-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I've got a question about the FBI vs Apple case that I don't think has been discussed before here (or at least I haven't seen it). It pertains to reverse engineering and the FBI's seeming helplessness. Software is software and we reverse engineer software all the time. I'd assume that the government has some fairly competent programmers on staff so why don't they just figure out what they need to change in iOS that would allow them to disable the passcode entry count and just /do it/. Similar to what malware writers do all the time. I'd imagine that, somewhere in iOS code, there is a block of code similar to if(passwordEntryCount == 10){ destroyPhoneAndKey(); } Wouldn't this be trivial to spot in assembly code and get around it? Isn't this really just a game the FBI is playing to make us think they just can't get around Apple's 'oh so clever' schemes? Or am I missing something here? Thanks, Anthony - -- Anthony Papillion Phone: (918) 533-9699 PGP: 0x53B04B15 -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWzgOUAAoJEAKK33RTsEsVxAMP/0wdsJF9+2e84Hy1uE8uu8dr y9iz1YG30VKU9b6CMDwWdoz2bX/kC3fn8lrbhdSqd9P37/mvYOcAmsE1DXV40JdF MlEzBGtk0HSCTYe1r/YtN6Ox13uuYhXyYUoaZVltBiuP4vs2rX/ywLetcg5MRwe6 ehQjXhq4wQ5JmQDNEmHY+xbhcaF1UCIx30R1mr7n+V/SciR3ssLNxzYUpNnoaWG/ gQ5+Yv8GGqp9IXrN5tYLyNlrjmPRGtQdwoBPv+bkHQgHMsZt9GXL7voZ6t61NPlg K4RSf5ZCJO1589t6k9vkvSI4jgiKtrtRs+AGhnk4A8unGNEfLkbWxyBjEAmR1fNl dKYCZIi264QvPf8jT0QE2Nz7UfZa3UaJ3FjfwpSu1BKShd7L7Mw2Qgs6VGgJpKrV vGhcIwCwQVlgJqIykL1+BKT2olrokmAjjuN1UXEUa0F3kTGUVGMWYqBVYdoJv3OO Vl9ynQyMjZis7JpoRC+U3jcfr88NtXvRTh23sHhjWg8s0xRpBdELIagjF2mtipGg StO3iW6QNHTQdJ2V1fVQHhdcp6DrJMlaB1RbaoBBvvcwSQLa/ec4CgzBsJ5R5ex4 Ws/6H8k6BQN2TZ1xmSkVeM3B+clLD1E6cQR7Cw30Q12yH7clNnVqtkd8DQE4mB4l ZUMLwO13Fplpe9yMYIba =iohF -----END PGP SIGNATURE-----