Hacker News new | past | comments | ask | show | jobs | submit login

For me it's not really about my personal security because, you're right, there's nothing interesting on my phone. My issue is with one entity having access to ALL of our phones. Have you read 1984? Because that's what that sounds like. It's too much power for the government to have.



I think I missed the part where anybody asked Apple to build a backdoor into every phone that could be accessed without appropriate control from the authorities and without passing through Apple each time. Of course I'm not saying that your data should be uploaded daily to a government's server for anybody with a badge and free time to spare to look through.


Yes, you did miss it. The FBI/etc are very clearly and deliberately looking to set a precedent for use in any and all future instances. Just because you don't seem to value personal privacy and security doesn't mean the rest of us are willing to throw it away for no good reason.

http://www.nasdaq.com/article/apple-standoff-escalates-local...

http://www.leadertelegram.com/News/Front-Page/2016/02/20/Off...

http://www.argusleader.com/story/news/2016/02/18/sf-police-c...


The FBI here only represents the 'legal' government and not the world of secret courts and the NSA.

The NSA did infact try to build backdoors into important hardware and software standards. They did push companies into using worse crypto. The do massiv port scanning and build themself botnets from where thet attack other nation states. And thats just a tiny fraction of what they do.

So yes, I absolutly do need computer hardware and software that even the manufacturer cant break. Low level security for boot and authentification is only the first in many, many steps that we have to take all the way up to imroving usability in end user applications to make it hard to do the wrong thing.

The FBI are not the o ly player, all governments want such control, all governments have things like the NSA. Even private actors are getting better and better.

We do need better security to protect the integrety of all our data, this includes all our communication and even, if possible metadata that we produce.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: