product:iphone

  • The UAE Spends Big on Israeli Spyware to Listen In on a Dissident | Foreign Policy
    https://foreignpolicy.com/2016/08/25/the-uae-spends-big-on-israeli-spyware-to-listen-in-on-a-dissident

    In attacking the iPhone of human rights defender Ahmed Mansour, the Emirati government reportedly bought a rare, zero-day, Israeli exploit of Apple’s iOS.

    When a government seeks to rein in a political opponent by listening in on his calls, reading his text messages, and spying on his meetings, how do they go about doing so? In the case of the United Arab Emirates and pro-democracy activist Ahmed Mansoor, they sent him a short text message.

    New secrets about torture of Emiratis in state prisons,” the Aug. 10 and 11 SMS messages to Mansoor read. The texts included a link, and had Mansoor clicked it, his phone would have turned into a powerful surveillance tool for an entity that researchers believe is the Emirati government. #Pegasus, the software used against Mansoor, allows its operator to record phone calls and intercept text messages, including those made or sent on nominally encrypted apps such as Viber and WhatsApp. It can mine contact books and read emails. The software can also track its subject’s movements and even remotely turn on the phone’s camera and microphone.
    […]
    It is unclear how much money the UAE purportedly paid to the shadowy Israeli firm that created Pegasus, the #NSO_Group, but Marczak said it was likely that the firm’s contract with the Gulf nation was in the range of $10 million to $15 million. The size of that contract, he added, would depend on how many targets the UAE would have hired NSO to surveil.

    NSO reportedly sells its surveillance tools to governments around the world, and the UAE appears to be one of its biggest clients, judging by the company’s use of Emirati domains. Citizen Lab also documented the use of Pegasus in countries like Mexico, where it was used to target a Mexican journalist.

    The Pegasus software utilized a chain of three zero days in Apple’s mobile operating system to turn iPhones into highly capable, multifunction surveillance tools.

  • Why Cory Doctorow Thinks Apple’s Disappearing Headphone Jack Should Scare You

    http://www.fastcompany.com/3062741/the-iphones-disappearing-headphone-jack-reason-for-concern

    The privacy activist says the loss of the iPhone’s last analog output could lead to a couple of anti-consumer scenarios in the future.

    [...]

    The end-to-end digital audio stack will allow for higher quality audio and some new features, but it’ll also open the door for increased DRM control over music content by the record labels that own it.

  • Text analysis of Trump’s tweets confirms he writes only the (angrier) Android half – Variance Explained
    http://varianceexplained.org/r/trump-tweets

    this weekend I saw a hypothesis about Donald Trump’s twitter account that simply begged to be investigated with data:

    Every non-hyperbolic tweet is from iPhone (his staff).
    Every hyperbolic tweet is from Android (from him).

    #text-mining #trump

  • Edward Snowden and Andrew Huang design iPhone cover that warns you when you are being spied upon.
    https://www.wired.com/2016/07/snowden-designs-device-warn-iphones-radio-snitches

    Snowden and well-known hardware hacker Andrew “Bunnie” Huang plan to present designs for a case-like device that wires into your iPhone’s guts to monitor the electrical signals sent to its internal antennas. The aim of that add-on, Huang and Snowden say, is to offer a constant check on whether your phone’s radios are transmitting. They say it’s an infinitely more trustworthy method of knowing your phone’s radios are off than “airplane mode,” which people have shown can be hacked and spoofed.

    [...]

    Huang’s and Snowden’s solution to that radio-snitching problem is to build a modification for the iPhone 6 that they describe as an “introspection engine.” Their add-on would appear to be little more than an external battery case with a small mono-color screen. But it would function as a kind of miniature, form-fitting oscilloscope: Tiny probe wires from that external device would snake into the iPhone’s innards through its SIM-card slot to attach to test points on the phone’s circuit board. (The SIM card itself would be moved to the case to offer that entry point.) Those wires would read the electrical signals to the two antennas in the phone that are used by its radios, including GPS, Bluetooth, Wi-Fi and cellular modem. And by identifying the signals that transmit those different forms of radio information, the modified phone would warn you with alert messages or an audible alarm if its radios transmit anything when they’re meant to be off. Huang says it could possibly even flip a “kill switch” to turn off the phone automatically.

    [...]

    Huang and Snowden’s iPhone modification, for now, is little more than a design.

    [...]

