top | item 11295358

(no title)

throwaway160303 | 10 years ago

The constitution sets forth very real protections for the accused, for defendants. I see very little that could be stretched to apply to a third party that chooses not to comply with a lawfully obtained order because they disagree with it.

Frankly I doubt the Founding Fathers would ever have conceived of a third party daring to issue a bare-faced refusal to comply with a lawfully obtained order. They would surely have expected that this would immediately turn that individual (or corporate person, as the case may well be in this age) into another defendant, for a new crime.

I really don't know what Apple is thinking. They should have set a line in the sand when they legitimately could do nothing to gain access to the data, as they're so close to having completed in recent hardware/OS revs. That would force congress to pass legislation outlawing secure crypto, or give up. That would be an interesting thing to see, no doubt.

But this? They're playing a very dangerous game for very low stakes, and the only obvious rationale for doing it is the one that the government can and probably will argue is at work, which is as a PR move.

And a judge's signature outweighs your stock price any damn day of the week. Stupid/reckless is my first impression, or maybe it is just brilliant PR. But as a general rule, don't fight city hall for bragging rights. The real fight will happen once you say "tough luck, nothing anybody can do, you want to break in, go talk to to the quantum cryptographers".

discuss

order

karlshea|10 years ago

Apple's response addresses almost every point you bring up, so I'm guessing you didn't read it. Which is probably why you're posting with a throwaway account.

matthewmcg|10 years ago

The whole purpose of this litigation is to determine whether the order was "lawfully obtained."

As for drawing a line in the sand, it appears that the limit that they will not cross in cooperating with law enforcement is in actively creating new features that make the phone easier to hack.