Apple vs. the FBI: What you need to know
Recommended: Buy and sell chips, ICsore
What does the FBI want to do?
In fact, it is very simple. The FBI hopes that the federal judge will allow Apple to help it obtain more criminals' contact and communication data, rather than exploring Apple's trade secrets (encryption methods). But obviously, this behavior will make hundreds of millions of Apple users feel unsafe, because once it becomes a fact, it means that as long as the government or relevant agencies need it, Apple can access any iOS device at will, even if the user has set it to secret.
In iOS, if the user sets a secret, they can also enable the option "If you enter the wrong secret 10 times in a row, all data will be erased" in the settings. However, models before the iPhone 5s do not have a built-in special encryption chip, which means that in theory Apple can use special means to enter the iPhone 5c. The federal court believes that Apple has an obligation to create a backdoor software to help the FBI obtain data.
However, this requirement obviously conflicts with Apple's own service principles. Following the Snowden incident and the iCloud photo leak, Apple has repeatedly emphasized that it will not leave backdoors for iOS devices and user data is absolutely safe. Not only Apple, but also technology giants such as Google and Microsoft have also stated that user data is safe.
What will happen if Apple loses the case?
Obviously, if Apple loses the case, privacy-conscious users will be upset. "This is actually the government asking companies to build a fundamentally flawed product without providing platform protection," said Joseph Lorenzo Hall, chief technology officer of the Center for Democracy and Technology. "If the court can allow Apple to customize proprietary software to undermine the security of its own products, then it can also force any company to do the same, even leaving backdoors for the system through automatic updates, which is obviously very scary," Ross Schulman, senior advisor of the Open Technology Institute, agreed with this view.
If the United States sets a precedent, Apple and other technology companies may be asked to do the same thing in other markets, which is obviously not what companies want to see. Of course, if the FBI's technical experts are able to crack the gunman's iPhone with their own capabilities, then the situation is completely different. After all, this is not Apple's special backdoor for the system and announced to the world.
In fact, Google and other high-tech companies also have similar services, but Apple was unlucky this time because the criminals did not use Android phones, so many high-tech companies are waiting to see how the situation develops, and Apple is undoubtedly pushed to the front. There is only one exception: WhatsApp founder Jan Koum agreed with the court's approach, believing that ISIS threatens all of humanity and should be addressed first.
Latest developments
The federal judge gave Apple five working days to argue that the request was unreasonable. If Apple wins, user security in a broad sense will be guaranteed, and relevant agencies will seek other ways to obtain data; if Apple loses, there will be more similar cases in the future, and the security claimed by technology companies will become empty talk.
Have you been busy linking your bank card to Apple Pay on your iPhone 6/6 Plus/6s/6s Plus this week? We know that based on the consistent performance of Apple servers, you must have experienced more than three hours of high-frequency cycles of failed linking before you experienced the pleasure of completing the payment in three seconds.
Seeing that you are only one Apple server away from the world's most advanced payment experience, we understand that you must have felt like this in the past two days:
As for those of you who are also Apple users but can only watch your iPhone 5s with only a bunch of movie tickets, we can understand that you must be feeling this way:
Don't ask us how we know.
So, after the news about the fight between Apple and the FBI has been overwhelming these days, we don’t know if you have a sense of satisfaction in your heart that “you deserve it”.
The story begins at the end of last year. On December 2 last year, a terrorist couple committed a shooting in Southern California, killing 14 people. When the police searched afterwards, they obtained an iPhone 5c from one of the terrorists. However, because Apple has its own unique encryption technology, the FBI, which has great powers, could not do anything with this low-end Apple phone. So the California court ruled that Apple should cooperate with the police to crack the terrorists' phones to obtain evidence.
On the surface, this is a common plot in a popular legal program, where police officers seek help from companies to solve a case. However, Cook's subsequent open letter complicated the matter. In short, "You are asking us to open a backdoor in our phones, but we won't do it!"
As a result, the two parties in the United States, which are preparing for the presidential election, united for a rare occasion and joined forces with the American legal community and police to collectively condemn Apple's behavior for not considering public safety.
But wait, this matter does not seem to be that simple, because Cook mentioned user privacy in his open letter. So in today's news, American technology companies have come together to express their support for Apple and the FBI in various ways.
For example, Apple's arch-rival Google responded like this:
Google CEO Sundar Pichai said: "Cook's statement is important. Forcing companies to crack into your phone will violate your privacy."
Here's how Microsoft, another arch-rival of Apple, responded:
"Tech companies should not be required to build backdoors into their products to protect user information," Reform Government Surveillance, a group backed by Microsoft, said in a statement.
The response from the US version of WeChat WhatsApp was this:
WhatsApp founder supports Cook on Twitter: "We must not allow this precedent to be set. Our freedoms are at stake"
The reaction of the crowd in San Francisco, USA was as follows:
This week, a group of Americans went to the entrance of the Apple store in San Francisco to show their support for Apple. Note the phone in the leftmost girl's hand, it's Google's Nexus 5X. This is really a cross-racial love...
In contrast, it seems that the only person in the US technology community who stands on the government's side is this funny guy:
John McAfee said he would help the US police crack into cell phones, and if they failed, he would eat his shoes live on the Internet. To learn more about this funny story, please go out and search "McAfee" (yes, the antivirus software McAfee).
After watching the American version of the team-up between Apple and the FBI, we feel that when it comes to user privacy, it feels like logic can't catch up even if it cries out. In short, the deadlock in the battle between Apple and the FBI is that no matter who wins or loses, security loses in the end. At this critical juncture, it's wrong to choose a team to stand on.
