• Sara Rimer

    Senior Contributing Editor

    Sara Rimer

    Sara Rimer A journalist for more than three decades, Sara Rimer worked at the Miami Herald, Washington Post and, for 26 years, the New York Times, where she was the New England bureau chief, and a national reporter covering education, aging, immigration, and other social justice issues. Her stories on the death penalty’s inequities were nominated for a Pulitzer Prize and cited in the U.S. Supreme Court’s decision outlawing the execution of people with intellectual disabilities. Her journalism honors include Columbia University’s Meyer Berger award for in-depth human interest reporting. She holds a BA degree in American Studies from the University of Michigan. Profile

    She can be reached at srimer@bu.edu.

Comments & Discussion

Boston University moderates comments to facilitate an informed, substantive, civil conversation. Abusive, profane, self-promotional, misleading, incoherent or off-topic comments will be rejected. Moderators are staffed during regular business hours (EST) and can only accept comments written in English. Statistics or facts must include a citation or a link to the citation.

There are 5 comments on Will Unlocking Apple’s iPhone Unlock a Pandora’s Box?

  1. Understand first that a locked phone will not update itself – you have to unlock it to authorize the update. This automatically excludes the terrorists’ phone from being updated through normal means.The second problem is if Apple makes a phone-cracking piece of software the next thing will be India or China demanding it as well. Just as India did with Blackberry several years ago. So whatever Apple gives the FBI will not be just for the FBI but foreign governments as well. They will almost certainly not limit it to certain phone hardware identifiers but allow it to be used with any phone. This will (obviously) leak out and be used by attackers worldwide.

  2. It’s also important to realize that, as Goldberg mentioned, there is very little information on the phone itself that is not available elsewhere. Opening this phone is pure fishing, with no indication there is any useful information on the phone.
    It is very clear that this is a gambit by the FBI to get popular support behind their efforts to legislate a “back door” – something that, to date, Congress has refused to enact.

  3. The simple fact is that any “back door” scenario is not good for the public or vendors. Paul also has a very valid point with regards to how if the FBI gets access all the other agencies world wide will want it as well.
    However I disagree with the comments made about this being a fishing expedition only. Yes you can gain a great deal of info from looking at traffic endpoints for calls etc. but that only helps so much, however if you actually want to review the content of that SMS, or WhatsApp, email, or picture you need access.

  4. The security that Apple officers is actually the reverse. They are guaranteeing that my valuable data will be irrevocably lost, if I lose and forget my password and then fail to recall it within 10 attempts. If I buy a safe, I expect that if I can no longer get into it, the manufacturer is a last resort to get my property back. The same goes for any storage that I purchase. Apple appears to be saying to its customers “Boo-hoo! To bad for you, sucker.” I will certainly be searing clear of these so called secure Apple products.

  5. Most “theft” and “scams” are based on financial or cultural ignorance (personal). Therefore it is very important to have more knowledge that today we find especially on these sites educational (.edu), including this one, we learn how to avoid or to learn how to act. I found a blog with many examples and guidance: https://www.fraudswatch.com

Post a comment.

Your email address will not be published. Required fields are marked *