{"id":34596,"date":"2016-03-17T12:32:29","date_gmt":"2016-03-17T18:32:29","guid":{"rendered":"http:\/\/www.counterchange.net\/blog\/?p=34596"},"modified":"2016-03-17T12:32:29","modified_gmt":"2016-03-17T18:32:29","slug":"pandoras-iphone","status":"publish","type":"post","link":"https:\/\/www.counterchange.net\/blog\/2016\/03\/pandoras-iphone\/","title":{"rendered":"Pandora&#8217;s iPhone"},"content":{"rendered":"<p><a href=\"https:\/\/www.counterchange.net\/blog\/wp-content\/uploads\/2016\/02\/Pandoras_iPhone_200x338.jpg\" rel=\"attachment wp-att-34599\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-34599 alignright\" src=\"https:\/\/www.counterchange.net\/blog\/wp-content\/uploads\/2016\/02\/Pandoras_iPhone_200x338.jpg\" alt=\"Pandora's iPhone\" width=\"200\" height=\"338\" srcset=\"https:\/\/www.counterchange.net\/blog\/wp-content\/uploads\/2016\/02\/Pandoras_iPhone_200x338.jpg 200w, https:\/\/www.counterchange.net\/blog\/wp-content\/uploads\/2016\/02\/Pandoras_iPhone_200x338-178x300.jpg 178w\" sizes=\"(max-width: 200px) 85vw, 200px\" \/><\/a>The U.S. government&#8217;s case against Apple to force Apple to change the iPhone&#8217;s operating system software, iOS to allow access to a terrorist&#8217;s information is an issue that impacts all of us.<\/p>\n<p>Even though the FBI has insisted that this is just about this case is just about a single phone, the end result would be opening <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pandora's_box\" target=\"_blank\">Pandora&#8217;s Box<\/a> or iPhone in this case.\u00a0 Once the solution has been created, everyone will want to use it; the British, the French, the Russians, your wife&#8217;s divorce lawyer&#8230;.\u00a0 And the <a href=\"http:\/\/www.webcitation.org\/query?url=http%3A%2F%2Ftechcrunch.com%2F2016%2F02%2F23%2Fwith-12-other-active-cases-the-fbi-cant-claim-that-its-just-about-one-iphone%2F&amp;date=2016-02-26\" target=\"_blank\">FBI has other cases<\/a> where this might be used to compel Apple to change their product.\u00a0 And once a method has be created, it will only be a matter of time (weeks or days) before hackers have created their own version to steal your identity and bank balance.<\/p>\n<p>As the government demands access to our secrets, they demand their secrets are protected by the highest level of encryption in the name of &#8220;National Security,&#8221; some which turnout to be questionable and illegal, many exposed by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\">Edward Snowden<\/a> in 2013.\u00a0 On the opposite side, the government does have valid reasons for protecting certain information and so do citizens.<\/p>\n<p>We all should be creating or buying the best encryption technology available to protect our lives, liberties, and bank accounts.\u00a0 Our government should not be trying to weaken that protection.\u00a0 Maybe it is time to create an <span style=\"text-decoration: underline\">explicit<\/span> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Right_to_privacy\" target=\"_blank\">Right to Privacy<\/a> in our constitution instead of the current maze of laws and <span style=\"text-decoration: underline\">implied<\/span> protections.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. government&#8217;s case against Apple to force Apple to change the iPhone&#8217;s operating system software, iOS to allow access to a terrorist&#8217;s information is an issue that impacts all of us. Even though the FBI has insisted that this is just about this case is just about a single phone, the end result would &hellip; <a href=\"https:\/\/www.counterchange.net\/blog\/2016\/03\/pandoras-iphone\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Pandora&#8217;s iPhone&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3,6],"tags":[22],"class_list":["post-34596","post","type-post","status-publish","format-standard","hentry","category-government","category-privacy","category-technology","tag-encryption"],"_links":{"self":[{"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/posts\/34596"}],"collection":[{"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/comments?post=34596"}],"version-history":[{"count":4,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/posts\/34596\/revisions"}],"predecessor-version":[{"id":34604,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/posts\/34596\/revisions\/34604"}],"wp:attachment":[{"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/media?parent=34596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/categories?post=34596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.counterchange.net\/blog\/wp-json\/wp\/v2\/tags?post=34596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}