Author’s note: Despite appearing under my byline, this post actually represents the work of a larger group. The “Keys Under Doormats: Mandating Insecurity” group includes Harold Abelson, Ross Anderson, Steven M.
Latest in Apple
In the news round-up, Alan Cohn and I dive deep on the Government Oversight Committee's report on the OPM Hack, the ongoing fight between Apple and the EU, and the latest PlayPen decision in United States v. Torres.
A researcher has now demonstrated it is possible to unlock an iPhone using a technique the FBI claimed would not work in the San Bernardino controversy earlier this year, further strengthening the case against legislative mandates on encryption.
Continuing the conversation on Apple's Cloud Key Vault and its significance to the broader question of secure lawful access.
We should dispel arguments that the kinds of backups Apple detailed in a recent Blackhat talk are equivalent to law enforcement exceptional access schemes.
Just over a week ago, at the BlackHat hacker convention in Las Vegas, Ivan Krstić, Head of Security Engineering and Architecture at Apple gave a talk entitled “Behind the scenes of iOS Security,” the slides of which are available here.
Why Riley v California endorses warrantless iPhone searches.
No holds are barred as a freewheeling panel of cryptographers and security pros duke it out with Stewart Baker and the Justice Department over going dark, exceptional access, and the Apple-FBI conflict.
The FBI bought a vulnerability to an Apple iPhone, but they didn't buy the technical details. That means they can't disclose them to Apple because they don't have them. And it means I will be eating well ...
The FBI is going dark, but the cause is not encryption; it is the Bureau's approach to investigations involving encryption and other types of anonymizing tools.