The FBI defines Apple as "evil geniuses", referring to the high security they offer

apple fbi

Apple's work on security It does not go unnoticed by the rest of the technology companies and those related to the cybersecurity ecosystem, user privacy and the protection of their data.

This statement goes to such an extent that the FBI, tired of investing valuable resources and a lot of time in being able to have access to brand devices whose users have committed some type of crime, they usually refer to the Cupertino-based brand as those "Evil genie".

According to Stephen Flatley, an FBI forensic expert, the process of decrypting information on an iPhone has slowed down dramatically, to the point that what a few years ago could be done in just 2 days, today it costs them around 2 months, with a cost much higher than that normally allocated in this type of practice.

In the retina we still have the case of the shooting in San Bernandino, where the American security forces invested almost a million dollars to pay Cellebrite, a company specialized in breaching the security of devices, hired to decrypt the iPhone 5C of one of the shooters, without finding, by the way, any relevant information.

The FBI has been quite harsh in the statements made against Apple, because the Cupertino boys refuse to open a "back door" where security forces can easily access if necessary. This, they say, hinder investigations, and prioritize this situation as an urgent public security situation.

Currently, to access a device of a user involved in a crime, a court order is required. However, the continued security improvements provided by Apple mean that not even the technology company itself has access to the sensitive data of its users.

Also, in an attempt to urge all of your users to protect their phones, Apple has published several pages where they inform their customers how to maintain the security and privacy of their devices.

For these "evil geniuses", privacy is a fundamental human right, so as is customary in the Cupertino offices, they take the security of their devices very seriously.


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

Be the first to comment

Leave a Comment

Your email address will not be published.

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.