Apple vs IBM Expert Opinions
Opening note: throughout this series I have refrained from using the names of the terrorists. This has been (and will continue to be) my policy on all my blogs. Terrorists will not be named. This may slightly reduce the incentives for terrorist attacks. No, I am not delusional. I realize the impact of my move will be practically nonexistent.
This is the fourth update to the original article. Click here to read the whole thing (including links to all updates).
After writing about this case most of the weekend I decided to get some professional help. Not that kind, calm down. I know a couple of folks who are familiar with the inner workings of iOS and related issues. I asked them for their opinions. Out of the box, one agreed that it was unlikely that there was any useful information on the iPhone. Also (an interesting point) if Apple implemented the time delay between login attempts in the most secure way possible they built it into the hardware. Meaning there may be no software hack available at all.
Which leads back to the question of why the FBI is so hot to pursue this case. These folks agreed that the government is using Apple to try to set a legal precedent. If correct, this represents yet another waste of taxpayer money to harass one of the country’s most successful companies. I thought hiring former EPA chief Lisa Jackson was supposed to give Apple some cover against stuff like this.