ShortBytes: In response to the Federal court order which was issued to Apple, the maker of iPhone, to help the FBI hack iPhone of one of the San Bernardino shooters, Apple CEO Tim Cook has responded very strongly saying that it would set a “dangerous precedent.”
Initially, FBI tried to hack into the accused iPhone 5C but they were unsuccessful for weeks, and finally, they made an appeal to the Federal court that the maker of the phone should assist them creating a backdoor to retrieve the data.
Tim Cook has already asserted that the company has helped the FBI wherever it was possible for them. But in the matter of creating a “backdoor” to its operating system, Tim cook has an explanation. Here is an excerpt from the same.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
In today’s digital world, the ‘key’ to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge. The government suggests this tool could only be used once, on one phone. But that’s simply not true.
Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
What is your opinion on this? Should FBI be given ‘Backdoor’ access to the iPhone? Or they should ask the ‘Owner’ not the ‘Maker’?
Short Bytes : Windows 10 is released for all with lots of good features. On the other hand, its privacy policies are being criticized. But, there are some simple ways and tweaks in settings that will stop this Windows 10 spying, making your Windows 10 experience more comfortable. indows 10 is now out in the…
Short Bytes: A teenager student from Gilbert recently broke into the email account of his teacher and used it to send pornographic images to other teachers, students, and parents. The school has now disabled the email accounts and an investigation is being carried out by the FBI and local police.
Short Bytes: The security researchers have found a malware that uses stealthy techniques to perform monetization by injecting ads. Called Stantinko, this malware also has the power to install additional modules to gain complete administrative control. Stantinko installs two malicious extensions, which seem to be legitimate, for performing advertising fraud. he security researchers at ESET have uncovered a stealth…
Do you know that not all web sites honor the native Do Not Track feature of your web browser? Even in the incognito mode, websites can still collect some data from you. Recently in a blog post, Mozilla wrote that with the Tracking Protection feature enabled, the decrease in page load time is as high…
Short Bytes: There’s no sign that the USA president-elect, Donald Trump, has given up his personal Android device. The security experts have called his regular Android smartphone a security threat to the USA and its allies. While Trump wishes to continue using his personal phones, this won’t be possible due to the high risks involved….