![]() ![]() In those scenarios, it will be on Apple to try to explain why it cannot accommodate the new requests. This is only possible on a technical level in very specific circumstances, but if Apple assists in this instance, then it paves the way for more unreasonable and technically difficult requests to be made. The aspect that would actually affect the public is the fact that by doing this, Apple will show that breaking into an iPhone is “possible,” and allow the FBI to use this case in the future as leverage. This solution would allow Apple to use existing technologies in the firmware file format to grant access to the phone ensuring that there is no possible way the same solution would work on another device. On a technical level, Apple could carry out the order by creating a RAM disk signed by the company’s production certificate for the specific ECID of the suspect’s iPhone. This is not describing a technical issue, but is instead directly related to the later-mentioned issue of setting a precedent. Many have been misinterpreting the portions of Apple’s public response letter with regards to the technique that might help break into the iPhone 5c being usable with other devices (if such a tool was created for other devices). Here are five key things that need to be clarified.ġ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |