{"id":24369,"date":"2016-03-11T00:00:12","date_gmt":"2016-03-11T07:00:12","guid":{"rendered":"http:\/\/www.technightowl.com\/?p=24369"},"modified":"2016-03-10T17:14:10","modified_gmt":"2016-03-11T00:14:10","slug":"let-the-paranoia-about-smartphone-security-begin","status":"publish","type":"post","link":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/","title":{"rendered":"Let the Paranoia About Smartphone Security Begin"},"content":{"rendered":"<p>As Apple continues to fight the authorities over whether to develop a compromised version of iOS that would defeat encryption protections, some frightening prospects have arisen as to how far this can go. First of all, the claim that it&#8217;s all about one iPhone 5c used as a work phone by a terrorist has been shown to be false. In addition to another case in New York City, the authorities are waiting in the wings to unlock other iPhones should Apple lose this fight.<\/p>\n<p>But that&#8217;s just the start of it. According to an interview at Univision with Apple VP of Internet Software and Services, Eddy Cue, all of the nightmares about hacking mobile handsets that you see on TV crime procedurals could also come to pass.<\/p>\n<p>But even if Apple provides the requested software, consider this: Right now, if you have iOS 8 or iOS 9 installed, you are given 10 tries to unlock the device via a passcode, which is the method of last resort. If you cannot succeed on the 10th try, the device&#8217;s data is erased. Thus ends any attempt to recover the data.<\/p>\n<p>Apple is being asked to remove that protection against brute force logins with a special version of iOS. What\u00a0this would mean is that a computer could send repeating\u00a0login requests with different passcode combinations to the iPhone, which is known as a brute force attack. Of course, if it&#8217;s\u00a0locked with a six-digit passcode, it could take days to unlock it, allowing for instant repeats of different potential passcodes. Still, it would present a serious security problem if that new version of iOS got out.<\/p>\n<p>And it would, especially if multiple iPhones were involved. Worse, with the U.S. government&#8217;s pretty dismal record of security, it&#8217;s quite possible that this &#8220;secret&#8221; unlocking code would find its way into the wild in short order. So criminals \u2014 and some unsavory governments \u2014 would also be able to compromise iPhone security. This is a key issue that those who claim it&#8217;s just for one iPhone choose to ignore. People who say &#8220;I have nothing to hide,&#8221; forget who might get access to that data. Hint: It won&#8217;t just be the good guys.<\/p>\n<p>Still, the government&#8217;s latest response to Apple&#8217;s refusal to comply still maintains it&#8217;s all about one iPhone. Quite disingenuous I should think.<\/p>\n<p>Now according to Cue, that move, should it succeed, may just be the beginning. Armed with that precedent, it&#8217;s possible that the U.S. government could demand that Apple implement all sorts of surveillance schemes on their devices. How many times have you seen a TV show or movie depicting the requisite computer nerd sending down some code and turning on a smartphone&#8217;s camera and mic? Imagine if the authorities \u2014 or criminals \u2014 were able to do the very same thing on your iPhone?<\/p>\n<p>In the original James Bond movies, you&#8217;d often see 007 check a hotel room for evidence of hidden surveillance gear. Well, imagine if your smartphone became a surveillance device, and you not only wouldn&#8217;t know about it unless you looked real close, but you couldn&#8217;t stop it if it happened?<\/p>\n<p>Now some of you might remember that entertaining\u00a0Will Smith action flick, &#8220;Enemy of the State&#8221; where he portrays a lawyer being pursued around Washington, D.C. by a rogue government agent (played by Jon Voight). The use all sorts of surveillance gear and manage to track Smith and co-star Gene Hackman to an inch of their lives.<\/p>\n<p>Now in 1998, when this film was released, the prospect of such an intrusive national security state might have seemed a little far-fetched. But if you watch the film today with an open mind, you&#8217;ll see how prescient the writers and producers really were. When you consider the Apple versus FBI case, you might see something just as frightening coming true.<\/p>\n<p>It&#8217;s early in the game. Apple has a court date the very same week they are holding an Apple media event to introduce some new gear, presumably a 4-inch iPhone and an updated 9.7-inch iPad. But even if Apple doesn&#8217;t get the judge&#8217;s decision reversed, they will appeal. Even if they win, the government will appeal. This case could drag on for months or years before the U.S. Supreme Court makes a final decision, or knocks it back to the last appellate court to, in effect, affirm their ruling.<\/p>\n<p>I wouldn&#8217;t even pretend to know how the courts are going to rule. We already have a Brooklyn-based judge who sided with Apple. Even if the west coast case provides a different conclusion \u2014 and the judge doesn&#8217;t use the New York case as precedent \u2014 it won&#8217;t be over.<\/p>\n<p>While I understand the desire to combat terrorism, and chase after criminals, how much of your privacy do you lose if you give the authorities nearly unfettered freedom to look at the stuff you&#8217;ve stored on your iPhone? Some of that data is already available courtesy of iCloud backups or cellular phone activity. That ought to be enough. At the end of the day, even if you didn&#8217;t mind the government having access,\u00a0what about the terrifying\u00a0possibility that those who gain\u00a0access to your data\u00a0might be the very criminals Apple once hoped to thwart when they added encryption to the iOS?