SlideShare uma empresa Scribd logo
1 de 3
Should we go down the FBiOS rabbit hole?
The headlines have been soaring for the past 2 months over the Apple/FBI debate. We will not be
going into the specifics of this particular case, but for those of you who have been living under a rock
the whole time, here is a brief summary of the situation:
Following the San Bernandino shooting, the FBI came into possession of an iPhone used by one of
the terrorists who killed 14 people last year on December 2nd. Suspecting the device might contain
helpful information in the fight against terrorism, the FBI requested of Apple to develop a new iOS
version – or an FBiOS as the media baptized it, capable of circumventing certain iPhone key security
features. At the request of the Justice Department, a federal judge instructed Apple to assist law
enforcement in unlocking cell phones whose contents are cryptographically protected.
The issue was taken to court and, while Apple was instructed to assist law enforcement, it blatantly
refused to do so. Backed up by technology giants such as Google and Facebook, Tim Cook, CEO of
Apple, stated his position firmly: ‘this software — which does not exist today — would have the
potential to unlock any iPhone in someone’s physical possession. Building a version of iOS that
bypasses security in this way would undeniably create a backdoor. And while the government may
argue that its use would be limited to this case, there is no way to guarantee such control’. During his
public relations campaign, Cook pointed out repeatedly the impact the court order could have on the
privacy of IPhone users. Seeing as how only in the US there are 110 million IPhone owners (a little
over a third of the entire US population), we can understand how that might upset some.
On the other hand, the FBI made quite a compelling case, invoking past situations when impenetrable
IPhones were involved and lives were in danger. When the argument is national security and the fight
against terrorism, the majority will give in to fear and renounce privacy in the favor of security. At least,
that is how the US government portrayed the FBI-Apple dispute, a battle meant to determine which of
the two is more important. Would you rather feel safer or have more privacy? This question, however,
begs for a singular answer, while one aspect cannot exclude the other. Less privacy doesn’t
automatically equal more security, on the contrary.
Benjamin Benifei, our Legal Consultant at ITrust, states his opinion: ‘It is easy for public authorities to
criticize data encryption. Opinions are fusing together in order to weaken encryption by legallystripping
it of its use, enforcing the creation of hidden backdoors, or by simply forbidding it. That being said,
what the general public needs to understand is that limitingdataencryption will have a definite negative
impact on our society. It will not achieve its goal of helpinglaw enforcement agenciesto fight terrorism,
Benjamin Benifei, our Legal Consultant at ITrust, states his opinion: ‘It is easy for public authorities to
criticize data encryption. Opinions are fusing together in order to weaken encryption by legallystripping
it of its use, enforcing the creation of hidden backdoors, or by simply forbidding it. That being said,
what the general public needs to understand is that limitingdataencryption will have a definite negative
impact on our society. It will not achieve its goal of helpinglaw enforcement agenciesto fight terrorism,
but will instead reinforce hacker’s chances to get a hold of our sensitive data, jeopardizing even more
our security’.
We tend to see eye to eye with our consultant on this. There is a tension being created now at the
center of rising new technologies, a tension that was anticipated neither by device manufacturer nor
by law government agencies. The real dilemma here is not to define the exceptional cases when
security trumps privacy, but this: how do we conserve both security and personal rights without
hindering one or the other?
With this bigger picture in mind, it becomes easier to see that the FBiOS discussion was merely a
pretext to bring forward the fact that there is no clear legislation around encryption in the US. In court,
the All Writs Act cited by the FBI dates way back to the 1800s, which no longer hold their validity more
than 200 years later.
In the end, the FBI dropped its case against Apple and managed to recover the data on the terrorist’s
iPhone via a ‘third party’ – represented, in fact, by a handful of professional hackers that the Federal
Bureau had paid to do so. The method used by this third party is said to only unlock the iPhone 5C
used by the San Bernardino shooter.
The resolution puts in a questionable light the entire case to begin with, but the turmoil it arose is just
now starting to spread its ramifications. A policy proposal aiming to weaken encryption, by forcing tech
actors to override their own security features for the sake of law enforcement, was introduced by US
senators not long ago. On the other side, the technology sector and privacy advocates form a united
front in militating against its approval in Congress.
One thing is clear: the situation has yet to find its balance on US soil. On the topic, Benjamin also
explains the legal status of encryption in France, treated similarly in 2004: ‘The LCEN (Loi pour la
Confiance dans l’Economie Numérique; English: Bill for Building Confidence in the Digital Economy)
bestowed upon French companiesthe complete liberty regarding their choice of employingencryption
methods. Nevertheless, the bill restricts the way these means of encryption are imported, provided
and exported (Art. 30 from the LCEN). Refusing to provide law enforcement agencies with an
encryption key that was supposedly used to plan and/or commit crimes, can be punished with a 3-
year jail sentence, as well as with fine of up to 75k€ (Art. 434-15-2 from the Penal Code). Public
prosecutors and police officers are, thus, entitled to request that an individual or a company
communicate all information useful in “revealing the truth”, including encryption keys (Art. 60-2 from
the Criminal Procedure Code). Therefore, if a similar case were to happen in France, Apple would be
legally bound to hand over its encryption key in order to decrypt the data’.
The matter of security and privacy in the context of encryption can be carried out to no end and,
depending on where you stand, both opinions may seem reasonable. ‘The trick is then’, Benjamin
adds, ‘to fully respect cybersecurity good practices and to apply end-to-end encryption, leaving the
phone manufacturer outside of the loop where encryption is concerned.’
The matter of security and privacy in the context of encryption can be carried out to no end and,
depending on where you stand, both opinions may seem reasonable. ‘The trick is then’, Benjamin
adds, ‘to fully respect cybersecurity good practices and to apply end-to-end encryption, leaving the
phone manufacturer outside of the loop where encryption is concerned.’
Considering this option, is Apple’s refusal to cooperate really a declaration of their commitment
towards user privacy? Or is it simply the tech giant’s way of distracting public attention from the fact
that it is the only one to possess the encryption keys off all 700 million iPhones out there?
Link:
https://www.reveelium.com/en/fbios-rabbit-hole/

