As the iPhone unlocking controversy roars on, a number of Apple engineers have said they may decide not to cooperate with law enforcement.
Apple employees who might be called on to help the FBI are already considering their actions should Apple lose the case. This is according to interviews conducted by the New York Times with half a dozen people involved in the development of mobile products and security at Apple.
Per the interviews, some said they they may balk at the work, while others may even quit their premium jobs rather than undermine the security of the software they have already created, according to more than a half-dozen current and former Apple employees.
A new variant of iOS trojan has been found in the wild.
The trojan, named “AceDeceiver”, has been found to infect non-jailbroken iOS devices, was discovered by Palo Alto Networks and is currently affecting iOS users in China.
The malware exploits a flaw in Apple’s FairPlay digital rights management system. It apparently uses a technique called “FairPlay Man-in-the-Middle,” which has been used to spread pirated iOS apps in the past by using fake iTunes software and spoofed authorization codes to get the apps on iOS devices. The same technique is now being used to spread the AceDeceiver malware.
The Justice Department is now stating that it could potentially demand Apple hand over iOS source code and a signing key in the San Bernadino iPhone case.
A recent court filing states that the Justice Department made the proposal as a footnote in a recent rebuttal of Apple’s arguments in the case. In the brief, government laywers said they have so far pursued their current strategy — asking Apple to build a passcode limit break for the FBI — because they thought handing over code would be “less palatable” to the company.
This could lead to something really nifty for your Mac notebook.
Last summer, Intel announced 3D Xpoint, a new class of memory labeled as a “major breakthrough in memory process technology.” 3D Xpoint is 1,000 times faster and more durable than NAND Flash storage, as well as 10 times denser than the DRAM chips used in computers.
The transistor-free cross point architecture essentially creates a three-dimensional checkerboard withers memory cells sit at the intersection of word lines and bit lines, allowing the cells to be addressed individually. As a result, data can be written and read in small sizes, leading to faster and more efficient read/write processes.
Intel had stated that the first 3D Xpoint product would be solid in early 2016 and marketed under the product name of its “Octane solid state drives”. Interestingly enough, 3D Xpoint is compatible with NVM Express (NVMe), an SSD protocol that offers improved latency and performance over the older AHCI protocol.
Give it enough time and eventually Apple catches up to the rumors.
Apple has announced a special event for members of the press at 10:00 a.m. on Monday, March 21st, at the company’s headquarters in Cupertino.
The event will be streamed via apple.com and can be accessed from any Mac running OS X 10.8.5 or later with Safari 6.0.5 or later, any PC running Windows 10 with Microsoft’s Edge browser, any iOS device running iOS 7 or later or any Apple TV from the second-gen on.
For California smartphone users, this hits pretty close to home.
Assembly Bill 1681, a California State Assembly bill, would ban default encryption on all smartphones. The bill, introduced in January by Assemblymember Jim Cooper, would require any smartphone sold in California “to be capable of being decrypted and unlocked by its manufacturer or its operating system provider.” This could be even more drastic than what’s going on with Apple’s legal showdown in the San Bernadino iPhone unlocking case.
Both Apple and Google currently encrypt smartphones running their iOS and Android operating systems by default. A.B. 1681 would undo this default, penalizing manufacturers and providers of operating systems $2,500 per device that cannot be decrypted at the time of sale.
The data onboard the iPhone 5c at the heart of the decryption/unlocking scandal could be accessible via a hardware technique.
This hardware technique, apparently, isn’t for the faint of heart.
In recent days, the American Civil Liberties Union’s technology fellow and former NSA contractor Edward Snowden have suggested a method that would let investigators repeatedly guess the iPhone’s password.
Federal investigators fear San Bernardino shooter Syed Rizwan Farook may have configured his work phone to use an Apple security feature that erases a key for decrypting data after 10 incorrect guesses of the phone’s password.
The forensic technique to get at the data, known as “chip off,” involves removing a NAND flash memory chip and copying its data. If successful, this would yield a decryption key that can be restored if it is erased after incorrect guesses.
A recently published patent application suggests that Apple is working to turn Apple Watch into a full-fledged medical device, one that can monitor a user’s vital signs and automatically send out an alert should they need urgent care.
The application, entitled “Care event detection and alerts” provides for a hardware system capable of monitoring its surrounding environment for so-called “care events,” described as any event that necessitates assistance from medical personnel, police, fire rescue or other emergency technicians. For example, the device could be programmed to monitor a user’s heart for an arrhythmia and, upon detection, send out an alert to family or emergency responders.