For my third blog post, I have chosen to write about an article discussing the United States governments ability to hack into the iphone. The iphone in question has been highly publicized after the U.S. government asked and then attempted to sue for the rights of a master key to apple products. The phone in question was owned Syed Fizwan Farook, one of the gunman in the San Bernadino attack last year. In the article, a range of topics including Apple security, F.B.I. hacking, and possible hacking techniques that were used.
Three major points that this article pointed out were the F.B.I.’s breakthrough in hacking the phone, how the government might have gone about doing it and Apple’s security division. The critical part of this article is that the F.B.I. was finally able to bypass the iphone’s security and access the data. While the F.B.I did not release information saying how they did it but it is known that they consulted with a third party in order to do it. This is so important because we now know that the government can bypass some the current security and break into iphones. The article then speculates how the agency might have gone about doing this. The article speculates that the F.B.I. would have used a NAND mirror chip in order to duplicated the memory of the iphone chip. Once it was mirrored, they then could guess a many password as they wanted. If they got locked out they they could simply restart and try again. The third topic discussed that I found important was Apple’s security division. Apple’s security division has seen a lot of turnover recently and some question how quickly they will be able to discover and fix the hole in the system. Since Apple has placed so much importance on the security of their products, many believe that if a solution is not provided relatively quickly it would hurt the brands reputation.
While reading this article I had a few ideas that I felt were overlooked. First and most importantly I was concerned with the legality of the situation. The government spent months trying to hack and break into Apple’s iphone firewall, and while they did it to break into the one iphone the hack will work across all phones with the same software. The next part I believe was overlooked was Apple products as a whole. Since everything Apple is connected through the cloud, is all Apple data for an account now vulnerable or is it limited solely to the iphone. The third part I think that was overlooked were the long term repercussions for Apple. Does Apple have a new giant issue because the F.B.I was able to hack one phone after months of trying to, or do they merely have to figure out what the F.B.I. did to get in and fix that?