I'm not a lawyer, are you? Just follow this case
https://forums.macrumors.com/thread...r-apple-in-backdoor-dispute-with-fbi.1957089/ it's unwinding as we speak!
You realize the Judge ordered apple to comply ? Also read the supporting evidence....The FBI have access to his iCloud backups! They asked.....sorry, apple was ordered to hand them over, making security of iCloud backups useless. The part in question , as I said that would be , is the data on the iPhone, as even apple cannot access that. What apple can access, was handed over!
Court ORDERED apple to hand over data, FBI I now has iCloud backups of the device.....see.
Ignore warrants mate, thats side tracking you, Google court orders. And also warrants are not just search. This is a good case to illustrate how "secure" your data is when held off the device in something like iCloud, when admins can access it and the court asks for it .
First, *you* were the one who claimed that warrants make security useless.
You missed my point, the NSA does need to hack to get the data, they can legally request it, and security is useless in that scenario. (Unless it's a device like a iPhone, where even apple cannot access it) A warrant is not just search, depends on the warrant.
I'm glad that you're finally admitting you were incorrect with that claim, but it actually just goes to show you're wrong about the rest of it as well.
Yes, the court has ordered Apple to create a security bypass for the FBI (not to "hand over data" as you claimed). Specifically, they have asked Apple to create a special version of iOS that can be installed on iDevices that: a) bypasses the enforced wait times to retry passwords, b) allows password entry via the lightning port, c) disables the wipe on 10 failed passwords feature, and d) allows the installation of said special iOS version on a locked piece of hardware *without* the password. To *do* this, Apple would have to break the security of their own devices.
Prior to iOS 8, Apple could hand over the encryption key for iOS devices. They no longer can, because they don't have them, and never have. This is *security*. Further improvements in security, from both a hardware *and* software perspective, in later releases further limit Apple's ability to give the government what it has requested. Again, this is *security*. As I said before, in the face of a warrant (which is permission to do the search, nothing more), or a court order, only *security* will protect your privacy. Well-engineered security will do so. Poorly engineered security will not.
Given that Apple is still fighting the court order, it is *supremely* unlikely that anything has been handed over yet. However, even *if* Apple has handed over the iCloud backup (which is encrypted with a key that Apple doesn't have, and never did have as of iOS 8), then security is *still* protecting privacy.
The search allowed by a warrant may turn up your encrypted data. Unless it *also* turns up the password/key for said data, the security of the encryption is still protecting your privacy. Once the government has said encrypted data lawfully in their possession, they can certainly *try* to break the encryption, but good encryption makes that difficult. (Apparently *too* difficult, or they wouldn't be trying to do an end-run around the encryption by getting Apple to make their job easier.)
You seem to be under the impression that 'the government has asked for it' makes something a) legal, b) *possible*, and c) practical. None of those things automatically follow from the initial statement.
Again, when faced with a warrant (or a court order), *security* is the only thing that protects privacy. Also, when faced with hackers, security is the only thing that protects privacy. Security which can be broken by an interested government can be broken by interested hackers, so if your security won't stop one, it won't stop either.