March 16, 2016
(vol. 125, iss. 89)
• Page Image 4
… becomes extremely hard to crack even with millions of dollars of computer hardware. In the realm of technology, it’s used on individual devices to privatize data, usually to prevent access by a thief…
… perpetrators. The debate between privacy advo- cates and law enforcement came to a head this past month when Apple published a customer let- ter announcing they would refuse to comply and fight a court…
… Apple in its customer letter said such an action would cre- ate dangerous standards that would undermine the security that pro- tects all of its customers. While one should be sympathetic to the cause…
… of investigators in these cases, Apple is right. Since October 2015, government authorities have also requested access to 12 other iPhones under the jurisdiction of the ancient All Writs Act of…
… 1789. Despite their insistence on needing Apple’s help, 11 of these devices run older versions of Apple’s iOS software with existing public vulnerabilities that would allow investigators to extract…
… tech- nology every day. One of the few congressmen with a background in computer science, Rep. Ted Lieu (D–Cal.), introduced a federal bill that would stop states from instituting their own bans on…
… out almost unanimously in support of Apple in this case. The Department of Justice, in a brief, even suggested that they could com- pel Apple to turn over their source code to the FBI, presenting a…
… these tech com- panies could be forced to become puppets of the justice system to this extreme should be alarming, and the technical community sees that. For now, the courts have sided with Apple in…
… a similar case, such that Apple will not have to introduce exploits in their system available for use by law enforcement. While many lawmakers and citizens will try to see nuance in the issue and…
… what makes so much of using the Internet, computers and smartphones possible.” O n Saturday, 65 students, myself included, will grudgingly leave the warm confines of our beds, don…