Can the Apple code be misused?
This post will respond to the tweet by Orin Kerr:The government is right that the software must be signed by Apple and made to only work on Farook's phone, but the situation is more complicated than that.Tech help: What are the best responses to DOJ claims in new Apple/FBI brief re whether code could be misused? Thks. pic.twitter.com/V08EcV9Rev— Orin Kerr (@OrinKerr) March 11, 2016
The basic flaw in this picture is jailbreaks. This is a process of finding some hack that gets around Apple's "signing" security layer. Jailbreaks are popular in the user community, especially China, when people want to run software not approved by Apple. When the government says "intact security", it means "non-jailbroken".
Each new version of iOS requires the discovery of some new hack to enable jailbreaking. Hacking teams compete to see who can ship a new jailbreak to users, and other companies sell jailbreaks to intelligence agencies. Once jailbroken, the signing is bypassed, as is the second technique of locking the software specifically to Farook's phone.
Details are more complicated than this. Each jailbreak is different, and many won't allow this secret Apple software to be run. Some will. The point Continue reading

Plexxi has created a product and lined up resellers.



Cisco aims to make the data center more flexible and application-centric with new technologies for hybrid cloud services. Key innovations focus on networking hardware, hyperconverged infrastructure, and hybrid cloud orchestration.
