Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

The decision in question refers to the encryption protocol used on Apple’s iPhones, and one device in particular: the iPhone used by the shooter in the San Bernardino, California terrorist attacks of December 2015. The FBI has issued a court order to Apple, asking them to provide and/or build a backdoor for iOS, in an attempt to garner information from the device used in those attacks. This request, and Apple’s vehement refusal, could set a precedent into motion that’s much larger than the case itself.

On February 16th 2016, Apple’s CEO Tim Cook issued a statement calling for a public discussion of the issue at hand, and a declaration that Apple will not comply with this demand due to the larger implications of the decision. Though Apple has conceded data that is in their possession in the past, they will not build something that they don’t currently have, and would potentially compromise the security of their customers. As stated in the customer letter:

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The letter continues to explain how important data security is for consumers of Apple products and such, claiming that creating a product that’s intentionally trying to undermine their own products would be both counter-productive and risky to all users of the iOS operating system. Even if this backdoor is asked for with only good intentions, there’s always the risk that the exploit could fall into the wrong hands.

More importantly, however, this denial by Apple could lead to legislation being passed which makes such a demand legal. If this happens, it would give the government extraordinary power over the users of smartphones. It would allow the government to request tech developers to provide backdoors on demand, which could, in turn, open up countless possibilities for espionage. However, what if these backdoors fell into the hands of hackers and others who might want a peek at any user’s sensitive information? That possibility is truly frightening.

What are your thoughts on smartphone encryption? Is Apple right to deny the FBI this request? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Disaster Recovery Upgrade Data Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Gadgets Training Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App Managed Services Voice over Internet Protocol WiFi BYOD Applications Information Technology Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing How To BDR HIPAA Computing Virtual Private Network Risk Management Health Help Desk Analytics Computers Office Tips Augmented Reality Retail Storage Website Password Bring Your Own Device 2FA Managed IT Services Healthcare Operating System Big Data Router Free Resource Project Management Display Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Customer Service Monitoring Solutions Document Management Telephone Scam Windows 11 Data loss Firewall Cooperation Excel Going Green Patch Management Remote Workers Save Money The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Social Physical Security Cryptocurrency Data Privacy User Tip Modem Images 101 Processor Computer Repair Mobile Security Customer Relationship Management Multi-Factor Authentication Virtual Desktop Mobility Data storage LiFi Hacking Smart Technology Outlook Presentation Machine Learning Money Saving Time Employees Humor Wireless Technology Integration Managed IT Service Maintenance Sports Downloads Antivirus Mouse Holidays Word Licensing Data Storage Entertainment Administration Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Safety Telephone System Cost Management Settings Wireless Printing iPhone Content Filtering IT Management YouTube Meetings VPN Vulnerabilities Supply Chain Management IBM Username Point of Sale Term Google Apps 5G Black Friday FinTech Google Docs IT Assessment Unified Communications Database IT Maintenance Experience Running Cable Tech Support IT Technicians Flexibility Bitcoin Network Management Value Business Intelligence Google Wallet Proxy Server Cookies Shortcuts Monitors Cyber Monday Organization Digital Security Cameras Smart Devices Competition Tactics Ransmoware Hotspot Laptop Websites Mirgation Remote Working Windows 8 Memory Vendors Drones Data Breach Nanotechnology Google Play Be Proactive Videos SharePoint Electronic Health Records Addiction Workforce Electronic Medical Records Language User Halloween Chatbots Management Wasting Time Threats Lenovo Trend Micro Screen Reader Security Cameras Workplace Strategies Writing Distributed Denial of Service Software as a Service Service Level Agreement Meta Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity IP Address Hacks Server Management Managing Costs Amazon Superfish Bookmark eCommerce Identity Theft Smart Tech SSID Fun Surveillance Deep Learning Download Virtual Assistant Outsource IT Twitter Alerts Recovery Error Media Virtual Machine Environment Browsers Hard Drives Education Connectivity Medical IT Social Engineering Break Fix Reviews Development Domains Upload Transportation Small Businesses Remote Computing Multi-Factor Security Mobile Computing Social Network Hypervisor Displays Shopping Optimization Refrigeration Tablet IoT PowerPoint Search Dark Web Public Speaking Best Practice Trends Employer/Employee Relationships Outsourcing Alert Buisness File Sharing Regulations Navigation Dark Data Google Calendar PCI DSS Lithium-ion battery Managed IT Customer Resource management Gig Economy Legal Data Analysis IT solutions Star Wars Workplace Entrepreneur How To Microsoft Excel Internet Service Provider Business Growth Gamification Teamwork Hiring/Firing Notifications Staff Travel Social Networking Evernote Paperless Legislation Regulations Compliance Techology Fileless Malware Memes Undo Google Maps Co-managed IT Cortana Net Neutrality Alt Codes Content SQL Server Technology Care Wearable Technology History Downtime Unified Threat Management Motherboard Business Communications Comparison Financial Data Health IT Smartwatch Unified Threat Management Directions IT Hosted Solution Assessment Scams Permissions Procurement Typing Azure Hybrid Work Cyber security Application Tech Human Resources Network Congestion Specifications Telework CES Google Drive User Error Microchip Communitications Internet Exlporer Cables Knowledge Fraud

Blog Archive