|Friday, February 19th, 2016||SUGGEST NEWS|
Apple vs. FBI
Posted by: Nebuchadnezzar on February 19th, 2016 @ 12:21PM
I think we all know Apple, Yahoo, Microsoft, etc have already been working with the NSA to give them everything they want on us, so I think it's dumb to not help out in this clear evidence of TERROR ATTACK. But we do know the government abuses every power they get.
COMMENTS (5) | APPLE | DIGG
February 17th, 2016 @ 7:45PM
|the difference between when they normally give them info on us and here is that to do this they weaken the security of their products everyone buys, and thus might not buy.|
they'll give them our emails and search histories because it doesn't potentially cost them anything
February 17th, 2016 @ 10:04PM
San Jose, CA
|They should just get the chosen programmers to be security-screened and asked to sign agreements before building a one-off solution in a box. Those involved are clever enough to pull that off without risking the things they're saying will definitely be compromised. I call BS.|
February 18th, 2016 @ 8:23AM
|I dislike apple. I hate government intrusion. But what the government is asking/demanding apple to do is absolutely ridiculous. It is one thing to hand over information when asked. It is entirely different beast to demand a company spend time and resources to build a back door into the software. |
Once you have backdoors, you have all sorts of problems. Other people (especially other government agencies) may crack them. Our government may abuse it.
I personally doubt that what ever is on the phone is that important and worth the loss of liberty. Contacts? Nope. Plans? Nope. What? They can find all this stuff with the more old fashioned detective work.
February 19th, 2016 @ 5:27AM
|wootah has it right, it's not about finding out the text messages of the dead terrorists. it's about getting the back door to read the text messages of the masses to 'stop the next one'|
February 21st, 2016 @ 3:27PM
|I don`t understand what the issue is with removing the shooter`s phone from the network and installing the new OS on the phone in a secure location. Nothing has to be done OTA, and they can limit installation of the software on the shooter`s phone. They could probably even configure OS so it immediately deletes the contents of the phone unless its specifically on the shooter`s phone.|
You are unable to add Comments because you are not logged in. If you have an account please login in now.
You can Create an Account, it takes less then a minute.
Return to top