SlideShare a Scribd company logo
Apple
vs.
FBI
San Bernardino
Terrorist Attack
12/2/15
› 14 civilians killed
› 22 civilians and 2
police officers
severely injured
› Second deadliest
mass shooting in CA
since 1984
› Deadliest US mass
shooting since 2012
Sandy Hook incident
› Worst terrorist attack
since 9/11
Couple fled.
Killed in a shoot out 4 hours later.
FBI declares counter-terrorism
investigation the next day.
The Dilemma
› The two attackers both
destroyed their
personal cell phones
before the attack
› However, the iPhone
5C of Farook issued to
him by his company
was recovered intact
› However the phone is
locked with a 4 digit
passcode
FBI wants
Apple’s help
Because if the wrong password is entered too
many times, the phone is locked and the data
can be potentially erased.
What does the FBI really want?
› New version of iOS that can be installed and run in Farook’s
phone RAM to disable certain built in security features
› This would allow a passcode to be inputted electronically
instead of manually and would make it easier to unlock an
iPhone using brute force methods (trying out millions of
passcode combos)
How did Apple react?
› Apple declined to help FBI in that case because it has policy to
never undermine product security features
› However they have already complied with FBI by provided
Farook’s iCloud storage files that were present a few weeks
before the attack
How did the FBI respond to that?
› Successfully applies to federal judge to issue court order under
the All Writs Act of 1789 (227 years old) so that Apple can create
and provide the requested software
All Writs Act of 1789
› A writ is basically a formal order that is issued by a court and
represents a sweeping legal gesture to issue orders
compelling people to do things, so long as it’s for a legal and
necessary reason.
› Part of the Judiciary Act of 1789 which was adopted during
the first session of the first US Congress and signed into law
by the first president, George Washington.
Data privacy
is a big deal.
All of your data is protected using
encryption. But the law has not kept
pace.
“This dispute concerns
whether or not the US
federal courts can compel
manufacturers to assist in
unlocking cell phones
whose contents are
cryptographically
protected”
Essentially the FBI is asking
Apple for a cheat code that
hackers could get access to.
First, it’s one iPhone.
Then it’s an Android.
Then it’s your data.
A MESSAGE TO OUR CUSTOMERS
The US Government has demanded
Apple takes an unprecedented
step that threatens the security of
all their customers. We oppose this
order, which has implications far
beyond the legal case at hand.
Apple Has A Lot of Support Already
(Reform Government Surveillance)
Edward
Snowden
NSA Whistleblower
› Has stated the FBI
already has the
technical means to
unlock Apple’s
devices
› FBI saying it can’t
unlock iPhone is
“bullshit”
“The global
technological
consensus is against
the FBI”
Our verdict?
While we believe the FBI has good
intentions, it would be terrible if the
government got hold of a backdoor to all
iOS based products. Such a demand
undermines the very freedom that our
government is meant to protect.
We stand with Apple.
How does iPhone Security work ?
Every iOS device
combines
software,
hardware, and
services
designed to
work together
for maximum
security and a
transparent user
experience.
How Text Messages are Received
Setting a Passcode
FBI and Security Risks
If backdoors are created for the FBI
› Companies a Apple and Facebook will receive similar
demands from other governments.
› Less trustworthy countries will demand access also.
“Is Apple more concerned with
protecting a dead ISIS terrorist’s
privacy over the security of the
American people?”
THANKS!
Any questions,
comments, or concerns?
Credits
Special thanks to all the people who made and released these awesome resources for
free:
› Presentation template by SlidesCarnival
› http://www.hbo.com/last-week-tonight-with-john-oliver
› https://www.wikiwand.com/en/2015_San_Bernardino_attack
› http://time.com/4262480/tim-cook-apple-fbi-2/
› http://www.huffingtonpost.com/entry/nbc-live-tv-images-san-bernardino-shooting-
suspects_us_5661d3bce4b072e9d1c5f047
› http://www.apple.com/customer-letter/
› http://fortune.com/2016/03/09/snowden-fbi-apple-iphone/
› http://www.popularmechanics.com/technology/a19483/what-is-the-all-writs-act-of-1789-the-225-
year-old-law-the-fbi-is-using-on-apple/
› https://www.youtube.com/watch?v=SGCSy2Ogoa4
› http://www.wired.com/2016/02/magistrate-orders-apple-to-help-fbi-hack-phone-of-san-
bernardino-shooter
› https://support.apple.com/en-us/HT204060
› http://ios.wonderhowto.com/how-to/disable-security-lockouts-from-too-many-failed-passcode-
attempts-your-iphone-0150884/
› https://www.apple.com/business/docs/iOS_Security_Guide.pdf
› http://9to5mac.com/2016/02/17/apple-fbi-court-order-method/
› http://www.newsmax.com/Newsfront/US-Apple-Encryption-End-Run/2016/02/17/id/714858/

