, because whatever the feds say, this will not be the only time they use an ability like this and it’s unlikely to remain with an organisation which ostensibly represents the “good guys”.

There are two clear problems if a way is created to bypass security: first, the official law organisations will almost surely use it for illicit purposes such as stealing private data belonging to political opponents of the government; and second, the technique will equally surely find its way into the hands of the real bad guys (that is the bad guys who are even worse than the good guys, who are often quite bad themselves).

This is a rare case where someone is actually doing what I have suggested is everybody’s obligation: do do what is right rather than what is legal. And, although there are many things I criticise Apple for, I think this is an example of where they do have standards far above most other corporations. For doing what’s right I give them full credit.

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: