Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

The decision in question refers to the encryption protocol used on Apple’s iPhones, and one device in particular: the iPhone used by the shooter in the San Bernardino, California terrorist attacks of December 2015. The FBI has issued a court order to Apple, asking them to provide and/or build a backdoor for iOS, in an attempt to garner information from the device used in those attacks. This request, and Apple’s vehement refusal, could set a precedent into motion that’s much larger than the case itself.

On February 16th 2016, Apple’s CEO Tim Cook issued a statement calling for a public discussion of the issue at hand, and a declaration that Apple will not comply with this demand due to the larger implications of the decision. Though Apple has conceded data that is in their possession in the past, they will not build something that they don’t currently have, and would potentially compromise the security of their customers. As stated in the customer letter:

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The letter continues to explain how important data security is for consumers of Apple products and such, claiming that creating a product that’s intentionally trying to undermine their own products would be both counter-productive and risky to all users of the iOS operating system. Even if this backdoor is asked for with only good intentions, there’s always the risk that the exploit could fall into the wrong hands.

More importantly, however, this denial by Apple could lead to legislation being passed which makes such a demand legal. If this happens, it would give the government extraordinary power over the users of smartphones. It would allow the government to request tech developers to provide backdoors on demand, which could, in turn, open up countless possibilities for espionage. However, what if these backdoors fell into the hands of hackers and others who might want a peek at any user’s sensitive information? That possibility is truly frightening.

What are your thoughts on smartphone encryption? Is Apple right to deny the FBI this request? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Business Innovation Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Google Privacy Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Mobile Device Smartphones Saving Money Workplace Strategy Business Management communications Android Mobile Devices VoIP Smartphone Managed IT Services Microsoft Office Data Recovery Browser Managed Service Passwords Upgrade Social Media Disaster Recovery Backup Network Tech Term Internet of Things Artificial Intelligence Automation Covid-19 Cloud Computing Remote Server Managed Service Provider Remote Work Facebook Miscellaneous Windows Outsourced IT Encryption Gadgets Spam Information Employee/Employer Relationship Holiday Windows 10 Business Continuity Data Management Government Blockchain Windows 10 Wi-Fi Business Technology Productivity Bandwidth Compliance Data Security Current Events Virtualization Apps Two-factor Authentication Office Chrome Budget Networking Mobile Device Management Apple Gmail App Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Conferencing Hacker Avoiding Downtime Mobile Office How To BDR Applications Computing Information Technology Access Control Office 365 Analytics Computers Office Tips Healthcare Augmented Reality Retail Storage Website Password Marketing Bring Your Own Device Managed IT Services AI HIPAA Router BYOD WiFi Operating System Big Data Virtual Private Network Training Risk Management Health Help Desk Document Management IT Support Telephone Free Resource Scam Data loss Project Management Windows 7 Cooperation Microsoft 365 Firewall Solutions Patch Management Save Money Remote Monitoring Going Green End of Support Vulnerability The Internet of Things Vendor Management Windows 11 Cybercrime Social Display Printer Excel Monitoring Paperless Office Infrastructure Customer Service Tip of the week Remote Workers Presentation Outlook Managed IT Service iPhone Money Wireless Technology Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Sports Entertainment Mouse Images 101 Word Mobility Multi-Factor Authentication Administration Telephone System Cost Management Robot Safety Employees Integration Settings Wireless IT Management Printing Content Filtering VPN Meetings User Tip Modem Mobile Security YouTube Processor Holidays 2FA Supply Chain Cryptocurrency Computer Repair Data Storage Video Conferencing Smart Technology Customer Relationship Management Managed Services Provider Professional Services Virtual Desktop Virtual Machines LiFi Data storage Saving Time Machine Learning Hacking Writing Net Neutrality Scams SQL Server Lenovo Identity Virtual Reality Financial Data Hybrid Work User Halloween Bookmark History Smart Tech IT Human Resources Download Server Management Alerts Private Cloud Smartwatch Procurement Cables Azure Superfish Identity Theft Connectivity Tech Break Fix IP Address Hacks Twitter Telework Scary Stories Browsers Cyber security Communitications Google Apps Fun Upload Error CES Multi-Factor Security Deep Learning Social Engineering Supply Chain Management IT Maintenance Social Network IoT Term Dark Web Remote Computing FinTech Business Intelligence Recovery Education IT Assessment Shortcuts Trends Hard Drives Tablet Google Calendar Domains Flexibility Ransmoware Customer Resource management Value Regulations Star Wars Microsoft Excel Mobile Computing Alert Organization Vendors Data Analysis Dark Data Smart Devices Be Proactive Search Gamification Managed IT Staff File Sharing Digital Security Cameras Refrigeration Legislation Public Speaking Best Practice How To Remote Working Workforce Memory Social Networking Google Play Lithium-ion battery Notifications Threats Buisness Fileless Malware Data Breach IT solutions Electronic Health Records Workplace Strategies Entrepreneur Content Wearable Technology Legal Travel Videos Google Maps Comparison Business Growth Meta Health IT Wasting Time Techology Motherboard Assessment Security Cameras Permissions Amazon Directions Trend Micro Undo Software as a Service Cortana Unified Threat Management Specifications Alt Codes Outsource IT Managing Costs Unified Threat Management Internet Exlporer SSID Fraud Environment Downtime Microchip eCommerce Media Hosted Solution Network Congestion Surveillance Username Virtual Assistant Black Friday Typing Physical Security Small Businesses Virtual Machine User Error Database Medical IT Reviews Displays Application Development Knowledge Transportation IT Technicians Google Drive Point of Sale Cyber Monday IBM Outsourcing Proxy Server Hypervisor Cookies 5G Tactics PowerPoint Network Management Hotspot Tech Support Shopping Optimization Unified Communications Monitors Workplace Experience Employer/Employee Relationships Mirgation Google Docs Bitcoin PCI DSS Hiring/Firing Running Cable Nanotechnology Navigation Addiction Language Google Wallet Websites Gig Economy Paperless Competition Internet Service Provider Co-managed IT Management Teamwork Chatbots Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop SharePoint Screen Reader Evernote Service Level Agreement Computing Infrastructure Drones Memes Business Communications

Blog Archive