By Craig Federighi March 6 at 7:10 PM Craig Federighi is senior vice president of software engineering at Apple. He first joined Apple in 1997. As the head of software engineering at Apple, I think nothing is more important than the safety of all of our customers. Even as we strive to deliver delightful experiences to users of iPhones, iPads and Macs, our team must work tirelessly to stay one step ahead of criminal attackers who seek to pry into personal information and even co-opt devices to commit broader assaults that endanger us all. Sadly, these threats only grow more serious and sophisticated over time. In just the past 18 months, hackers have repeatedly breached the defenses of retail chains, banks and even the federal government, making off with the credit card information, Social Security numbers and fingerprint records of millions of people. But the threat to our personal information is just the tip of the iceberg. Your phone is more than a personal device. In today’s mobile, networked world, it’s part of the security perimeter that protects your family and co-workers. Our nation’s vital infrastructure — such as power grids and transportation hubs — becomes more vulnerable when individual devices get hacked. Criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks through access to just one person’s smartphone. That’s why my team works so hard to stay ahead. The encryption technology built into today’s iPhone represents the best data security available to consumers. And cryptographic protections on the device don’t just help prevent unauthorized access to your personal data — they’re also a critical line of defense against criminals who seek to implant malware or spyware and to use the device of an unsuspecting person to gain access to a business, public utility or government agency. Of course, despite our best efforts, nothing is 100 percent secure. Humans are fallible. Our engineers write millions of lines of code, and even the very best can make mistakes. A mistake can become a point of weakness, something for attackers to exploit. Identifying and fixing those problems are critical parts of our mission to keep customers safe. Doing anything to hamper that mission would be a serious mistake. That’s why it’s so disappointing that the FBI, Justice Department and others in law enforcement are pressing us to turn back the clock to a less-secure time and less-secure technologies. They have suggested that the safeguards of iOS 7 were good enough and that we should simply go back to the security standards of 2013. But the security of iOS 7, while cutting-edge at the time, has since been breached by hackers. What’s worse, some of their methods have been productized and are now available for sale to attackers who are less skilled but often more malicious. To get around Apple’s safeguards, the FBI wants us to create a backdoor in the form of special software that bypasses passcode protections, intentionally creating a vulnerability that would let the government force its way into an iPhone. Once created, this software — which law enforcement has conceded it wants to apply to many iPhones — would become a weakness that hackers and criminals could use to wreak havoc on the privacy and personal safety of us all. I became an engineer because I believe in the power of technology to enrich our lives. Great software has seemingly limitless potential to solve human problems — and it can spread around the world in the blink of an eye. Malicious code moves just as quickly, and when software is created for the wrong reason, it has a huge and growing capacity to harm millions of people. Security is an endless race — one that you can lead but never decisively win. Yesterday’s best defenses cannot fend off the attacks of today or tomorrow. Software innovations of the future will depend on the foundation of strong device security. We cannot afford to fall behind those who would exploit technology in order to cause chaos. To slow our pace, or reverse our progress, puts everyone at risk.
They are known terrorists that Apple is defending to make themselves look good. If you run a red light of course I can understand not wanting to break into your phone but come on, this is bullshit.
I think you will sound different if the FBI would request a decrypted version of our database to recover your IP address and do a reconstruction on all your internet activity based on your forum behaviour and we would oppose to such action. It's not Apples task to make backdoors, if they wanna break the encryption the FBI should turn to the NSA to brute force crack it, it's so utterly naive to think that this would prevent future terrorist attacks. If the FBI succeeds, why would we need https, SLL, pin code, two-factor authentication??? It's perverse to think that apple does this to look good, they are doing it for your own good @Airf0nz0 , all the major tech companies are backing Apple in this.
In China, for a business like this to even operate on its soil, that company first needs to construct a backdoor program, then hand it over to the Chinese government so that they can continually monitor everything that is going on. Google cannot even be used in its full capacity, as many of the search results are censored. Apple is in China. They have HAD to do this just to operate in that country, so i mean, unless somebody is forcing it down their throats like the Chinese did, they just are not going to do it and i do not blame them. The government is claiming that this is a "One-time" deal that will never happen again, which is bullshit. US is not China, they should not be doing shit like China does. I mean, look at China!! This type of shit just has a snowball effect until your government is actually telling you "Hey guys, we're going to comb through every byte of data you interact with, but don't worry, its for your own protection."
The reason they have to go through Apple is that the phone has the lock where after 10 failed attempts it will wipe the device, thay are just trying to get Apple to bypass that part of the lock so they are able to bruteforce attack it. Sent from my SCH-I545 using Grasscity Forum mobile app
“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” - Ben Franklin
The feds are really just wanting appple to get rid of the 10 password wrong lockup. And I assume the government looks at everything i do already, I have nothing to hide. Did you just @Airfonzo me? *edit* I tried quoting superjoint but it didn't work out like i wanted. Do i hashtag him now?
finally figured it out. The feds are really just wanting appple to get rid of the 10 password wrong lockup. And I assume the government looks at everything i do already, I have nothing to hide. Did you just @Airfonzo me?
I've got my 11 digit passcode set up.. 127 years on average to crack. Sent from my iPhone using Grasscity Forum mobile app
we learned 20+ years ago that backdoors are like frat parties for black hat hackers and enemy gov'ts. the FBI would like to pretend that compromising everyone's privacy is the only way to get into this guy's phone. if Apple has to comply then it just sets a dangerous precedent. the government violating privacy is one thing, but i am more worried about my sensitive data being in the hands of some very bad private individuals.