Even consumers who aren’t necessarily very technically-minded have at least a vague sense that an encrypted site is safer to use than one that isn’t. But encryption, alas, is never a permanent cure-all. And that’s why it’s troubling that new research has found it’s easier than anyone thought to put a backdoor into internet encryption that could let any big, surveillaince-minded entity (good morning, NSA) have a listen. [More]
Last month, Senators Diane Feinstein of California and Richard Burr of North Carolina were set to bring forth legislation that would end the debate on whether companies like Apple should help law enforcement unlock users’ devices, by requiring them to do so. In spite of the bipartisan, high-level sponsorship and the spotlight of the disputes between Apple and the Justice Department, it looks like this controversial legislation may never even be formally introduced. [More]
If you’re arrested or a suspect in a crime, the police can’t force you to remember the combination to your safe, or the passcode for your iPhone. But what if that phone can be unlocked with biometric data like a fingerprint? Does the ready access to this information give law enforcement an easy way to open secure devices, or would that be a violation of your constitutional rights? [More]
A month ago, the FBI dropped its legal effort to compel Apple to unlock a dead terrorist’s iPhone after a third party provided the agency with a way to bypass the device’s encryption. While the federal law enforcer is okay with using what it learned to aid other criminal investigations, it doesn’t look like the FBI is jumping at the chance to let Apple in on the secret. [More]
As you may have heard, on Friday afternoon the U.S. Department of Justice backed off its efforts to compel Apple to aid in unlocking a criminal suspect’s iPhone — for the second time in only a few weeks. While some have heralded this as a significant victory for Apple (or at least as a loss for the government), it’s really just a tiny, unresolved spat in what looks to become a protracted legal battle for both sides. [More]
Legislators in D.C. are currently considering a law that would compel tech companies to have weak device and software encryption so that law enforcement can snoop when necessary, while federal prosecutors have repeatedly used a 227-year-old law to try to force Apple and Google to work around existing security on their products. A new lawsuit seeks to find out if the government has also been using a highly secretive court to force tech companies to assist in breaking their own encryption. [More]
With the U.S. Department of Justice still attempting to compel Apple to unlock the iPhone of a drug suspect, the tech giant is asking the court why this is so important when the former owner of that iPhone has already pled guilty. [More]
Usually, D.C. moves slowly. There’s a kind of plodding, methodical rhythm to Congress and the federal agencies, and very little turns on a dime. So it stands out that less than 48 hours after introducing a bill into the Senate, over 42,000 people have already objected to basically everything about it.
A week after it was first reported that Senators Dianne Feinstein (CA) and Richard Burr (NC) were prepping a bipartisan bill that would compel tech companies to build their devices and software with weakened encryption or built-in backdoors for law enforcement, the actual bill has been introduced. Here’s what you need to know about why consumer and privacy advocates are concerned.
In February, while a federal court in California was pondering whether or not to compel Apple’s assistance in unlocking a terrorist’s iPhone, a federal magistrate judge in New York ruled — in a drug-related case — that the government couldn’t force Apple to defeat its own encryption. In spite of that ruling, the Justice Department now tells the court that it is going ahead with its effort to require Apple’s help. [More]
Report: New Bill Would Let Judges Order Tech Companies To Break Encryption; White House Not Thrilled
The public fight Apple and the FBI recently had over one particular phone may have resolved itself, but the national discussion over encryption is just warming up. Now there’s a bipartisan effort to make a decision wandering through Congress… but the politics of it say that this particular bill is going to go nowhere fast.
Even though the FBI has figured out a work-around that — for now — allows the agency to bypass an iPhone’s encryption, the debate still continues about which is more important: privacy for all consumers, or ready-but-limited access for law enforcement? Today, Facebook-owned messaging service WhatsApp made it clear which side of that argument it comes down on. [More]
One of Apple’s biggest concerns about being compelled to assist the FBI in bypassing the security measures on the iPhone was that it would be just the first of many requests to get around the device’s encryption, thus increasing the odds of this work-around getting into the hands of hackers. Now comes news that the FBI — which was able to crack the iPhone lockdown without Apple’s assistance — is offering to unlock Apple devices for other law enforcement agencies. [More]
The high-profile legal standoff between Apple and the FBI recently came to an end when the government unlocked a terrorist’s iPhone without Apple’s assistance, but new data confirms that this single showdown is just one of dozens of cases where the federal government has successfully used a more than 225-year-old law to compel Apple or Google to aid authorities in bypassing smartphone security measures. [More]
Apple and the FBI have been fighting very publicly for the last month about national security, iPhones, and the intersection of privacy and encryption with those things. Their legal battle was supposed to be heard in court in California this afternoon — except the FBI has asked for a delay, saying that actually, maybe they don’t need Apple to create a backdoor to get what they want after all.