An Apple logo at a retail location in San Francisco, 2014. REUTERS
The iPhone battle between the FBI and Apple isn't about getting help unlocking a terrorist's phone. It's about our government forcing Apple to invent a customized-on-demand version of its iOS operating system, effectively stripped of all security and privacy features. Command performance coding. As security researcher Dan Guido describes it in his widely cited technical explainer blog post, what they're asking for is an 'FBiOS.'
After the mass shootings in San Bernardino, FBI investigators seized shooter Syed Rizwan Farook's iPhone. It was his work phone, and the San Bernardino County Department of Public Health gave the government the green light to search their employee's work device. The FBI is having a hard time bypassing the phone's security, which says something great about Apple.
In his explainer blog post, Dan Guido offers a comprehensive technical analysis of whether it's technically possible for Apple to comply with the court's order to do what the FBI demands, and create special software just for the government, coded to the government's specifications, to crack the phone without data loss.
Can Apple do this? Probably. Had Farook used an iPhone 6, this discussion might be different. But yes, what the FBI's asking for looks like it may be technically possible.
But this isn't about whether Apple can do what the government demands. It's about whether they should.
This is the slipperiest of slippery slopes, guys. If you think this makes sense, will you feel the same about the government demanding backdoors or software rewrites in every other technology device or service you use? How about when China demands backdoors in everything? The whole world is watching.
Read Dan Guido's post here, or listen to the Risky Business podcast episode where he discusses his analysis in detail.
Previously on Boing Boing:
• "Rallies planned at Apple stores to protest the FBI's crusade to hack your iPhone"
• "FBI demands iPhone backdoor access; Tim Cook tells them to get lost"
An investigation by Propublica and Bayerischer Rundfunk found 187 servers hosting more than 5,000,000 patients' confidential medical records and scans (including a mix of Social Security numbers, home addresses and phone numbers, scans and images, and medical files) that were accessible by the public, "available to anyone with basic computer expertise."
Of course they announced it at the end of the day on Friday, that’s what you do with bad news.
Iowa state court officials contracted with Coalfire to conduct "penetration tests" on its security; as part of those tests, two Coalfire employees broke-and-entered the Adel, Iowa courthouse, and were caught by law-enforcement, whose bosses in Dallas County were not notified of the test.
If you’ve worked in any high-performing engineering lab, you already know about MATLAB. This computing environment and the language that powers it is perfectly suited to science and math, with an interface that makes it easy to express and visualize complex algorithms – not to mention an infrastructure that lets it easily work with other […]
Studies have shown cannabidiol (more popularly known as CBD) to be effective in two main areas: Pain relief and stress relief. Both of those make the non-psychoactive, cannabis-derived compound a natural for topical creams. There’s no shortage of CBD products out there, but here’s eight of our favorites, all specifically designed for dermatological use – […]
If you’re part of the maker community, you know Make:. Though Make: magazine is off the shelves as of this year, the eBooks and resources put out by Maker Media are still a fantastic resource for the new generation of tinkerers, hackers, and robotics geeks. If you’re in that tribe, listen up: they’ve released a […]