    The two collaborators have never met face-to-face

    The paper in which they discuss their approach & design:
    https://assets.pubpub.org/aacpjrja/AgainstTheLaw-CounteringLawfulAbusesofDigitalSurveillance.pdf

    #surveillance

  • Premier accident mortel pour le pilote automatique de Tesla | Silicon 2.0
    http://siliconvalley.blog.lemonde.fr/2016/07/01/premier-accident-mortel-pour-le-pilote-automatique-de-tes

    Première tragique pour la fonction de pilotage automatique de Tesla. Au début de mai, un automobilisme américain a trouvé la mort au volant d’une Model S, la berline de luxe du fabricant californien de voitures électriques. Rendu public jeudi 30 juin, cet accident a provoqué l’ouverture d’une enquête de la National Highway Traffic Safety Administration (NHTSA), l’organisme responsable de la sécurité routière. Celle-ci pourrait déboucher sur un rappel des quelque 25 000 véhicules vendus par Tesla aux Etats-Unis.

    Cet accident mortel a eu lieu sur une voie rapide en Floride alors que le pilote automatique était activé. A une intersection, la voiture a percuté un poids lourd qui lui avait coupé la route afin de tourner à gauche. En raison d’un « ciel lumineux », « ni le pilote automatique, ni le conducteur n’ont détecté le flanc blanc de la remorque, détaille l’entreprise fondée par Elon Musk, dans un message publié sur son site Internet. Les freins n’ont donc pas été enclenchés ». Le conducteur est décédé sur le coup.

    • Iron Man fait parler les morts maintenant… le fait que le « conducteur » n’a pas freiné ne signifie pas forcément qu’il n’a pas pu voir le camion (ce qui semble dédouaner le robot dans la manière dont c’est rapporté). Peut-être qu’il l’a vu et n’a pas eu le réflexe de freiner (puisqu’il avait délégué le contrôle du véhicule), ou peut-être qu’il l’a pas vu parce qu’il faisait un scrabble sur son iphone ! Enquête à suivre…

    • L’avis d’ouverture de l’enquête par le #NHTSA (aucun détail, si ce n’est que l’incident semble avoir été signalé par Tesla)
      (ODI : Office of Defects Investigation)
      http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM530776/INOA-PE16007-7080.PDF

      Action: A Preliminary Evaluation has been opened.
      Summary:
      ODI has identified, from information provided by Tesla and from other sources, a report of a fatal highway crash involving a 2015 Tesla Model S operating with automated driving systems (“Autopilot”) activated. This preliminary evaluation is being opened to examine the design and performance of any automated driving systems in use at the time of the crash.

    • Une petite revue des questions soulevées par le principe même du pilote automatique, réactivées par l’accident de la Tesla.

      Is Tesla Responsible for the Deadly Crash on Auto-Pilot ? Maybe. - Forbes
      http://www.forbes.com/sites/patricklin/2016/07/01/is-tesla-responsible-for-the-deadly-crash-on-auto-pilot-maybe/#75eb35f35bbc

      Tesla’s Autopilot had its first fatality, the company announced yesterday. Statistically, this was bound to happen. The self-driving car had broadsided a truck that its sensors didn’t detect, and the driver didn’t see it either.

      Does Tesla have any responsibility for the accident, even if the driver was supposed to be watching the road at all times?

      The argument for why the driver, not Tesla, was responsible is that the driver had agreed to always monitor the road, in case of emergency situations exactly like this that the car cannot handle. This is part of the company’s standard agreement before it allows customers to use the #Autopilot feature, which is still in beta-testing mode since its introduction last October. (Beta-testing is working out the last bugs in a product before its official release to the public.)

      Et d’abord, est-il raisonnable de réaliser le #beta-test du logiciel en conditions réelles ?

      Puis les considérations éthiques déjà abordées ici.

      Enfin, une session prévue sur le sujet à la fin du mois

      Later this month in San Francisco, we’re already planning to address this exact issue in a half-day ethics session at the Automated Vehicles Symposium, sponsored by the Transportation Research Board and AUVSI. Tesla’s unfortunate accident reminds us that these conversations aren’t just academic but are all too real.

      L’auteur parle à 10h15, le 19 juillet
      http://www.automatedvehiclessymposium.org/program/agenda

  • Apple patent blocks your iPhone from recording video at gigs - CNET
    http://www.cnet.com/au/news/apples-new-patent-will-block-your-iphone-from-recording-video-at-gigs

    If you’re sick of having your view of Adele obscured by a thousand iPhones trying to film her, things are looking up. Apple was awarded a US patent this week for a system that can force your iPhone into disabling video-recording functions at concert venues.

