blog




  • Essay / Legal dispute between the FBI and Apple based on cryptography

    Why CryptoSay no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essay Cryptography is the art of writing or solving codes. These codes are used to transmit messages to ensure secrecy and security. It has been used for centuries mainly for militaristic purposes. Kings sent spies into enemy territory who used discreet code words to speak securely with their allies. Washington and its founding fathers had their own spy network that used (mostly) crypts written by Ben Franklin to communicate securely while the British watched. Today, our militaries use numbers and encryption to exchange sensitive information securely over the Internet and in person. Cryptography was an important aspect of World War II that ultimately helped decide the war. Messages were sent over telegraph wires using complex codes and keys from both sides and it was a constant battle of "who knows what?" Today, the same battle continues, but it is fought primarily via the Internet. Today, rather than using Morse code and large coding machines that can decrypt messages, we instead use the Internet and complex programs and algorithms to protect our vital information. Any ordinary person can be hacked almost anywhere in the world and sometimes finding a hacker or preventing a security breach is easier said than done. Likewise, it's not always easy to hack someone's network. Sometimes countries and government agencies attempt to spy on dangerous criminal organizations or even each other by trying to break their target's encryptions. The two “worlds” presented in “Cryptonomicon” are those of World War II and today. Warfare was much different back then, with less prepared and disciplined soldiers, often fresh out of school or even just off the street to enlist. Officers often abused opium and slept with prostitutes while on the move. This is embodied by the character Frick with whom Shaftoe had a conflict aboard his ship. Nowadays, actions like that would most likely be reciprocated with a marshal court or other form of military discipline. Soldiers at the time also often used racist language toward Chinese people. They regularly called shoeshine boys, bag boys, Chinese soldiers or even ordinary Chinese "Coolies" and their fighting style "Chop-Suey". Nowadays, soldiers would be a little more cautious with their conditions due to the codes of conduct and discipline expected of you as well as the fact that if you were recorded saying a racist slur, the world would likely know about it the next day thanks to the Internet. .Apple versus the US GovernmentA major legal conflict recently followed by the media is the conflict between Apple and the FBI. A terrorist who planned and carried out a mass shooting used an Apple iPhone to plan and make calls in the months before the attack, but had stopped saving his information to the cloud. Because of this, the FBI must hack the phone to see if it contains vital information regarding terrorist organizations or upcoming attacks. The problem is that the FBI is currently unable to hack the phone without risking the permanent loss of all information on the phone. For thisreason, the FBI asks Apple to create a "key" that would be used to allow the FBI to hack the phone. Apple, however, refuses to do this because they believe it could then be used to hack all Apple devices. Apple iPhones are encrypted with 256-bit encryption which assures any user that their device is safe from hackers. However, if this key were to be created, Apple believes that it would pose a huge risk to this security system and put all of its users at risk. risk. Craig Federighi said in a statement: “In the last 18 months alone, hackers have repeatedly breached the defenses of retail chains, banks and even social networks. the federal government, taking over the credit card information, social security numbers and fingerprints of millions of people. " In addition to personal data, Federighi also raised the possibility that terrorist organizations are capable of hacking personal devices. "infrastructure — ?? such as power grids and transportation hubs — ?? becomes more vulnerable when individual devices are hacked, criminals and terrorists who wish to infiltrate systems and disrupt sensitive networks can launch their attacks by accessing a single person's smartphone. Federighi said encryption represents "the best data security available to consumers." Which makes it "so disappointing" that the FBI opposes its technology." On the other hand, the FBI wants Apple to comply and don't think this would be as catastrophic for security as Apple claims In the interest of national security, Apple should help the FBI by giving them a "key" that could be used to hack the San Bernadino shooter's iPhone. Apple claims that this would be a major security breach and violation of the privacy of millions of people. The FBI claims that this data key would be kept secure and that they only want to use it to access this. phone They claim this would not put millions of iPhone users at risk of cyberattacks The FBI says rights will not be compromised if Apple complies with the FBI's request and has given a number of reasons why. why Apple should comply with their request and why Americans are not at as much risk as Apple claims. . First, the main reason the FBI believes Apple should help them unlock the phone with this "key" is because the key itself would only identify itself with this iPhone. This means that the key could not unlock other iPhone models, only one and possibly other iPhone 5s. Second, the FBI is completely happy with the fact that the software is created exclusively in an Apple facility and that the phone is also unlocked. The phone itself should never be placed in government custody. Third, even if the FBI were to obtain the software and want to use it, they would need a search warrant to do so. Finally, the FBI gave Apple the option to use an alternative means to hack the phone and offered to pay whatever it takes to do so. In other words, he doesn't care about the software, he just accesses Farook's texts, contacts, emails and photos. Personally, I try to remain neutral in major media conflicts, but if I were asked if I would support the FBI or Apple, I would say I would lean more towards Apple. The reason I chose to side with Apple is that, while I see the urgency of the FBI's need for access to this phone, I believe that creating the "key" to the phone..