https://buy-zithromax.online buy kamagra usa https://antibiotics.top buy stromectol online https://deutschland-doxycycline.com https://ivermectin-apotheke.com kaufen cialis https://2-pharmaceuticals.com buy antibiotics online Online Pharmacy vermectin apotheke buy stromectol europe buy zithromax online https://kaufen-cialis.com levitra usa https://stromectol-apotheke.com buy doxycycline online https://buy-ivermectin.online https://stromectol-europe.com stromectol apotheke https://buyamoxil24x7.online deutschland doxycycline https://buy-stromectol.online https://doxycycline365.online https://levitra-usa.com buy ivermectin online buy amoxil online https://buykamagrausa.net

Building back doors to encryption

I'm not normally a fan of Apple or its business practices, but I fully support Cook's resisting an order to create a version of iOS that could bypass phone encryption. The FBI's assertion that this is a "one time only" thing, to break into a phone belonging to the San Bernardino shooters, is a laugh; once done here, it will be done on any phone that the FBI thinks is part of an investigation; once in law enforcement, it will quickly make it into the wild (you think the Chinese wouldn't like to be able to do this?), and thence into the hands of non-governmental bad actors.

Is it frustrating that murderous thugs like those shooters have secrets that can't be gotten to? Sure. But law enforcement's automatic answer — we need to know anything about anyone at any time — needs to be pushed back against, both to protect against abuse by the government, and to prevent the same tools from being available to hackers, unfriendly governments, businesses, and the like. As important as a posthumous anti-terror investigation may be, it pales in the face of the potential costs.




Tim Cook Says Apple Will Fight Court Order to Unlock iPhone

View on Google+

33 view(s)  

One thought on “Building back doors to encryption”

Leave a Reply

Your email address will not be published. Required fields are marked *