Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Tracker47

That didn’t carry the punctuation.


2 posted on 02/22/2016 2:04:51 PM PST by Tracker47
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Tracker47

The Apple case is unique in that the owner of the phone is dead, and the encryption technology separates the data from Apple like a locked suitcase which only the phone owner has.

Warrants are really great things. Backdoors where potentially anyone can access without a check — not so hot.

People understand both concepts, and hopefully agree with them. The phone or warrant can go to Apple, and they take care of it. The “suitcase” never goes outside Apple, but the data inside the suitcase goes to HSA.

Apple can update its end user agreement to reflect this. However, I do understand everyone’s meta data collection, warrant flooding, etc. concerns.

Maybe a compromise would means law enforcement is limited to x number of requests at y level severity per pre-determined timeframe (and maybe geographic area for the HIGHEST level). And once the threat passes or process of elimination is complete, then a new “suitcase lock” is put back in place.

I’m no lawyer, but even I know wiretap laws on the books can cover quite a bit of this.


9 posted on 02/22/2016 2:29:36 PM PST by Read Write Repeat
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson