Yeah it is possible he's accurately, but misleadingly, calling it a bug because it was not meant to be deployed to production (yet). I do not think that's how he wants or expects people to take it when he calls it a "bug", though.
underisk
you don't get entire functional UI elements accurately populated with appropriate data out of a "bug". at best its a feature that was being tested internally and never would have made it past that, at worst its something that went live early.
“I smelled weed” is the classic cop trick to skirt around probable cause.
The only thing that has successfully managed to thwart the FBI in their attempts to break into a phone was Apple’s hardware based encryption. To such an extent that they took legal and legislative actions to try and circumvent it. The specifics of how the encryption works is irrelevant to this argument, and you are more than welcome to consider that point conceded.
I’m not claiming iPhones are superior. I don’t care about dumb OS wars, just don’t put things on your phone expecting that they can’t be retrieved. That’s the only point I’m trying to make here.
And the keys absolutely would give them access since those keys are used to sign Apple software which runs with enough privileges to access the encryption keys stored in the “Secure Enclave”. Anything you entrust to a company’s software is only as secure as the company wants to make it, and the only company to publicly resist granting that acces is Apple (so far)
The Secure Enclave is a component on Apple system on chip (SoC) that is included on all recent iPhone, iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those with the Apple T2 Security Chip. The Secure Enclave itself follows the same principle of design as the SoC does, containing its own discrete boot ROM and AES engine. The Secure Enclave also provides the foundation for the secure generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the biometric data for Face ID and Touch ID.
https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/web
The FBI wanted access to Apple’s encryption keys which they use to sign their software. They don’t have ‘your’ encryption keys, they have their own that the FBI wanted to use to bypass these features. They eventually dropped it because they found a zero day exploit which apple fixed in later versions. That is why the newer phones aren’t vulnerable (yet).
https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_dispute
They’re exploiting vulnerabilities and back doors not brute forcing your passcode. The only way you’re keeping them out is with hardware encryption which the iPhone has and probably why it’s the only one not vulnerable. Hardware encryption also won’t matter if your vendor shares their keys with law enforcement. As far as I’m aware, Apple is the only one that’s gone to court and successfully defended their right to refuse access to encryption keys.
Don’t put anything incriminating on your phones.
Wow the head of AI for MS doesn’t know what the word freeware means.
If all your sponsors and business partners immediately flee you at mach speed over what you sent to that kid, it was certainly well past “inappropriate”
I have never claimed that they weren’t those things. You are arguing against what you want me to say, rather than what i actually wrote.
Never trust a third party to keep your shit private. Especially if privacy is their main selling point.