{"id":39571,"date":"2014-09-27T17:47:43","date_gmt":"2014-09-27T21:47:43","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/sorry-nsa-iphone-6-locks-out-us-spies\/"},"modified":"2014-09-27T17:47:43","modified_gmt":"2014-09-27T21:47:43","slug":"sorry-nsa-iphone-6-locks-out-us-spies","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/sorry-nsa-iphone-6-locks-out-us-spies\/","title":{"rendered":"Sorry, NSA: iPhone 6 locks out US spies"},"content":{"rendered":"<p><p>    The move raises a critical issue, the intelligence officials    say: Who decides what kind of data the government can access?    Until now, those decisions have largely been a matter for    Congress, which passed the Communications Assistance for Law    Enforcement Act in 1994, requiring telecommunications companies    to build into their systems an ability to carry out a wiretap    order if presented with one. But despite intense debate about    whether the law should be expanded to cover email and other    content, it has not been updated, and it does not cover content    contained in a smartphone.<\/p>\n<p>    At Apple and Google,    company executives say the United States government brought    these changes on itself. The revelations by the former N.S.A.    contractor Edward J. Snowden    not only killed recent efforts to expand the law, but also made    nations around the world suspicious that every piece of    American hardware and software  from phones to servers made by    Cisco Systems  have \"back doors\" for American intelligence and    law enforcement.  <\/p>\n<p>    Surviving in the global marketplace  especially in places like    China, Brazil and Germany  depends on convincing consumers that    their data is secure.  <\/p>\n<p>    Read MoreThe best insurance for your iPhone 6<\/p>\n<p>    Timothy D. Cook, Apple's chief    executive, has emphasized that Apple's core business is to sell    devices to people. That distinguishes Apple from companies that    make a profit from collecting and selling users' personal data    to advertisers, he has said.  <\/p>\n<p>    This month, just before releasing the iPhone 6 and iOS 8, Apple    took steps to underscore its commitment to customer privacy,    publishing a revised privacy policy on its website.  <\/p>\n<p>    The policy described the encryption method used in iOS 8 as so    deep that Apple could no longer comply with government warrants    asking for customer information to be extracted from devices.    \"Unlike our competitors, Apple cannot bypass your passcode, and    therefore cannot access this data,\" the company said.  <\/p>\n<p>    Under the new encryption method, only entering the passcode can    decrypt the device. (Hypothetically, Apple could create a tool    to hack into the device, but legally the company is not    required to do that.)  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnbc.com\/id\/102038395\/RK=0\/RS=PIDOkOO0cgKUrlh7mTw1rMFRgto-\" title=\"Sorry, NSA: iPhone 6 locks out US spies\">Sorry, NSA: iPhone 6 locks out US spies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The move raises a critical issue, the intelligence officials say: Who decides what kind of data the government can access? Until now, those decisions have largely been a matter for Congress, which passed the Communications Assistance for Law Enforcement Act in 1994, requiring telecommunications companies to build into their systems an ability to carry out a wiretap order if presented with one.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/sorry-nsa-iphone-6-locks-out-us-spies\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-39571","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39571"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=39571"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39571\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=39571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=39571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=39571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}