<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jefferson&#039;s Wheel &#187; Uncategorized</title>
	<atom:link href="http://www.jeffersonswheel.org/category/uncategorized/feed" rel="self" type="application/rss+xml" />
	<link>https://www.jeffersonswheel.org</link>
	<description>Security Research at the University of Virginia</description>
	<lastBuildDate>Sun, 14 Oct 2018 03:12:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Apple and the FBI</title>
		<link>https://www.jeffersonswheel.org/2016/apple-and-the-fbi</link>
		<comments>https://www.jeffersonswheel.org/2016/apple-and-the-fbi#comments</comments>
		<pubDate>Thu, 25 Feb 2016 10:48:00 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[History]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Smartphones]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.jeffersonswheel.org/?p=642</guid>
		<description><![CDATA[I&#8217;m quoted in this article on the controversy over the FBI&#8217;s requests to Apple for assistance in unlocking an iPhone used by one of the San Bernardino terrorists: Unlocking Terrorist&#8217;s iPhone Won&#8217;t Risk Your Security, Discovery News, 24 February 2016. &#8220;Backdoors are complicated and impossible technical challenges and would risk everyone’s privacy,&#8221; Evans said. &#8220;But [...]]]></description>
				<content:encoded><![CDATA[<p>I&#8217;m quoted in this article on the controversy over the FBI&#8217;s requests to Apple for assistance in unlocking an iPhone used by one of the San Bernardino terrorists: <a href="http://news.discovery.com/tech/gear-and-gadgets/unlocking-terrorists-iphone-wont-risk-your-security-160224.htm"><em>Unlocking Terrorist&#8217;s iPhone Won&#8217;t Risk Your Security</em></a>, Discovery News, 24 February 2016.</p>
<p><center><br />
<img src="//static.ddmcdn.com/gif/unlocking-terrorists-iphone-doesnt-risk-apple-security-670.jpg" width=600><br />
</center></p>
<blockquote><p>
&#8220;Backdoors are complicated and impossible technical challenges and would risk everyone’s privacy,&#8221; Evans said. &#8220;But what the FBI is asking for is different from what Apple says the FBI is asking for.&#8221;
</p></blockquote>
<p>For the most part, I think the article gets things right.  It is very misleading to conflate what the FBI has asked for here with a cryptographic backdoor that would indeed dangerously risk everyone&#8217;s privacy and security.  I covered some of the technical aspects of this in <a href="http://xplorecs.org/class12">my introductory computing course</a> last week.</p>
<p><script async class="speakerdeck-embed" data-id="7e19b5a62ca34b08a731dd654c30a8e2" data-ratio="1.77777777777778" src="//speakerdeck.com/assets/embed.js"></script></p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/apple-and-the-fbi/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
