Lots of shaky “facts” in this article...first off all 70 times were prior to iOS ver. 8...Apple improved customer’s security with ver. 8 & 9. All data is now encrypted with 256 bit AES and Apple has lost the ability to read the data. The FBI is now looking for a crack for the “anti-brute force” protections (10 password tries then phone erases itself & the “timer functions” that require more & more time between password tries) so they can attempt to “brute-force “ the terrorist’s password. Secondly, in the “New York Case” that the article is based on, the government used the “All Writs Act” (not a search warrant as the article states), and the judge in that case clearly indicated that the All Writs Act probably doesn’t compel Apple to attempt to crack it’s own security:
“In October 2015, Magistrate Judge James Orenstein of the U.S. District Court for the Eastern District of New York, expressed strong doubts that he had legal authority to order Apple to unlock an iPhone in government possession.”
He said:
“[Apple] is a private-sector company that is free to choose to promote its customers’ interests in privacy over the competing interest of law enforcement,” wrote Orenstein in his memorandum and court order.”
http://www.cnbc.com/2016/02/17/the-esoteric-law-being-used-to-fight-apple.html
So the current judge is on shaky ground when using the “All Writs Act”.
New York Case:
https://ia801501.us.archive.org/27/items/gov.uscourts.nyed.376325/gov.uscourts.nyed.376325.2.0.pdf
San Bernardino case judge order:
https://www.documentcloud.org/documents/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html
Excellent post. I am no Apple fan but I support them on this front.
ping.
Thanks for the links.