An Apple logo at a retail location in San Francisco, 2014. REUTERS
The iPhone battle between the FBI and Apple isn't about getting help unlocking a terrorist's phone. It's about our government forcing Apple to invent a customized-on-demand version of its iOS operating system, effectively stripped of all security and privacy features. Command performance coding. As security researcher Dan Guido describes it in his widely cited technical explainer blog post, what they're asking for is an 'FBiOS.'
After the mass shootings in San Bernardino, FBI investigators seized shooter Syed Rizwan Farook's iPhone. It was his work phone, and the San Bernardino County Department of Public Health gave the government the green light to search their employee's work device. The FBI is having a hard time bypassing the phone's security, which says something great about Apple.
In his explainer blog post, Dan Guido offers a comprehensive technical analysis of whether it's technically possible for Apple to comply with the court's order to do what the FBI demands, and create special software just for the government, coded to the government's specifications, to crack the phone without data loss.
Can Apple do this? Probably. Had Farook used an iPhone 6, this discussion might be different. But yes, what the FBI's asking for looks like it may be technically possible.
But this isn't about whether Apple can do what the government demands. It's about whether they should.
This is the slipperiest of slippery slopes, guys. If you think this makes sense, will you feel the same about the government demanding backdoors or software rewrites in every other technology device or service you use? How about when China demands backdoors in everything? The whole world is watching.
Read Dan Guido's post here, or listen to the Risky Business podcast episode where he discusses his analysis in detail.
Previously on Boing Boing:
• "Rallies planned at Apple stores to protest the FBI's crusade to hack your iPhone"
• "FBI demands iPhone backdoor access; Tim Cook tells them to get lost"
“The Palantir user guide shows that police can start with almost no information about a person of interest and instantly know extremely intimate details about their lives.”
In 2016, EFF sued the US Government on behalf of Andrew "bunnie" Huang and Matthew Green, both of whom wanted to engage in normal technological activities (auditing digital security, editing videos, etc) that put at risk from Section 1201 of the Digital Millennium Copyright Act.
With the rising temperatures on tap this summer, the climate is going to be a frequent topic of conversation, and those conversations won’t be happy ones. Luckily, there’s a way to do a little climate change of your own – in a safe and sustainable way. When it comes to personal air conditioners, EvaPolar is […]
Whether you’re using them for next-level selfies or steady tracking shots, gimbals are a must for anyone who wants to maximize the potential of these powerful smartphone cameras we’re all carrying around. But those smartphones are also supposed to be portable, and let’s face it: Gimbals tend to offset that advantage. Weighing in at just […]
It’s too hot for yard sales, but hey: The internet is here for you. Here are the top ten deals on some of the Boing Boing Store’s best gear, just in time for summer. It’s everything from grills to security cameras to MacBook Pros, and they might be as low as they’re ever going to […]