I'm really not trying to separate the issue. It may help of you read all of my responses.to this thread to get context of what I am trying to say.
The only reason I haven't mentioned it'd an issue of precedent is because I agree. I just see a lot of people having a completely upside down understanding of what's being demanded of apple and I was trying to clarify the many incorrect statements. I simply didn't feel I needed to start my statements with "yes I agree it sets a dangerous precedent..." Because I felt that was redundant.
[doublepost=1457688132][/doublepost]
Apple could remove the security layers outlined in steps one and two and just unlock the phone themselves with software brute force entry of the pass code. Disable pass code. Done. They've essentially done the work of the fbi who plan to, apparently manually, enter a couple thousand possible pass code attempts without handing a device with altered software over.
But even with the altered software, there's no way to load it to another device without Apple's servers signing it anyway.
Perhaps my intentions aren't clear. I'm not trying to defend either entity nor am I trying to attack either entity. This entire chain of responses happened because I read someone saying that this backdoor would let random criminal hackers steal our bank accounts (paraphrasing), and that to me reads as a complete misunderstanding of what is supposed to happen here. This isn't even the first time I read such a statement. We have buzzwords like "backdoor" being thrown around and I saw.peoole getting confused. As such, I tried to shed some light, which ultimately..took us down this rabbit hole.
I think I understand where you're coming from, the thing is, I disagree. By considering the issues separately and trying to dispel, what is in your opinion a myth that what Apple is creating is a backdoor, is in my opinion the wrong approach. The combination of the software and the precedent make the software a backdoor. Now it will be difficult for others to use and you are correct that it will not be immediately uploaded to everyones phone, nor will it be easily exploited by hackers. But that is far from saying that it is not exploitable at all. In theory the software is not installable without Apples digital key but jailbroken phones have unsigned software installed on them.
What's important is that the system is only as secure as the sum of its parts, when you weaken one part you weaken the whole thing.