Instead of Apple tasking a coder to work on cracking that iPhone...
jya at pipeline.com
Thu Feb 25 03:39:00 PST 2016
Apple's fix of its devices to prevent access by outsiders surely is
not like CryptoAG in which gov entry was secretly implanted. How to
verify this has not been done? Political and technical challenge is
that few users care about security and privacy, they just want
convenience and latest style as Apple has become richer than Croseus
exploiting. And Apple is hardly the only com-gov-org promising group
identity and solidarity, with illusory security while primarily
securing the benefits of the promiser.
Apple and govs are more similar than different and bound by loyal
opposition, the very stance most beneficial to security and privacy
offerers. Insecurity is the product.
At 06:14 AM 2/25/2016, you wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>On 02/25/2016 01:45 AM, Georgi Guninski wrote:
> > On Wed, Feb 24, 2016 at 04:06:27PM -0800, Rayzer wrote:
> >> FWIW I don't see how the feds can force Apple to assign an
> >> employee to do anything not in their job description without
> >> violating that employee's contract, or their civil rights,
> >> and writing code to crack phones isn't in any Apple job
> >> description, but tightening phone security is...
> > I am pretty sure this won't stop Apple if they want to unlock
> > it.
> > Are you familiar with their job descriptions (I am not)?
> > According to links here from this month, few years ago Apple
> > unlocked many phones per feds requests.
>That would be this article by Declan McCullagh:
>iPhones are so user friendly that they include pre-installed
>forensic tools for their users in the LEA and DoD community:
>OSX is also very friendly to users who might want to know about
>every file ever downloaded by a Mac they have access to:
>iTunes included a "defect" that LEAs used as a back door into user
>systems for three years, per the UK Telegraph:
>Apple owes it to their shareholders to market to the U.S.
>Department of Defense, including participation in bidding on the
>most powerful end user identification, tracking, surveillance,
>manipulation and targeting platform that has ever been publicly
>Apple markets its products as fashion accessories for Liberal Arts
>majors; keeping the Apple brand's public image intact via a cost
>effective Big Lie propaganda program is the least it can do for
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v2.0.22 (GNU/Linux)
>-----END PGP SIGNATURE-----
More information about the cypherpunks