    The system uses infrared signals to send messages to your phone to tell it to shut down video recording. Apple’s patent illustration shows a phone at a concert with the words “recording disabled” on screen. I won’t even go into the fact that it shows the person trying to record video in portrait orientation.

    Various artists, including Adele, have been outspoken about fans filming their shows, with many claiming that it spoils the experience for other fans.

    It’s not known whether Apple plans to put the patent into use, and the company did not respond to a request for comment.

  • How You’re Making Facebook a Money Machine
    http://mobile.nytimes.com/2016/04/30/upshot/how-youre-making-facebook-a-money-machine.html

    What you do when waiting for the bus or avoiding work goes a long way to explaining a tectonic shift in business and media.

    In such moments you are most likely checking #Facebook. More of you will be doing that than tweeting, searching on #Google, checking stock prices on Yahoo or reading articles like this. And that constant lure, a fix you can easily satisfy both on a phone and a desktop computer, explains why Facebook is pulling ahead of every other large technology company right now.

    Your addiction is making Facebook astonishingly profitable. Put a little more kindly, your emotional and intellectual interactions on the social network are creating a great place for companies to advertise.

    [...]

    Facebook is doing well because it occupies a huge sweet spot in the connected world, perhaps an even bigger one than Google owns.

    [...] Both companies get most of their revenue from advertising.

    But people apparently hang around on Facebook far longer. According to SimilarWeb, users spent just over 17 minutes on the social network on average in March, well ahead of the nine minutes for Google (these figures don’t accurately reflect how active people are on the sites, but you can still see the difference.)

    [...]

    Another advantage for Facebook is that its costs are lower than Google’s, which helps it make more money out of every dollar of revenue.

    Pundits made a big deal this week about how Facebook excelled as Apple stumbled. But there was a warning for Facebook in Apple’s results. Apple has relied heavily on one product — the iPhone — for much of its revenue, so when sales of the device slowed, there was little Apple could do to keep growing. Facebook is even more reliant on a single element: advertising revenue. If people spend markedly less time on Facebook — because an enticing new network comes along, for example — the company’s revenue growth could slow.

    There is no such threat on the horizon. Until one develops, we will be on our phones helping Mark Zuckerberg make even more money.

    #publicités #argent #profits

  • Inside One of the World’s Most Secretive iPhone Factories
    http://www.bloomberg.com/news/features/2016-04-24/inside-one-of-the-world-s-most-secretive-iphone-factories

    A few minutes past 9 a.m. at Pegatron Corp.’s vast factory on Shanghai’s outskirts, thousands of workers dressed in pink jackets are getting ready to make iPhones. The men and women stare into face scanners and swipe badges at security turnstiles to clock in. The strict ID checks are there to make sure they don’t work excessive overtime. The process takes less than two seconds. This is the realm in which the world’s most profitable smartphones are made, part of Apple Inc.’s closely guarded (...)

    #Apple #Pegatron #iPhone #travail #surveillance #China_Labor_Watch #reconnaissance_faciale (...)

    ##biométrie

  • What if the FBI Tried To Crack An Android Phone? We Attacked One To Find Out | IFLScience

    http://www.iflscience.com/technology/what-if-fbi-tried-crack-android-phone-we-attacked-one-find-out

    The Justice Department has managed to unlock an iPhone 5c used by the gunman Syed Rizwan Farook, who with his wife killed 14 people in San Bernardino, California, last December. The high-profile case has pitted federal law enforcement agencies against Apple, which fought a legal order to work around its passcode security feature to give law enforcement access to the phone’s data. The FBI said it relied on a third party to crack the phone’s encrypted data, raising questions about iPhone security and whether federal agencies should disclose their method.

    But what if the device had been running Android? Would the same technical and legal drama have played out?

    We are Android users and researchers, and the first thing we did when the FBI-Apple dispute hit popular media was read Android’s Full Disk Encryption documentation.

    We attempted to replicate what the FBI had wanted to do on an Android phone and found some useful results. Beyond the fact the Android ecosystem involves more companies, we discovered some technical differences, including a way to remotely update and therefore unlock encryption keys, something the FBI was not able to do for the iPhone 5c on its own.

