Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Totally ridiculous that they are begging Apple for help unlocking an iPhone 5 which is presumably running iOS 10. The third parties are more than capable of handling this. Really hope Apple stands strong on this again.
[automerge]1579053368[/automerge]
Just to add, I say take the 8 year old iPhones and throw them away. The guy is dead! What are they expecting to find? An enormous mountain out of a molehill if you ask me...
 
I love how they use the word MASS to create certain feelings in people. I’m happy Apple isn’t doing this. Like the person above me said, what are they going to find. He’s dead, the people are dead. I don’t care if he was inspired by Mickey Mouse or Dwayne the rock Johnson.
 
Apple knows he rules and procedures to follow for the FBI, or have they forgotten so quickly ?

They've been through this many times... so why only NOW are they surprised as the quick escalation ?

Tim should really know better than to 'jump the gun'

All Apple cares about by this stage since their tired of the same thing, is for the FBI to change its rules. Doesn't work that way.

From a company who forces a ""play by the rules' book to their own customers, they should know that.
 
They are complaining about Apple when the reality they had lax security procedures, totally failed vetting processes, nonexistent reporting procedures. Other words they messed it up badly from the President on down and have the gal to then attack the one company who actually has the above when it comes to security. Maybe Apple needs to manage the military as from this example they are total failures or complete juveniles when it comes to security. Dumb and dumber a good name for our military leaders.
 
This is my understanding as well. The only way they would be able to do it is with a 'back door' which Apple (rightly) refuses to implement.

Even if they made a version of iOS with a backdoor, it couldn’t be installed onto a locked iPhone, so it wouldn’t help with this particular case. Not even the firmware can be updated on a locked iPhone, without wiping the iPhone in the process.

This isn’t about getting into this particular iPhone, this is about the FBI getting a permanent backdoor into iPhones. Ironically, if the FBI achieved that, the “bad guys” would just use alternative tech to communicate securely. They could use foreign-based encryption apps that store their data overseas, out of reach of the USA.
 
  • Like
Reactions: CarlJ

Apple has full access to everything except:
  • Home data
  • Health data (requires iOS 12 or later)
  • iCloud Keychain (includes all of your saved accounts and passwords)
  • Payment information
  • QuickType Keyboard learned vocabulary (requires iOS 11 or later)
  • Screen Time
  • Siri information
  • Wi-Fi passwords
Most of that stuff isn't terribly sensitive actually, particularly for law enforcement.

The stuff they have access to includes Messages in iCloud, Contacts, Device Backups, Safari History and Bookmarks (if you have any devices under iOS 13, I believe), Photos, Voice Memos...

As noted in the article, Apple keeps access to most important data to be able to handle lost device scenarios. They're trading off security as a protection against data loss by dumb users.
 
Apple has full access to everything except:

Most of that stuff isn't terribly sensitive actually, particularly for law enforcement.

The stuff they have access to includes Messages in iCloud, Contacts, Device Backups, Safari History and Bookmarks (if you have any devices under iOS 13, I believe), Photos, Voice Memos...

As noted in the article, Apple keeps access to most important data to be able to handle lost device scenarios. They're trading off security as a protection against data loss by dumb users.

Mind providing a citation for this, please?
 
Mind providing a citation for this, please?

Straight from the article you linked. They have access to all the stuff in the table that isn't listed in "end-to-end encryption". "End-to-end encryption" means stuff they don't have access to. If it's not end-to-end encrypted, they necessarily have the keys to access it.
 
  • Like
Reactions: jonblatho
Straight from the article you linked. They have access to all the stuff in the table that isn't listed in "end-to-end encryption". "End-to-end encryption" means stuff they don't have access to.

Ok, I must be blind because I'm not seeing it. Care to post the paragraph for me? I'm fully expecting to look like an idiot, but I can't see what you're apparently seeing.
 
Ok, I must be blind because I'm not seeing it. Care to post the paragraph for me? I'm fully expecting to look like an idiot, but I can't see what you're apparently seeing.

My quote is a straight copy-paste from your article.

Also note the caveat "End-to-end encryption requires that you have two-factor authentication turned on for your Apple ID.". If you didn't turn it on, they have access to everything on iCloud.
 
My quote is a straight copy-paste from your article.

Also note the caveat "End-to-end encryption requires that you have two-factor authentication turned on for your Apple ID.". If you didn't turn it on, they have access to everything on iCloud.

Humor me. Quote the text verbatim in question. I still cannot see what you're taking about.
 
Thank you Mr. President for reminding everyone exactly why it's important that Apple keeps data security a top priority. Trusting Apple to keep doing the right thing.
 
Humor me. Quote the text verbatim in question. I still cannot see what you're taking about.

For certain sensitive information, Apple uses end-to-end encryption... No one else, not even Apple, can access end-to-end encrypted information.

That means if data is NOT end-to-end encrypted, then Apple CAN read it.

That is the very definition of end-to-end encryption and is not unique to Apple.

If you don't understand this information security concept, you probably shouldn't be giving advice about it...

 
  • Like
Reactions: PugMaster
Unlocking the phone of a criminal in a "one off" situation...I agree.
But don't show the FBI how to do it.
Do it for them and let them look.
Telling them how to do it = slippery slope.

Except doing sets a precedent. Which seems fine when the criminal the FBI is looking for is a mass shooter, but what about when a political radical? What about when what’s defined as a political radical is just someone who opposes the ruling party?
 
I generally like Cheeto, but I'm with Apple on this one. No reason to breach iOS security for innocent people so the FBI can spy on everyone. Did Cheeto learn his lesson on FBI spying?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.