Hacker News new | past | comments | ask | show | jobs | submit login

The suspects DID have backups of the phone on Apple's iCloud platform, and Apple already provided that to the FBI.

But that doesn't meet the FBI's actual needs. The FBI's ACTUAL needs are to have a case with a lot of public sympathy in which they can force a major tech company to very publicly comply with their order to add a backdoor to a phone (without calling it that) in order to influence the legal and legislative systems (and perhaps public opinion, if the FBI even cares about that).




Has the FBI (or Apple) been able to unencrypt the backups from iCloud?


Apple has provided the FBI with decrypted copies of the iCloud backups. But the phone only backed up "intermittently" so recent activity would not have been included in those backups. (Well, it COULD have been, except that the FBI told San Bernadino County to change the password, which messed that up.)


iCloud encrypts backups at rest but it's not encrypted with a key that only the user has, it's encrypted with Apple's key.


They probably have, but the whole point is they want a way to decrypt the device, to use as a precedent in future cases.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: