Find a Question:
The FBI ordered Apple to provide rear doors to spy on users’ data and Tim Cook respond strongly
Federal Court ordered the US company Apple to obey orders and requests to the FBI in providing rear doors allow spying on iPhone mobile data users.
And it comes on the back of the court orders currently under way in the case of the terrorist bombing in the city of San Bernardino, Calif., Where the court has been able to reach the phone one of the defendants investigations, the iPhone 5C, but unable so far to bypass a blocked phone encryption.
The court suggested to the Apple help FBI agents by providing a back door to run any OS iOS, you are working with iPhone mobile system, that this door is also protected and insured have to use one-time only on a single machine, where you can not exploit the same key to decrypt data on the devices again.
Shortly after the court ordered the deployment of Tim Cook, the current CEO of Apple, an official letter on the Apple site where the court is harshly criticizing, saying that the request by her far cry from the mental logic.
Tim began his letter where he said that the United States government has asked Apple took an unexpected move threatens the security of users, which is a far cry from the terrorist attacks, which Apple has participated in all voluntary step in its investigations.
And Tim said that the smart phones, lead by phone iPhone, has become an integral part of the user’s life, where he stored a large group of represented personal information data, and images, in addition to the notes, calendar, contacts, without the user’s health data private financial data is discarded.
Because of the importance of these data, rests with Apple responsibility encrypted to protect it from hackers and prevent them from reaching them, stolen or used without the knowledge of their owners, where users of Apple devices company is expected to make every effort in order to protect their privacy on the Internet and their personal data.
Tim said that Apple has for many years been engaged for users to encrypt data in the belief that the only security solution to protect them, which also requests data on Apple’s lock itself, to remain between the user and his computer only, without the presence of any foreign power to them.
And elaborated Tim in his letter, saying that Apple has expressed deep regret for terrorist attacks, which affected San Bernardino in December 2015, stressing that Apple has fully cooperated with the FBI to get to the perpetrators of the attacks, also asked Apple to work engineers along with agents of the FBI to help to provide new ideas to help in the investigation.
Tim confirmed that Apple respects the FBI agents efforts, and stressed their good faith, but the decision is unfair to the company, the construction of a new version of any system or feed containing the rear doors mean exposing all user data to the risk of penetration at any time, because the presence of this the door opens the possibility to control it at any time, whatever the degree of protection used by the access it.
Tim believes that providing a back door, even if accessed confined to one device and for one time only, no different from the provision of key opens all the doors in the real world, which means that, if signed into the hands of the wrong person, will give the possibility of opening the doors of banks, homes, hospitals, and many others without being able to stop one from.
From the technical point of view, the text of the court order on some of the points began identifying the accused phone, an iPhone 5C, a device that does not contain a sensor to read the fingerprint, and thus lacks the layer of Apple’s protection. In addition, the Court stated in the document that Apple should provide a software command or an image of the operating system can be installed inside the RAM phone iPhone without affecting the original operating system or data contained within the device.
FBI agents and suggested that the image of the operating system are powered by a custom number identifier for each device, so you can not run on the device that established him. Hence, the device is brought to the FBI or to the offices of Apple to use the operating system image and decrypt the data on it is encrypted.
In short, will run the operating system image following mechanism: Start the possibility exceeded lock the device and prevent the deletion of data when the lock code incorrectly more than once, and allow customers Bureau of Investigation for the lock code through the program within the computer experimenting with all kinds of possibilities automatically and, finally, the amendment to the the device is locked when the lock code incorrectly.Viewing:-194
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!