apple v fbi
wow. there's no good answer here. on one hand i'd kinda like to have the information on that phone. on the other hand, i don't want to make it any easier for people to get the information on my phone. the fbi is technically correct when they say they're not asking for a master key. on the other hand, apple is absolutely correct in saying that once this technique is used once, all sorts of government actors could compel them to use it. so for all practical purposes, it IS a master key. from a security point of view, there is no difference between a good guy with a legitimate tool and a bad guy with a nefarious tool. these two scenarios are exactly the same. so what do we do? i think it might come down to a legal technicality. ie if apple has a master key, the government can certainly compel them to use it. but this master key doesn't exist. can the government compel apple to create one? the government can certainly bribe apple to create one. if the government can compel apple to do this thing, what else can it compel people and companies to do? what are the limits? can the government compel me to jump on a grenade? i'm thinking nope. and it can't compel me to create a tool that could be used by bad guys. nor apple neither.