{"id":13764,"date":"2016-03-07T20:09:06","date_gmt":"2016-03-08T01:09:06","guid":{"rendered":"http:\/\/mjtsai.com\/blog\/?p=13764"},"modified":"2024-11-08T15:30:42","modified_gmt":"2024-11-08T20:30:42","slug":"federighi-and-cryptographers-on-fbi-vs-apple","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2016\/03\/07\/federighi-and-cryptographers-on-fbi-vs-apple\/","title":{"rendered":"Federighi and Cryptographers on FBI vs. Apple"},"content":{"rendered":"<p><a href=\"https:\/\/www.washingtonpost.com\/opinions\/apple-vp-the-fbi-wants-to-roll-back-safeguards-that-keep-us-a-step-ahead-of-criminals\/2016\/03\/06\/cceb0622-e3d1-11e5-a6f3-21ccdbc5f74e_story.html\">Craig Federighi<\/a> (via <a href=\"http:\/\/www.macrumors.com\/2016\/03\/07\/apple-vp-calls-fbi-backdoor-serious-mistake\/\">Tim Hardwick<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.washingtonpost.com\/opinions\/apple-vp-the-fbi-wants-to-roll-back-safeguards-that-keep-us-a-step-ahead-of-criminals\/2016\/03\/06\/cceb0622-e3d1-11e5-a6f3-21ccdbc5f74e_story.html\"><p>Your phone is more than a personal device. In today&rsquo;s mobile, networked world, it&rsquo;s part of the security perimeter that protects your family and co-workers. Our nation&rsquo;s vital infrastructure &mdash; such as power grids and transportation hubs &mdash; becomes more vulnerable when individual devices get hacked. Criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks through access to just one person&rsquo;s smartphone.<\/p>\n<p>[&#8230;]<\/p>\n<p>That&rsquo;s why it&rsquo;s so disappointing that the FBI, Justice Department and others in law enforcement are pressing us to turn back the clock to a less-secure time and less-secure technologies. They have suggested that the safeguards of iOS 7 were good enough and that we should simply go back to the security standards of 2013. But the security of iOS 7, while cutting-edge at the time, has since been breached by hackers. What&rsquo;s worse, some of their methods have been productized and are now available for sale to attackers who are less skilled but often more malicious.<\/p><\/blockquote>\n\n<p>I don&rsquo;t understand what this second part is referring to. It doesn&rsquo;t sound like what we were talking about <a href=\"http:\/\/mjtsai.com\/blog\/2016\/02\/17\/fbi-asks-apple-for-secure-golden-key\/\">before<\/a>.<\/p>\n\n<p><a href=\"http:\/\/www.tomsguide.com\/us\/crypto-legends-apple-fbi-rsa,news-22344.html\">Paul Wagenseil<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=11228873\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"http:\/\/www.tomsguide.com\/us\/crypto-legends-apple-fbi-rsa,news-22344.html\"><p>&ldquo;I don&rsquo;t think this case is about backdoors,&rdquo; said Adi Shamir, who with his MIT colleagues Leonard Adleman and Ron Rivest developed the RSA encryption algorithm in 1977. &ldquo;The FBI is asking Apple to do something very specific. It&rsquo;s got nothing to do with placing backdoors in millions of phones around the world.&rdquo;<\/p><p>Martin Hellman, who developed the Diffie-Hellman encryption-key exchange with Whitfield Diffie at Stanford in 1976, disagreed, as did Rivest and Diffie.<\/p><p>[&#8230;]<\/p><p>&ldquo;[Apple] put themselves in a position where they could state they could no longer help,&rdquo; [Shamir] added. &ldquo;But they failed because they didn&rsquo;t close this particular loophole in which Apple can help the FBI. Apple should close this loophole, and then they can really make the argument.&rdquo;<\/p><\/blockquote>\n\n<p><a href=\"http:\/\/mjtsai.com\/blog\/2016\/02\/25\/apple-working-on-removing-ios-backdoor\/\">Indeed<\/a>, the backdoor is already there in that current phones will accept software updates signed by Apple, without wiping the user data. So, in theory, the FBI could simply compel Apple to hand over its signing key and then build itself the tool that it wants. The line of argument about government conscripting Apple engineers to do custom software development is a red herring.<\/p>\n\n<p>Likewise, it makes sense to worry about creating a special OS build&mdash;because what if it got out? But we face the same situation today if Apple&rsquo;s <em>key<\/em> somehow got out. No one seems to be talking about that happening, even though the difference is just a matter of some engineering.<\/p>\n\n<p>This will all get a lot more interesting when Apple makes a phone that&rsquo;s secure from Apple itself.<\/p>\n\n<p><a href=\"https:\/\/medium.com\/@blakeross\/mr-fart-s-favorite-colors-3177a406c775\">Blake Ross<\/a>:<\/p>\n<blockquote cite=\"https:\/\/medium.com\/@blakeross\/mr-fart-s-favorite-colors-3177a406c775\">\n<p>Governments decided that allowing crew members to fully override the flying pilot using a key code would be insecure, since it would be too easy for that code to leak. Thus, there is nothing the outside pilot can do&#8202;&mdash;&#8202;whether electronically or violently&#8202;&mdash;&#8202;to open the door if the flying pilot is both conscious and malicious.<\/p>\n<p>[&#8230;]<\/p>\n<p>What&rsquo;s striking is that this incident did not prompt any change in cockpit protocol in the United States. The FAA is improving mental health checks, but at 30,000 feet, we still have a security system where the parameters are widely known to criminals; where the method of abuse is clear; where we see no way for people outside the cockpit to stop it; and we&rsquo;ve <em>still<\/em> decided the public is best served by keeping the people in the cockpit in charge of the lock.<\/p>\n<p>[&#8230;]<\/p>\n<p>Unbreakable phones are coming. We&rsquo;ll have to decide who controls the cockpit: The captain? Or the cabin?<\/p>\n<\/blockquote>\n<p>Update (2016-03-11): <a href=\"https:\/\/twitter.com\/csoghoian\/status\/708078386430812164\">Christopher Soghoian<\/a> (via <a href=\"http:\/\/daringfireball.net\/linked\/2016\/03\/10\/sewell-tone-brief\">John Gruber<\/a>):<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/csoghoian\/status\/708078386430812164\"><p>DOJ: We tried to be nice. We could just force Apple to turn over the iOS source code and code signing keys.<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Craig Federighi (via Tim Hardwick): Your phone is more than a personal device. In today&rsquo;s mobile, networked world, it&rsquo;s part of the security perimeter that protects your family and co-workers. Our nation&rsquo;s vital infrastructure &mdash; such as power grids and transportation hubs &mdash; becomes more vulnerable when individual devices get hacked. Criminals and terrorists who [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-11-08T20:30:44Z","apple_news_api_id":"33054cb9-f40e-411f-90c1-7e221edd1085","apple_news_api_modified_at":"2024-11-08T20:30:44Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AMwVMufQOQR-QwX4iHt0QhQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[629,1347,31,1137,2686,209,48],"class_list":["post-13764","post","type-post","status-publish","format-standard","hentry","category-technology","tag-craig-federighi","tag-federal-bureau-of-investigation-fbi","tag-ios","tag-ios-9","tag-law-enforcement","tag-legal","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/13764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=13764"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/13764\/revisions"}],"predecessor-version":[{"id":13829,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/13764\/revisions\/13829"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=13764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=13764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=13764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}