Before explaining this point, let's first look at why Apple and the FBI are fighting.
What exactly does the FBI want Apple to help with?
To understand what the dispute between Apple and the FBI is, the necessary technical background is indispensable. The US court's ruling is to make Apple turn off the function of "self-destructing" the program after entering the wrong password 10 times, and to help the FBI speed up the time to crack the terrorist's mobile phone.
This is not difficult for Apple, but it is crucial for the FBI to solve the major crimes in the minds of the American people. Because:
1. Starting from iOS 8, iPhone data began to be stored in the phone in a very strong encryption method. Although the FBI can directly read the data code in the phone chip, it may take several years to crack the data.
2. The key of the terrorist's phone (iPhone5c) is generated by the password created by the user and the unique code corresponding to the device (written into the device when the iPhone is manufactured). Therefore, it is easier to brute force the data on the mobile device, because after copying the data, the cracker does not know the unique code corresponding to the device. To crack on the phone, you only need to know the user's password. (Note: Brute force means trying every possible password until it succeeds.)
3. iPhone provides users with the option to erase the phone after entering the wrong password 10 times, which undoubtedly increases the difficulty of cracking. Data erasure refers to erasing the key generated by the user's password and the device code. Once this key is erased, the data stored in the chip cannot be cracked. Apple has added a 5-second retry interval for each password attempt, which undoubtedly slows down the cracking speed.
In short, if Apple cooperates:
1. Disable the feature that wipes your phone after 10 incorrect passcode attempts, which allows the FBI to crack your iPhone.
2. Reduce the time interval between each password attempt. The terrorist only set a 4-digit password. If the system is changed to allow a password to be entered every 0.08 seconds, then brute force cracking will only take 34 minutes; if an 8-digit password mixed with letters is set, then brute force cracking will take more than 1 million years.
It seems like a simple thing, so why is Apple unwilling to cooperate? This has something to do with iPhone models after the iPhone 5s.
How difficult is it to crack an iPhone 5s or later?
Apple has added a "safe island" module to the CPU of iPhone 5s and later models. This part is completely independent of the phone's operating system. Compared with the CPU before the A7 chip, it has two improvements:
1. The mobile phone key is no longer generated by two parts as mentioned above, but by three parts: the unique code corresponding to the device, the user password, and the random code generated by the safe island. The random code generated by the safe island is not even known to Apple itself. In other words, simply guessing the password is no longer possible to crack it, and the cooperation of the "safe island" is required.
2. In addition, the security island has its own timer, which can tell you how long you need to wait after trying the wrong password. The first four wrong inputs will not be affected, but if you input the wrong password again, you need to wait for 1 minute, and then 5 minutes and 15 minutes. If you input the wrong password more than 9 times, you need to wait 1 hour before entering the password again, which means that even if the user only uses a 4-digit password, it will take more than a year to crack it by brute force.
If the terrorists use an iPhone 5s or later, the judge's order is invalid, and the FBI can only brute force the iPhone 5s and later models. This is because Apple cannot obtain the random code of the "safe island", and there is no way to crack the safe island through software.
Due to the "security island" and iOS 8, it is basically impossible for Apple or anyone else to crack users' iPhones after 5s. The only possibility is that Apple leaves a "backdoor" for special needs.
However, Apple itself cannot obtain the key to crack the iPhone, and the "safe island" cannot be accessed through software. If the terrorist's phone is a new model of iPhone, and Apple has to comply with the FBI's request to reduce security, then the software "backdoor" program can only be installed on the next generation of iPhone.
Apple vs. FBI, only Doubi can save the world
You know, one difference between the American legal system and ours is that when judges adjudicate disputes, they usually refer to the results of previous similar cases. In other words, if Apple accepts the California court's ruling and helps the FBI crack the terrorist's phone, then if something similar happens on a new phone in the future, Apple will have to help the FBI build a "backdoor".
The problem is this: creating a separate "backdoor" to solve a case is a small matter, but the big issue is what to do if the "backdoor" is lost? You know, this kind of program that can bypass the mobile phone security system can basically defeat all the security measures on the iPhone in seconds. Imagine that you finally linked your bank card to Apple Pay yesterday, and today the hacker used the "backdoor" to move all the money in the card. How would you feel at least like this:
So when this happened, I guess both Apple and the FBI were like a thousand chihuahuas beeping in their hearts. After all, in the United States, they don't want to see terrorists go unpunished, and they don't want to see their phones become vulnerable because of anti-terrorism. Now both sides of the team are ultimately for safety, but no matter which side gives in, it will become unsafe.
From this perspective, the only person who did the "right" thing in this matter is that funny McAfee. At least if he succeeds, both Apple and the FBI will save face and step down safely. If he fails, at least we still have a live show of eating leather shoes to watch, right?
Source: Internet Compiled
If you think the above content is good, I believe the content of the following public account will also be helpful to your life and career. I recommend you to follow it! !
Semiconductor Industry Observer ( icbank )
Semiconductor Industry Observation: The first vertical media in the semiconductor industry [www.icbank.cc]
Semiconductor Circle ( icquan )
The semiconductor circle is a network of leading entrepreneurs, start-ups, investors, and ICT technical talents in the semiconductor industry.
Semiconductor Industry Alliance ( ICUNION )
Semiconductor Industry Alliance: Building a vertical club for the domestic semiconductor industry [www.icbank.org]
ICstore, the first micro-mall for purchasing and selling electronic components
Featured Posts