    #sécurité #smartphone #FBI #Apple #Android

  • Chinese Researchers Experiment with Making HIV-Proof Embryos
    https://www.technologyreview.com/s/601235/chinese-researchers-experiment-with-making-hiv-proof-embryos

    Chinese fertility doctors have tried to make HIV-proof human embryos, but the experiments ended in a bust. The new report is the second time researchers in China revealed that they had a go at making genetically modified human embryos.

    [...]

    The Chinese scientists tried to make human embryos resistant to HIV by editing a gene called CCR5. It’s known that some people possess versions of this gene which makes them immune to the virus, which causes AIDS. The reason is they no longer make a protein that HIV needs to enter and hijack immune cells.

    [...]

    One day endowing people with protective genes could become a real possibility. It would be like a vaccine, except one that is installed in a person’s genome from birth. And there’s a long list of genes people might demand for their children in addition to HIV resistance. One DNA change, for instance, seems to completely prevent Alzheimer’s. Another generates people with twice the muscle mass.

    “Made in China”

    #CCR5 #Chine #Clustered_Regularly_Interspaced_Short_Palindromic_Repeats #Embryon #Guangzhou_Medical_University #Génétique_humaine #Organisme_génétiquement_modifié #Recherche_scientifique #Syndrome_d'immunodéficience_acquise #Virus_de_l'immunodéficience_humaine

    • It would be like a vaccine, except one that is installed in a person’s genome from birth.

      Ou ça serait comme une girafe, sauf que ça serait pas un animal et que ça serait installé dans le génome d’une personne à la naissance.

      Ou comme un iPhone, sauf que ça serait pas un objet et que ça serait installé dans le génome d’une personne à la naissance.

  • FBI director says government ’purchased a tool’ to access San Bernardino gunman’s phone | Fox News
    http://www.foxnews.com/tech/2016/04/07/fbi-director-says-government-purchased-tool-to-access-san-bernardino-gunman

    The head of the FBI said Wednesday that the government had “purchased” a tool enabling investigators to access an iPhone belonging to San Bernardino gunman Syed Farook. 

    The disclosure by James Comey in a speech at Kenyon College in Ohio was a departure from previous official statements, which had been very vague in explaining the details of how the government broke into the phone last month.

    The Justice Department had only said that a third party had “demonstrated” an alternate method of unlocking the device to the FBI the evening before federal prosecutors filed a motion to delay a court hearing on the matter.

    The people that we bought this from – I know a fair amount about them and I have a high degree of confidence that they are very good at protecting it, and their motivations align with ours,” Comey said during a question-and-answer period following his talk.

    Comey added that the technology used by Apple only works on an iPhone 5C, like the phone used by Farook. 

    This doesn’t work on [an iPhone] 6S, doesn’t work in a 5S, and so we have a tool that works on a narrow slice of phones,” he added.

  • Apple’s New Challenge: Learning How the U.S. Cracked Its iPhone - The New York Times

    http://www.nytimes.com/2016/03/30/technology/apples-new-challenge-learning-how-the-us-cracked-its-iphone.html?smid=tw-ny

    #marrant

    SAN FRANCISCO — Now that the United States government has cracked open an iPhone that belonged to a gunman in the San Bernardino, Calif., mass shooting without Apple’s help, the tech company is under pressure to find and fix the flaw.

    But unlike other cases where security vulnerabilities have cropped up, Apple may face a higher set of hurdles in ferreting out and repairing the particular iPhone hole that the government hacked.

  • US DoJ Has Unlocked iPhone Without Apple

    http://www.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-department-case.html?_r=0

    The Justice Department said on Monday that it had found a way to unlock an iPhone without help from Apple

    [...]

    law enforcement’s ability to now unlock an iPhone through an alternative method raises new uncertainties, including questions about the strength of security in Apple devices.

    The development also creates potential for new conflicts between the government and Apple about the method used to open the device and whether that technique will be disclosed. Lawyers for Apple have previously said the company would want to know the procedure used to crack open the smartphone, yet the government might classify the method.

  • Safari on iOS 9.3, Responsive Images, iPhone SE, shrink-to-fit and other new APIs
    http://www.mobilexweb.com/blog/safari-on-ios-9-3-picture-shrink-fit-iphone-se

    “Usually minor updates on iOS don’t bring news to Safari and web developers. That’s not the case on iOS 9.3: new APIs, support for Responsive Images, a new weird viewport attribute and new devices in the market make us check what’s new.”

