All Apple news

New legislation obliges Apple to plant bugs to spy on users

In California, publicly exhibited a bill requiring smartphone manufacturers to sell only those devices that lend themselves to remote unlock or decrypt. The bill requires that any cell phone manufactured after January 1, 2016 and sold or leased in leasing, suggested the possibility of extracting information on demand to the police.

The bill can be seen as another step of the legislators toward the interests of law enforcement agencies — in the case of the adoption of such initiatives, they will have access to smartphones and users will be able to read the encrypted data.

In iOS 8, Apple has made changes in the encryption, allowing access to user information only gets the mobile device owner. The company has previously kept the encryption keys that allowed them to unlock the gadgets at the request of law enforcement, but in iOS 8 it is not.

The new law will oblige Apple to have a functionality to decrypt iPhone and iPad. The requirement of such “bugs” stirs controversy for a long period of U.S. government and Silicon valley on the topic of encryption: lawmakers require manufacturers to provide access to encrypted information in the interests of national security.

In turn, technology companies pursue the interests of users. Apple is adamant in its position — it equates backdoors in smartphones to the Pandora’s box, once you open it, then close already does not work. Breaches in security will not be able to remain long unnoticed and will be exploited by cybercriminals.

A few days ago a similar bill was put up for discussion in new York. The adoption of this law would mean that when there is a court order, law enforcement agencies and intelligence services will be able to access photos, messages and other personal data stored on the iPhone and iPad.

READ  The first wave of reviews iPhone 8 and 8 Plus

For violation of this requirement is expected to establish an administrative fine in the amount of $2500 for each sold device with full encryption.

Leave a Reply

Your email address will not be published. Required fields are marked *