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Apple continues to fight the authorities over whether to develop a compromised version of iOS that would defeat encryption protections, some frightening prospects have arisen as to how far this can go. First of all, the claim that it&#8217;s all about one iPhone 5c used as a work phone by a terrorist has been [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[15598,15542,15601,15595,8978,15596,15600,13045,12291,14478,14827,10711,26,14228,15597,15599],"class_list":["post-24369","post","type-post","status-publish","format-standard","hentry","category-news","tag-15598","tag-4-inch-iphone","tag-9-7-inch-ipad","tag-apple-vp-of-internet-software-and-services","tag-eddy-cue","tag-enemy-of-the-state","tag-gene-hackman","tag-icloud","tag-ios","tag-ios-8","tag-ios-9","tag-ipad","tag-iphone","tag-iphone-5c","tag-james-bond","tag-will-smith"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl\" \/>\n<meta property=\"og:description\" content=\"As Apple continues to fight the authorities over whether to develop a compromised version of iOS that would defeat encryption protections, some frightening prospects have arisen as to how far this can go. First of all, the claim that it&#8217;s all about one iPhone 5c used as a work phone by a terrorist has been [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/\" \/>\n<meta property=\"og:site_name\" content=\"Gene Steinberg&#039;s Tech Night Owl\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-11T07:00:12+00:00\" \/>\n<meta name=\"author\" content=\"Gene Steinberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@technightowl\" \/>\n<meta name=\"twitter:site\" content=\"@technightowl\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gene Steinberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/\"},\"author\":{\"name\":\"Gene Steinberg\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/#\\\/schema\\\/person\\\/0fe9df12a34fed15d45e05db1c205e2a\"},\"headline\":\"Let the Paranoia About Smartphone Security Begin\",\"datePublished\":\"2016-03-11T07:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/\"},\"wordCount\":909,\"commentCount\":2,\"keywords\":[\"007\",\"4-inch iPhone\",\"9.7-inch iPad\",\"Apple VP of Internet Software and Services\",\"Eddy Cue\",\"Enemy of the State\",\"Gene Hackman\",\"iCloud\",\"iOS\",\"iOS 8\",\"iOS 9\",\"iPad\",\"Iphone\",\"iPhone 5C\",\"James Bond\",\"Will Smith\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/\",\"url\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/\",\"name\":\"Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/#website\"},\"datePublished\":\"2016-03-11T07:00:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/#\\\/schema\\\/person\\\/0fe9df12a34fed15d45e05db1c205e2a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/2016\\\/03\\\/let-the-paranoia-about-smartphone-security-begin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Let the Paranoia About Smartphone Security Begin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/\",\"name\":\"Gene Steinberg&#039;s Mac Radio Tech Blog\",\"description\":\"Tech Commentaries From Best-Selllng Author Gene Steinberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.technightowl.live\\\/blog\\\/#\\\/schema\\\/person\\\/0fe9df12a34fed15d45e05db1c205e2a\",\"name\":\"Gene Steinberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r\",\"caption\":\"Gene Steinberg\"},\"sameAs\":[\"https:\\\/\\\/www.technightowl.live\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/","og_locale":"en_US","og_type":"article","og_title":"Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl","og_description":"As Apple continues to fight the authorities over whether to develop a compromised version of iOS that would defeat encryption protections, some frightening prospects have arisen as to how far this can go. First of all, the claim that it&#8217;s all about one iPhone 5c used as a work phone by a terrorist has been [&hellip;]","og_url":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/","og_site_name":"Gene Steinberg&#039;s Tech Night Owl","article_published_time":"2016-03-11T07:00:12+00:00","author":"Gene Steinberg","twitter_card":"summary_large_image","twitter_creator":"@technightowl","twitter_site":"@technightowl","twitter_misc":{"Written by":"Gene Steinberg","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/#article","isPartOf":{"@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/"},"author":{"name":"Gene Steinberg","@id":"https:\/\/www.technightowl.live\/blog\/#\/schema\/person\/0fe9df12a34fed15d45e05db1c205e2a"},"headline":"Let the Paranoia About Smartphone Security Begin","datePublished":"2016-03-11T07:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/"},"wordCount":909,"commentCount":2,"keywords":["007","4-inch iPhone","9.7-inch iPad","Apple VP of Internet Software and Services","Eddy Cue","Enemy of the State","Gene Hackman","iCloud","iOS","iOS 8","iOS 9","iPad","Iphone","iPhone 5C","James Bond","Will Smith"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/","url":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/","name":"Let the Paranoia About Smartphone Security Begin - Gene Steinberg&#039;s Tech Night Owl","isPartOf":{"@id":"https:\/\/www.technightowl.live\/blog\/#website"},"datePublished":"2016-03-11T07:00:12+00:00","author":{"@id":"https:\/\/www.technightowl.live\/blog\/#\/schema\/person\/0fe9df12a34fed15d45e05db1c205e2a"},"breadcrumb":{"@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.technightowl.live\/blog\/2016\/03\/let-the-paranoia-about-smartphone-security-begin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.technightowl.live\/blog\/"},{"@type":"ListItem","position":2,"name":"Let the Paranoia About Smartphone Security Begin"}]},{"@type":"WebSite","@id":"https:\/\/www.technightowl.live\/blog\/#website","url":"https:\/\/www.technightowl.live\/blog\/","name":"Gene Steinberg&#039;s Mac Radio Tech Blog","description":"Tech Commentaries From Best-Selllng Author Gene Steinberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technightowl.live\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technightowl.live\/blog\/#\/schema\/person\/0fe9df12a34fed15d45e05db1c205e2a","name":"Gene Steinberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r","url":"https:\/\/secure.gravatar.com\/avatar\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24fa8d75c69c3030b03da85850df6d736f514f8393b61cc4ac158168b192df2e?s=96&r=r","caption":"Gene Steinberg"},"sameAs":["https:\/\/www.technightowl.live"]}]}},"_links":{"self":[{"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/posts\/24369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/comments?post=24369"}],"version-history":[{"count":0,"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/posts\/24369\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/media?parent=24369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/categories?post=24369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technightowl.live\/blog\/wp-json\/wp\/v2\/tags?post=24369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}