    #iOS_update_release_RWD_viewport_clevermarks

  • #Apple demande pourquoi le #FBI n’a pas sollicité la #NSA pour rentrer dans l’iPhone du tireur de San Bernardino (ben oui, tiens !)
    http://www.wired.com/2016/03/apple-lambasts-fbi-not-asking-nsa-help-hack-iphone

    “The government does not deny that there may be other agencies in the government that could assist it in unlocking the phone and accessing its data; rather, it claims, without support, that it has no obligation to consult other agencies,” Apple wrote, noting that FBI Director James Comey danced around the question of NSA assistance when asked about it during a recent congressional hearing.

    And if the FBI can’t on its own break into iPhones without NSA help, it should invest in developing that capability, Apple says, instead of seeking unconstitutional ways to force tech companies to assist it.

    “Defining the scope of the All Writs Act as inversely proportional to the capabilities of the FBI removes any incentive for it to innovate and develop more robust forensic capabilities,” Apple wrote. The company quotes Susan Landau, a professor of cybersecurity policy at Worcester Polytechnic Institute, who has said that “[r]ather than asking industry to weaken protections, law enforcement must instead develop a capability for conducting sophisticated investigations themselves.”

    #wtf #FBIvsApple (via @oliviertesquet)

    In the Apple encryption fight, the FBI is now on China’s side
    http://www.theverge.com/2016/3/16/11244396/apple-vs-fbi-encryption-china-source-code-backdoor

    As Apple filed its defense against the government on Monday, FBI Director James Comey was in Beijing, meeting with the head of China’s surveillance state. According to state media reports, Comey and Public Security Minister Guo Shengkun discussed ways to “deepen law enforcement and security cooperation.”

  • 10 Shots Across the Border - The New York Times

    http://www.nytimes.com/2016/03/06/magazine/10-shots-across-the-border.html?smid=tw-nytimes&smtyp=cur&_r=0

    Un flic américain abat un adolescent : le flic était aux Etats-Unis, l’ado au Mexique...

    #frontière #mur #états_unis #mexique #police #meurtre #violence

    Watch the virtual-reality film accompanying this article by downloading NYT VR, The Times’s virtual-reality app for iPhone and Android.

    Around 11:30 p.m. on Oct. 10, 2012, a police officer in Nogales, Ariz., named John Zuñiga received a call reporting suspicious activity on International Street, which runs directly alongside the Mexican border. Most of Zuñiga’s calls involved shoplifters at the local Walmart or domestic-violence complaints, but he also worked as a liaison with United States Customs and Border Protection (C.B.P.). Though border security is the responsibility of the Border Patrol, the Nogales police can assist when illegal activity is happening stateside — if, for instance, drug smugglers have slipped over the fence and are making their way into Arizona.

  • U.S. tech companies unite behind Apple ahead of iPhone encryption ruling | Reuters
    http://www.reuters.com/article/apple-encryption-google-facebook-idUSKCN0W527Y

    Tech industry leaders including Alphabet Inc’s Google, Facebook Inc, Microsoft Corp, AT&T and more than two dozen other Internet and technology companies filed legal briefs on Thursday asking a judge to support Apple Inc in its encryption battle with the U.S. government.

    The rare display of unity and support from Apple’s sometime-rivals showed the breadth of Silicon Valley’s opposition to the government’s anti-encryption effort, a position endorsed by the United Nations human rights chief.
    […]
    One amicus filing, from a group of 17 Internet companies including Twitter Inc and LinkedIn Corp, asserted that Congress has already passed laws that establish what companies could be obliged to do for the government, and that the court case amounted to an “end run” around those laws.
    […]
    The San Bernardino District Attorney’s summary argument, contained in its application to file an amicus brief, alleges the iPhone might have been “used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino County’s infrastructure.” The court document contained no evidence to support the claim.

    Zeid Ra’ad Al Hussein, U.N. High Commissioner for Human Rights, urged U.S. authorities to proceed with “great caution”, warning: "A successful case against Apple in the U.S. will set a precedent that may make it impossible for Apple or any other major international IT company to safeguard their clients’ privacy anywhere in the world.

    It is potentially a gift to authoritarian regimes, as well as to criminal hackers,” he said in a statement.

