Apple doesn't want to unlock the terrorist's iPhone for the FBI. Is the privacy of iphone users more important than national security?

1 Answer

Answer :

What is most bothersome to me is that the FBI cannot do this on their own. I mean supposedly we possess some the most advanced technology and hackers in the world. So why don’t they just do this themselves? Either way Apple has a court order to help and it will be interesting to see how long Apple stands firm.

Related questions

Description : Why doesn't ask-public use normal bulletin board markup?

Last Answer : I would love it if Ask-public was a forum more than a Q&A.

Description : Have you ever injured yourself really bad doing something simple?

Last Answer : I was cutting up cooked chicken in order to make fresh chicken salad. Knife slipped, cut off top of my left ring finger.

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : What do you think about Apple patenting the "slide to unlock" feature of its phones?

Last Answer : answer:No they should not be able. This way whoever does something new can pattern it and no other company can produce similar items. Just think a bit. If the first cell was patterned by ... perform the process and get something different. Since Steve died apple took a fall and feel attacked .

Description : How do I fix a 1994 Dodge Dakota pickup driver side door handle that doesn't unlock door?

Last Answer : You'll have to take the door trim off and inspect the mechanism.You've probably got a failed cable or linkage.

Description : Do you think Facebook (etc.) should have some sort of privacy rule that gives others some control over content in other user's accounts?

Last Answer : You do have a little control, say if they want to tag you in a picture then you can choose to have fb send you a notice to approve it first. That won’t keep them from putting up pics of you without tags though.

Description : Unwanted and unsolicited commercial e-mails that clog up e-mailboxes of users is classified as______________________ a. Invasion of privacy b. Spam c. Virus d. Deception

Last Answer : b. Spam

Description : Why use facial recognition to unlock iPhone instead of digital code?

Last Answer : I was reluctant, but I did it with my new phone. It’s actually really nice to not have to key my passcode when I’m looking at the phone. If the phone can’t read your face it just asks for your passcode. I’m pretty sure you can cancel it if you wind up not wanting it after trying it.

Description : Should I unlock iPhone 4 before selling on Craigslist?

Last Answer : If you unlock it so it registers as unlocked on Apples iTunes server then do it. Otherwise don’t bother.

Description : Anyway to unlock an Iphone 3GS with the latest baseband?

Last Answer : answer:

Description : How can I unlock iphone without losing contacts and messages?

Last Answer : Search for tutorials to jail-breaking an iPhone on Lifehacker and other techie sites.

Description : Any ideas on how to jailbreak and unlock an iPhone 3GS after installing the new 4.0 software?

Last Answer : answer:You may not be able to yet. Have you heard whether or not someone already provided the software? If so, I would assume just download it, and jailbreak it the same way you did before it was upgraded to 4.0

Description : How do I unlock an iPhone 3GS with latest bootrom?

Last Answer : Use Blackra1n. It’s as simple as syncing you phone with itunes, killing an iTunes related processes and running it. It’ll both unlock and jailbreak your device.

Description : Im trying to unlock first generation iphone,i restored and updated it but it wont let me jailbreak and unlock it with ziphone software,any idea what to do?

Last Answer : http://www.quickpwn.com/search/label/jailbreak%20iphone%202.1

Description : What are the dimensions of the slide to unlock screen of the iPhone?

Last Answer : You might wanna look at the iPhone GUI PSD file

Description : Is 30 dollars too much for an iPhone 3.0 unlock?

Last Answer : Nope. Not for me. But it really depends on your trust in yourself. I’ve done 2 fairly easily. Total copout answer…

Description : If I unlock my iPhone can I restore it through iTunes if I choose?

Last Answer : i can’t give you any info on the unlocking part, since that’s illegal, but as far as i know restoring a hacked iphone will restore it to the “factory defaults”

Description : How do I unlock my iPhone?

Last Answer : Have you tried resetting it with iTunes?

Description : When do you think the iPhone 2.0 jailbreak and unlock come out?

Last Answer : answer:your guess is as good as ours. A lot of people can fix their first gens, they just have to set it to recovery mode and recover it.. really isn't hard if they read the half page ... take though lol, but i would prefer it unlocked only, not jailbroken too whether that is possible or not..

Description : Has your iphone/ipod touch been showing weird stuff since 2.0.01 on unlock screen?

Last Answer : Yes, but I ignore them.

Description : How do I unlock keyboard rotation on my iphone?

Last Answer : Need Answer

Description : How much does it cost to unlock an iPhone 4?

Last Answer : Unlocking a phone can be relatively cheap. There are ways to teach yourself to unlock a phone online or you can pay someone ten to fifteen dollars to unlock it for you.

Description : Just a curiosity: Do you think we, as a civilized world, are moving towards a world where, thanks to Internet, media, etc., criminality doesn't exist, but also, where privacy doesn't exist?

Last Answer : Read this book link David Brin wrote about this exact question 21 years ago. I’m not going to recap the whole book for you, because it is well worth your time to read it. Quick summary: there is no such thing as privacy.

