Anonymous ID: 498455 May 18, 2020, 11:55 a.m. No.9227351   🗄️.is 🔗kun

>>9225531 /pb Notables

So…one would assume - there's 'that' word again - that the obviously superior in intellect, morals and ethics people over at Apple could figure out to do it in such a way as to satisfy everyone…but just in case:

 

apple knows how to access their phones. This bs about 'only the user' ignores their TOS claims that the owner of the phone is only 'the user' of the handset but all the software and everything on the phone belongs to apple.

 

They maintain nobody but them should be able to access their phones.

 

apple is a worldwide sensation. apple and their govt employees killed off the Blackberry 'cause they were providing totally encrypted phones; leaving only apple to take over customers wanting secrecy…and there were enough of them to make apple billions.

 

So…OK, I understand that apple wants to keep it's hard-earned monopoly as the conduit for anyone wanting to keep their operations secret; it's worth far too much money to damage their PR-propaganda of a 'secure/safe' apple universe.

 

I also understand why knowing just WTAF an al-qaeda slimeball or a child-rapist/trafficker was doing and who was helping him do it, is far more important than anything apple wants.

 

One shouldn't just criticize so I'll offer a solution: Let apple keep it's position as the only entity - other than those using apple products - with the ability to access the phones. They will of course have to admit publicly that they can do so but they can make it appear so 'incredibly complicated' to do so that 'they' would only ever be able to do so after being legally required.

 

Allow apple to set the conditions under which, after receiving a legally authorized Court Order, they will allow an anonymous tech at apple to take physical possession of the phone/tablet/computer/whatever, allow that tech to unlock the 'whatever' in secret and then hand the phone to whomever subpoenaed the 'whatever.'

 

apple never discloses to anyone how to get into their 'whatevers' and the information about the terrorist/child-rapist/human-trafficker, his boss, his clients, their clients, their bosses etc., is available to the intelligence community, the best outcome of course.

 

But I'm probably incorrect, it couldn't be so easy, guess that's why I'm not working for the geniuses at apple.