    TWO BIG COALITIONS
    The tech and Internet industries largely coalesced around two filings. One includes market leaders Google, Microsoft, Facebook, Amazon.com and Cisco Systems, along with smaller, younger companies such as Mozilla, Snapchat, Slack and Dropbox.

    That group noted that Congress passed the All Writs Act more than 200 years ago, and said the Justice Department’s effort to use the law to force engineers to disable security protections relies on a “boundless” interpretation of the law that is not supported by any precedent.

    The brief also advanced constitutional arguments, saying the order violated free speech, the separation of power and due process.

    The second industry coalition, which includes Twitter, eBay Inc and LinkedIn, contended in its filing that the Communications Assistance for Law Enforcement Act (CALEA) of 1994, along with other statutes, has already made it clear what the companies could or could not be forced to do.

    • San Bernardino shooter’s iPhone may hold evidence of #dormant_cyber_pathogen, DA says
      http://appleinsider.com/articles/16/03/03/san-bernardino-shooters-iphone-may-hold-evidence-of-dormant-cyber-path

      The curious statement was made in reference to an unspecified threat in violation of California Penal Code Section §502 covering protections against tampering, interference, damage and unauthorized access to computer systems. Specifically, Ramos says the iPhone in question could contain evidence “that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino County’s infrastructure.” Beyond that, no other details are offered.

      There is no mention of “cyber pathogens” in Cal. Penal Code §502, but the provision does reference a “#computer_contaminant,” described as a “_set of computer instructions that are designed to modify, damage, destroy, record, or transmit information within a computer, computer system, or computer network without the intent or permission of the owner of the information.” Ramos appears to be indicating that Farook potentially released a virus or worm onto the county’s internal network using his work-issued iPhone 5c.

  • Ex-#NSA chief backs Apple on iPhone ‘back doors’
    http://www.usatoday.com/story/news/2016/02/21/ex-nsa-chief-backs-apple-iphone-back-doors/80660024

    “Look, I used to run the NSA, OK?” Hayden told USA TODAY’s weekly video newsmaker series. "Back doors are good. Please, please, Lord, put back doors in, because I and a whole bunch of other talented security services around the world — even though that back door was not intended for me — that back door will make it easier for me to do what I want to do, which is to penetrate. ...

    “But when you step back and look at the whole question of American security and safety writ large, we are a safer, more secure nation without back doors,” he says. With them, "a lot of other people would take advantage of it."

    #backdoors sur l’affaire #Apple/#FBI

    Snowden dit que ce passage est de la #poésie et on ne peut pas lui donner tort (on ne peut jamais !)

  • Customer Letter - Apple
    http://www.apple.com/customer-letter
    /customer-letter/overview/images/og.jpg?201602220251

    February 16, 2016 A Message to Our Customers

    The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

    This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

    Answers to your questions about privacy and security
    The Need for Encryption

    Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

    All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

    Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

    For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.
    The San Bernardino Case

    We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

    When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

    We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

    Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

    The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
    The Threat to Data Security

    Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

    In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

    The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

    The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

    We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.
    A Dangerous Precedent

    Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

    The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

    The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

    Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

    We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

    While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

    Tim Cook

    #data #privacy #apple #FBI #USA

  • 2月20日のツイート
    http://twilog.org/ChikuwaQ/date-160220

    Papier is out! paper.li/ChikuwaQ/13277… Stories via @jchernandezjazz @michikokakutani @Michele_Kahn posted at 09:16:06

    Top story: Justice Department Calls Apple’s Refusal to Unlock iPhone a ‘Marketi… www.nytimes.com/2016/02/20/bus…, see more tweetedtimes.com/ChikuwaQ?s=tnp posted at 08:36:15

    Top story: Harper Lee dead at age of 89: ’To Kill a Mockingbird Author’ passes … www.al.com/news/index.ssf…, see more tweetedtimes.com/ChikuwaQ?s=tnp posted at 04:26:21

    こんなのフツーだし blog.goo.ne.jp/kuru0214/e/b2d… posted at 00:41:22

    Top story: Tanja Playner on artnet www.artnet.com/artists/tanja-…, see more tweetedtimes.com/ChikuwaQ?s=tnp posted at 00:25:02

    さよならポニーテール「意気地ナシ卒業(Short Edit Ver.)」 - YouTube www.youtube.com/watch?v=R9V4gE… via @kuroneko_pony twitter.com/kuroneko_pony/…

    posted at (...)