Description : Is there any good website to learn about online safety, security and privacy?

Last Answer : Here is a website that educates users of connected technology about safety measures, security and privacy. On this website, you can find news and commentary. You can also hit upon ... decision makers to formulate reasonable policies that promote both originality and responsible use of technology.

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication d) security algorithm for emails

Last Answer : b) security algorithm for wireless networks

Description : A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. a) privacy and security b) rules and regulations c) hacking techniques d) ethics to talk to seniors

Last Answer : a) privacy and security

Description : Advantages of B2C commerce to customers are  (i)wide variety of goods can be accessed and comparative prices  can be found  (ii) shopping can be done at any time  (iii)privacy of transactions can be guaranteed  (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : a. i and ii  

Description : Why doesn't Apple come out with an OEM indestructible case for the Iphone?

Last Answer : They want you to break the phone and buy another one.

Description : What apple has a major security breach, affecting the M1 chip and iPhone 12 system?

Last Answer : iBee Parts - Professional Factory Supplier For iPhone Samsung Huawei LCD Screen & Battery Repair Parts Replacement. This may be the first public security vulnerability affecting Apple M1 chip devices. Apple has always attached ... Mate20 Mate30 Mate30 P20 P30 P40 Nova 5 6 7Xiaomi 3 4 5 6 7 8 9

Description : When installing applications in iPhone, why does some apps require Apple ID but some others don’t If we enter our Apple ID, does it potentially cause risk as the application own can know our password How to check this security concern?

Last Answer : The application will not be given your Apple ID password when you are prompted to enter it in the app store for download. Typically, if it does not ask for your password, you most likely have ... the word "open" that means that app is already downloaded onto your current device. Hope this helps!

Description : Who are you more afraid of threatening your freedom... Terrorists, or the US Government?

Last Answer : The US government by far, especially the radical elements within it who seek to oppress others based on race, gender, religion, or mere political affiliation.

Description : Did president Trump fire FBI director James Comey because he was taller than him?

Last Answer : What really happened was that trump merely played a prank on Comey. Pretending to fire him so Comey would fly coach back to DC from LA instead of his FBI airplane. But Comey insisted on boarding said airplane ... to DC in it. tump was so pissed his prank failed that he turned it into a real firing.

Description : Are there parallels between ISIS and the white nationalist terrorists in the US?

Last Answer : Obviously.

Description : Is anyone else kinda shocked it took terrorists so long to figure out car + sidewalk?

Last Answer : I'm not really shocked at how long it took terrorists to figure out this was an easy way to attack people, but I do wish they hadn't thought of it. It's impossible to prevent such ... drive down pavements and mow people down. You can't do this everywhere though and bollards everywhere are unsightly.

Description : Can we send James Alex Fields to Guantanamo prison like other terrorists?

Last Answer : No, he’s white.

Description : What are your thoughts on the aquittal of the Oregon terrorists?

Last Answer : Bad decision in court. They were guilty. I think the judge was not following the law; he was following his emotions.

Description : Why is the NRA not considered an organization that gives material aid to terrorists?

Last Answer : answer:With respect to another current question in ask-public - which I won't link to, but only because I'm lazy, not out of any disrespect or disparagement - do you believe that there are more ... are on balance good' , that primarily good people will be exercising that right. And they should.

Description : Are terrorists groups taking resources from countries who are fighting global climate change?

Last Answer : I don’t think they even know about climate change, much less what it is.

Description : Sochi Olympics. On a scale of 1 to 10, in your opinion, how likely do you feel that terrorists will strike during the Olympics?

Last Answer : answer:0.5 and I hope I am not proven wrong Most of their recent attacks have been suicide bombings correct? So, probably that.

Description : Jar Jar Abrams and his entire team of hack writers have been killed by terrorists freedom fighters. You are put in charge of producing the next Star Trek movie. Who will you hire to direct, and who will you hire to write the script?

Last Answer : Warner Herzog. Vince Gilligan

Description : So, now Protesters are treated as terrorists. (Link inside) What do you think about that?

Last Answer : answer:Oh shit, glitter? PAAAAAAAAAAAANIIIIICCCCCCCC

Description : How does one reconcile Mandela's great domestic triumphs with Mandela’s endorsement of violent terrorists and promoters of terrorism?

Last Answer : Given the plight of black South Africans under oppressive white rule you may want to look at it from a different perspective.one mans terrorist is almost always another mans freedom fighter.

Description : Why are random gunmen not treated as terrorists, with the involvement of government agencies and punishments?

Last Answer : GQ. I’d like to hear what others have to say.

Description : What happens when terrorists make use of drones?

Last Answer : They will give the US forces a taste of their own medicine unfortunately. The application for drone aircraft go far beyond though.

Description : How can Islamist terrorists and Americans make peace without killing each other?

Last Answer : Hmmm…. Islamic terrorists… Americans… Islamic terrorists… Americans… Islamic terrorists…. Americans… Uhm, war is inevitable.