All the experts agree on one thing, however. The FBI has most likely found photos of the guy’s cats.
Put simply, the FBI wants Apple to write some code that disables the delay feature. That way they can stream passcode guesses to the device at (literally) the speed of electricity. This will clearly be much faster. But is it a good idea?
The agency claims they have found an unnamed third party from the private sector that can crack iOS 9. My offhand reaction: BS.
Luckily for my sanity and my marriage, I found Jeff Sengstack’s “Learning Adobe Audition CC” DVD. After spending less than an hour with it my Audition productivity improved to the point that I can actually get useful work done.
“For me, the middle ground” is to do “what the law requires,” Ms. Lynch responded, which drew a smattering of laughter and hisses from the audience.
The FBI has been dishonest throughout this process. They have blamed Apple for their own failings. Is there any part of the U.S. Justice Department that has not been tainted by Eric Holder’s mendacity?
… the government is using Apple to try to set a legal precedent. If correct, this represents yet another waste of taxpayer money to harass one of the country’s most successful companies.
But earlier it was alleged that the FBI had recovered iCloud data. In that statement the FBI said the backups had ended two weeks before the attack. Which triggers another question. How did the FBI recover the earlier data if they did not have the old iCloud password?
Apple has been accused of grandstanding by refusing to decrypt this phone. If my guesses are correct, the media has it exactly backwards. It’s the FBI that’s grandstanding.
In other words, whoever changed the password had to know the old password. Another explanation is that the person in question was in possession of the phone that might be used for password recovery. There is something very rotten here. This is not the end of this story.