Mais conteúdo relacionado

Destaque

Ch. 9 Powerpoint
Ch. 9 PowerpointCh. 9 Powerpoint
Ch. 9 Powerpointmrbruns
 
Benchmark сканеров SQL injection
Benchmark сканеров SQL injectionBenchmark сканеров SQL injection
Benchmark сканеров SQL injectionAndrew Petukhov
 
Java 9 by Alessio Stalla
Java 9 by Alessio StallaJava 9 by Alessio Stalla
Java 9 by Alessio StallaJUG Genova
 
16. toma de muestras orina para cultivo
16. toma de muestras  orina para cultivo16. toma de muestras  orina para cultivo
16. toma de muestras orina para cultivocaedhmh
 
NEFROLOGIA CLINICA: Nefropatia diabetica
NEFROLOGIA CLINICA: Nefropatia diabeticaNEFROLOGIA CLINICA: Nefropatia diabetica
NEFROLOGIA CLINICA: Nefropatia diabeticagustavo diaz nuñez
 
Caracteristicas del instrumental quirurgico basico
Caracteristicas del instrumental quirurgico basicoCaracteristicas del instrumental quirurgico basico
Caracteristicas del instrumental quirurgico basiconatorabet
 
Meetup Docker : From Zero to Hero
Meetup Docker : From Zero to HeroMeetup Docker : From Zero to Hero
Meetup Docker : From Zero to HeroLaurent Grangeau
 

Destaque (9)

Ch. 9 Powerpoint
Ch. 9 PowerpointCh. 9 Powerpoint
Ch. 9 Powerpoint
 
Benchmark сканеров SQL injection
Benchmark сканеров SQL injectionBenchmark сканеров SQL injection
Benchmark сканеров SQL injection
 
Java 9 by Alessio Stalla
Java 9 by Alessio StallaJava 9 by Alessio Stalla
Java 9 by Alessio Stalla
 
16. toma de muestras orina para cultivo
16. toma de muestras  orina para cultivo16. toma de muestras  orina para cultivo
16. toma de muestras orina para cultivo
 
Presentación3
Presentación3Presentación3
Presentación3
 
Parcial de orina
Parcial de orinaParcial de orina
Parcial de orina
 
NEFROLOGIA CLINICA: Nefropatia diabetica
NEFROLOGIA CLINICA: Nefropatia diabeticaNEFROLOGIA CLINICA: Nefropatia diabetica
NEFROLOGIA CLINICA: Nefropatia diabetica
 
Caracteristicas del instrumental quirurgico basico
Caracteristicas del instrumental quirurgico basicoCaracteristicas del instrumental quirurgico basico
Caracteristicas del instrumental quirurgico basico
 
Meetup Docker : From Zero to Hero
Meetup Docker : From Zero to HeroMeetup Docker : From Zero to Hero
Meetup Docker : From Zero to Hero
 

Mais de ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

Mais de ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Último

Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 

Último (20)

