FBI v. Apple -- Round 2 . . .

FBI v. Apple -- Round 2 . . .

How important is your iPhone privacy? Does it defeat law enforcement's interest in obtaining evidence of child pornography productions from your iPhone? According to a recent New York Times article, Apple decided to plug a privacy hole in its iPhone through which law enforcement could crawl. This plug was in response to FBI's previous end-run around iPhone software. You can read more about FBI v. Apple -- Round 1 -- here.

As the Times article makes clear, Indiana law enforcement officials used a $15,000.00 device from Gray Shift to unlock 96 iPhones in 2018, each time with a warrant. In Round 1, the magistrate judge essentially ordered Apple to create a back door through the iPhone's encryption for the FBI to use. This overreaching doesn't exist in Round 2. It doesn't appear the Indiana warrants required Apple to create a back door. As with real property cases, law enforcement has a right to forcibly enter your property once they have a warrant.

But Apple's plug now makes such devices likely obsolete. In so doing, Apple has made it harder for law enforcement to access your iPhone even when there is a warrant. Some district attorneys have argued, as pointed out in the article, that Apple is "blatantly protecting criminal activity." Viewing Apple this way is black and white: either there is easy third party access and Apple is good or no third party access but then Apple is bad.

In so doing, a middle road is ignored. When law enforcement obtains a warrant to search your bitcoin that is stored in a Switzerland bunker, they will not be able to access it without help. The bunker is not linked to the internet. While the FBI could physically access the bunker, if necessary, the data on the blockchain is meaningless. All identities are protected by crypto hash signatures. One solution would be for the owner of the bunker -- your bitcoin landlord -- to obtain the information needed about your account and submit it to the judge for private ("in camera") review. This solution was proposed in Round 1.

By giving evidence from an iPhone to the judiciary, Apple could proudly assist law enforcement's prosecution of child pornography, among other things. At the same time, Apple could still keep plugging otherwise revenue loss causing privacy holes.





要查看或添加评论,请登录

Ryan E. Long的更多文章

  • Deepfakes: Is Your Company Helpless?

    Deepfakes: Is Your Company Helpless?

    A competitor posts a damaging deepfake video about your company on Twitter. Coupled with the video is a defamatory…

  • Can AI Fight Fake News?

    Can AI Fight Fake News?

    Fake news and deep fake videos are rampant during this most challenging of times. Can artificial intelligence ("AI") be…

  • "Deep fake" videos -- how should Twitter deal with them?

    "Deep fake" videos -- how should Twitter deal with them?

    An embarrassing video of you shoplifting fancy dog food from Pet Food Express surfaces on Twitter. The video is a "deep…

  • How to beat a copycat.

    How to beat a copycat.

    If you run a billion (or even million) dollar brand, does it make sense to spend a few thousand dollars to protect your…

  • You've Been Sued In The E.U. For Quoting A "Short Extract"!

    You've Been Sued In The E.U. For Quoting A "Short Extract"!

    You are CEO of Google. When you wake up tomorrow morning, your general counsel calls you: "we've been sued in the E.

  • ICO - Unidentified Object or Security?

    ICO - Unidentified Object or Security?

    An Initial Coin Offering ("ICO"). Is it an unidentified (not flying) object or an offer of securities, like any other…

  • Google Privacy. Oxymoron?

    Google Privacy. Oxymoron?

    If you use Google, have you ever read their privacy policy? If you haven't, please keep reading. The policy delineates…

  • AI Art -- Who Owns It?

    AI Art -- Who Owns It?

    If your pet dog Hans takes a selfie, does he own the copyright? A recent decision by the U.S.

    1 条评论
  • Facebook: "Ad Brokers Are Watching."

    Facebook: "Ad Brokers Are Watching."

    Use Facebook? If you do, then you'll likely know about the recent controversy surrounding Cambridge Analytics. But…

  • Blockchain - Not The New Pearl Necklace

    Blockchain - Not The New Pearl Necklace

    Do you ever get concerned about hackers taking your personal health care information? Or what about your identifying…

社区洞察

其他会员也浏览了