{"id":31154,"date":"2016-12-23T14:40:32","date_gmt":"2016-12-23T19:40:32","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/customer-letter-apple.php"},"modified":"2016-12-23T14:40:32","modified_gmt":"2016-12-23T19:40:32","slug":"customer-letter-apple","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/customer-letter-apple.php","title":{"rendered":"Customer Letter &#8211; Apple"},"content":{"rendered":"<p><p>      The United States government has demanded that Apple take an      unprecedented step which threatens the security of our      customers. We oppose this order, which has implications far      beyond the legal case at hand.    <\/p>\n<p>      This moment calls for public discussion, and we want our      customers and people around the country to understand what is      at stake.    <\/p>\n<p>      Answers to      your questions about privacy and security    <\/p>\n<p>      Smartphones, led by iPhone, have become an essential part of      our lives. People use them to store an incredible amount of      personal information, from our private conversations to our      photos, our music, our notes, our calendars and contacts, our      financial information and health data, even where we have      been and where we are going.    <\/p>\n<p>      All that information needs to be protected from hackers and      criminals who want to access it, steal it, and use it without      our knowledge or permission. Customers expect Apple and      othertechnology companies to do everything in our power      to protect their personal information, and at Apple we are      deeply committed to safeguarding their data.    <\/p>\n<p>      Compromising the security of our personal information can      ultimately put our personal safety at risk. That is why      encryption has become so important to all of us.    <\/p>\n<p>      For many years, we have used encryption to protect our      customers personal data because we believe its the only way      to keep their information safe. We have even put that data      out of our own reach, because we believe the contents of your      iPhone are none of our business.    <\/p>\n<p>      We were shocked and outraged by the deadly act of terrorism      in San Bernardino last December. We mourn the loss of life      and want justice for all those whose lives were affected. The      FBI asked us for help in the days following the attack, and      we have worked hard to support the governments efforts to      solve this horrible crime.We have no sympathy for      terrorists.    <\/p>\n<p>      When the FBI has requested data thats in our possession, we      have provided it.Apple complies with valid subpoenas      and search warrants, as we have in the San Bernardino      case.We have also made Apple engineers available to      advise the FBI, and weveoffered our best ideas on a      number of investigative options at their disposal.    <\/p>\n<p>      We have great respect for the professionals at the FBI, and      we believe their intentions are good. Up to this point, we      have done everything that is both within our power and within      the law to help them. But now the U.S. government has asked      us for something we simply do not have, and something we      consider too dangerous to create. They have asked us to build      a backdoor to the iPhone.    <\/p>\n<p>      Specifically, the FBI wants us to make a new version of the      iPhone operating system, circumventing several important      security features, and install it on an iPhone recovered      during the investigation. In the wrong hands, this software       which does not exist today  would have the potential to      unlockanyiPhone in someones physical possession.    <\/p>\n<p>      The FBI may use different words to describe this tool, but      make no mistake: Building a version of iOS that bypasses      security in this way would undeniably create a backdoor. And      while the government may argue that its use would be      limitedto this case, there is no way to guarantee such      control.    <\/p>\n<p>      Some would argue that building a backdoor for just one iPhone      is a simple, clean-cut solution. But it ignores both the      basics of digital security and the significance of what the      government is demanding in this case.    <\/p>\n<p>      In todays digital world, the key to an encrypted system is      a piece of information that unlocks the data, and it is only      as secure as the protections around it. Once the information      is known, or a way to bypass the code is revealed, the      encryption can be defeated by anyone with that knowledge.    <\/p>\n<p>      The government suggests this tool could only be used once, on      one phone. But thats simply not true. Once created, the      technique could be used over and over again, on any number of      devices. In the physical world, it would be the equivalent of      a master key, capable of opening hundreds of millions of      locks from restaurants and banks to stores and homes.      No reasonable person would find that acceptable.    <\/p>\n<p>      The government is asking Apple to hack our own users and      undermine decades ofsecurity advancements that protect      our customers  including tens of millions of American      citizens  from sophisticated hackers and cybercriminals. The      same engineers who built strong encryption into the iPhone to      protect our users would, ironically, be ordered to weaken      those protections and make our users less safe.    <\/p>\n<p>      We can find no precedent for an American company being forced      to expose its customers to a greater risk of attack. For      years, cryptologists and national security experts have been      warning against weakening encryption. Doing so would hurt      only the well-meaning and law-abiding citizens who rely on      companies like Apple to protect their data. Criminals and bad      actors will still encrypt, using tools that are readily      available to them.    <\/p>\n<p>      Rather than asking for legislative action through Congress,      the FBI is proposing an unprecedented use of the All Writs      Act of 1789 to justify an expansion of its authority.    <\/p>\n<p>      The government would have us remove security features and add      new capabilities to the operating system, allowing a passcode      to be input electronically. This would make it easier to      unlock an iPhone by brute force, trying thousands or      millions of combinations with the speed of a modern computer.    <\/p>\n<p>      The implications of the governments demands are chilling. If      the government can use the All Writs Act to make it easier to      unlock your iPhone, it would have the power to reach into      anyones device to capture their data. The government could      extend this breach of privacy and demand that Apple build      surveillance software to intercept your messages, access your      health records or financial data, track your location, or      even access your phones microphone or camera without your      knowledge.    <\/p>\n<p>      Opposing this order is not something we take lightly. We feel      we must speak up in the face of what we see as an overreach      by the U.S. government.    <\/p>\n<p>      We are challenging the FBIs demands with the deepest respect      for American democracy and a love of our country. We believe      it would be in the best interest of everyone to step back and      consider the implications.    <\/p>\n<p>      While we believe the FBIs intentions are good, it would be      wrong for the government to force us to build a backdoor into      our products. And ultimately, we fear that this demand would      undermine the very freedoms and liberty our government is      meant to protect.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.apple.com\/customer-letter\/\" title=\"Customer Letter - Apple\">Customer Letter - Apple<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand. This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31154","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31154"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31154"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31154\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}