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 

Should we go down the FBiOS rabbit hole? @ReveeliumBlog

  • 1. Should we go down the FBiOS rabbit hole? The headlines have been soaring for the past 2 months over the Apple/FBI debate. We will not be going into the specifics of this particular case, but for those of you who have been living under a rock the whole time, here is a brief summary of the situation: Following the San Bernandino shooting, the FBI came into possession of an iPhone used by one of the terrorists who killed 14 people last year on December 2nd. Suspecting the device might contain helpful information in the fight against terrorism, the FBI requested of Apple to develop a new iOS version – or an FBiOS as the media baptized it, capable of circumventing certain iPhone key security features. At the request of the Justice Department, a federal judge instructed Apple to assist law enforcement in unlocking cell phones whose contents are cryptographically protected. The issue was taken to court and, while Apple was instructed to assist law enforcement, it blatantly refused to do so. Backed up by technology giants such as Google and Facebook, Tim Cook, CEO of Apple, stated his position firmly: ‘this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control’. During his public relations campaign, Cook pointed out repeatedly the impact the court order could have on the privacy of IPhone users. Seeing as how only in the US there are 110 million IPhone owners (a little over a third of the entire US population), we can understand how that might upset some. On the other hand, the FBI made quite a compelling case, invoking past situations when impenetrable IPhones were involved and lives were in danger. When the argument is national security and the fight against terrorism, the majority will give in to fear and renounce privacy in the favor of security. At least, that is how the US government portrayed the FBI-Apple dispute, a battle meant to determine which of the two is more important. Would you rather feel safer or have more privacy? This question, however, begs for a singular answer, while one aspect cannot exclude the other. Less privacy doesn’t automatically equal more security, on the contrary. Benjamin Benifei, our Legal Consultant at ITrust, states his opinion: ‘It is easy for public authorities to criticize data encryption. Opinions are fusing together in order to weaken encryption by legallystripping it of its use, enforcing the creation of hidden backdoors, or by simply forbidding it. That being said, what the general public needs to understand is that limitingdataencryption will have a definite negative impact on our society. It will not achieve its goal of helpinglaw enforcement agenciesto fight terrorism,
  • 2. Benjamin Benifei, our Legal Consultant at ITrust, states his opinion: ‘It is easy for public authorities to criticize data encryption. Opinions are fusing together in order to weaken encryption by legallystripping it of its use, enforcing the creation of hidden backdoors, or by simply forbidding it. That being said, what the general public needs to understand is that limitingdataencryption will have a definite negative impact on our society. It will not achieve its goal of helpinglaw enforcement agenciesto fight terrorism, but will instead reinforce hacker’s chances to get a hold of our sensitive data, jeopardizing even more our security’. We tend to see eye to eye with our consultant on this. There is a tension being created now at the center of rising new technologies, a tension that was anticipated neither by device manufacturer nor by law government agencies. The real dilemma here is not to define the exceptional cases when security trumps privacy, but this: how do we conserve both security and personal rights without hindering one or the other? With this bigger picture in mind, it becomes easier to see that the FBiOS discussion was merely a pretext to bring forward the fact that there is no clear legislation around encryption in the US. In court, the All Writs Act cited by the FBI dates way back to the 1800s, which no longer hold their validity more than 200 years later. In the end, the FBI dropped its case against Apple and managed to recover the data on the terrorist’s iPhone via a ‘third party’ – represented, in fact, by a handful of professional hackers that the Federal Bureau had paid to do so. The method used by this third party is said to only unlock the iPhone 5C used by the San Bernardino shooter. The resolution puts in a questionable light the entire case to begin with, but the turmoil it arose is just now starting to spread its ramifications. A policy proposal aiming to weaken encryption, by forcing tech actors to override their own security features for the sake of law enforcement, was introduced by US senators not long ago. On the other side, the technology sector and privacy advocates form a united front in militating against its approval in Congress. One thing is clear: the situation has yet to find its balance on US soil. On the topic, Benjamin also explains the legal status of encryption in France, treated similarly in 2004: ‘The LCEN (Loi pour la Confiance dans l’Economie Numérique; English: Bill for Building Confidence in the Digital Economy) bestowed upon French companiesthe complete liberty regarding their choice of employingencryption methods. Nevertheless, the bill restricts the way these means of encryption are imported, provided and exported (Art. 30 from the LCEN). Refusing to provide law enforcement agencies with an encryption key that was supposedly used to plan and/or commit crimes, can be punished with a 3- year jail sentence, as well as with fine of up to 75k€ (Art. 434-15-2 from the Penal Code). Public prosecutors and police officers are, thus, entitled to request that an individual or a company communicate all information useful in “revealing the truth”, including encryption keys (Art. 60-2 from the Criminal Procedure Code). Therefore, if a similar case were to happen in France, Apple would be legally bound to hand over its encryption key in order to decrypt the data’. The matter of security and privacy in the context of encryption can be carried out to no end and, depending on where you stand, both opinions may seem reasonable. ‘The trick is then’, Benjamin adds, ‘to fully respect cybersecurity good practices and to apply end-to-end encryption, leaving the phone manufacturer outside of the loop where encryption is concerned.’
  • 3. The matter of security and privacy in the context of encryption can be carried out to no end and, depending on where you stand, both opinions may seem reasonable. ‘The trick is then’, Benjamin adds, ‘to fully respect cybersecurity good practices and to apply end-to-end encryption, leaving the phone manufacturer outside of the loop where encryption is concerned.’ Considering this option, is Apple’s refusal to cooperate really a declaration of their commitment towards user privacy? Or is it simply the tech giant’s way of distracting public attention from the fact that it is the only one to possess the encryption keys off all 700 million iPhones out there? Link: https://www.reveelium.com/en/fbios-rabbit-hole/