More Related Content

What's hot

Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
Benjamin Ang
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
DevOps.com
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
Kaustubh Patil
 
Distribution Policy Apple
Distribution Policy AppleDistribution Policy Apple
Distribution Policy AppleNanor
 
Apple vs Samsung: Design Patents
Apple vs Samsung: Design PatentsApple vs Samsung: Design Patents
Apple vs Samsung: Design Patents
Hedi Fauzi
 
Global fight between apple and Samsung
Global fight between apple and SamsungGlobal fight between apple and Samsung
Global fight between apple and Samsung
HARIKRISHNAN N R
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Apple SWOT
Apple SWOTApple SWOT
Apple SWOTvagmi369
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
BlueBit Technologies
 
apple inc
apple incapple inc
apple inc
Jahid Khan Rahat
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
Khusan Shrestha
 
Junior新趨勢: 邊緣運算
Junior新趨勢: 邊緣運算Junior新趨勢: 邊緣運算
Junior新趨勢: 邊緣運算
Collaborator
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
散熱產業.pdf
散熱產業.pdf散熱產業.pdf
散熱產業.pdf
Collaborator
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
Abhilash vijayan
 

What's hot (20)

Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Distribution Policy Apple
Distribution Policy AppleDistribution Policy Apple
Distribution Policy Apple
 
Apple vs Samsung: Design Patents
Apple vs Samsung: Design PatentsApple vs Samsung: Design Patents
Apple vs Samsung: Design Patents
 
Enron
EnronEnron
Enron
 
Global fight between apple and Samsung
Global fight between apple and SamsungGlobal fight between apple and Samsung
Global fight between apple and Samsung
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Apple SWOT
Apple SWOTApple SWOT
Apple SWOT
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Samsung VS Apple
Samsung VS Apple Samsung VS Apple
Samsung VS Apple
 
apple inc
apple incapple inc
apple inc
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
 
Junior新趨勢: 邊緣運算
Junior新趨勢: 邊緣運算Junior新趨勢: 邊緣運算
Junior新趨勢: 邊緣運算
 
Sony Hacking Presentation
Sony Hacking PresentationSony Hacking Presentation
Sony Hacking Presentation
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
散熱產業.pdf
散熱產業.pdf散熱產業.pdf
散熱產業.pdf
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 

Similar to Apple vs FBI on Data Privacy

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
Wendy Knox Everette
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
annettsparrow
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
Vincent Perez
 
Q1 have been several individuals who have leaked highly.docx
Q1 have been several individuals who have leaked highly.docxQ1 have been several individuals who have leaked highly.docx
Q1 have been several individuals who have leaked highly.docx
bkbk37
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
Damian T. Gordon
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
Damian T. Gordon
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
centralohioissa
 
Apple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement CooperationApple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement Cooperation
ardiansyahmaulana11
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
Olivia Farrow
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
vrickens
 

Similar to Apple vs FBI on Data Privacy (20)

BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
 
Q1 have been several individuals who have leaked highly.docx
Q1 have been several individuals who have leaked highly.docxQ1 have been several individuals who have leaked highly.docx
Q1 have been several individuals who have leaked highly.docx
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Apple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement CooperationApple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement Cooperation
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
File000092
File000092File000092
File000092
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
 

More from Frances Coronel

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con Asana
Frances Coronel
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckin
Frances Coronel
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in Tech
Frances Coronel
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in Tech
Frances Coronel
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020
Frances Coronel
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with Asana
Frances Coronel
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101
Frances Coronel
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!
Frances Coronel
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101
Frances Coronel
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
Frances Coronel
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!
Frances Coronel
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!
Frances Coronel
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101
Frances Coronel
 
JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019
Frances Coronel
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.org
Frances Coronel
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A Wizard
Frances Coronel
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101
Frances Coronel
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101
Frances Coronel
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101
Frances Coronel
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101
Frances Coronel
 

More from Frances Coronel (20)

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con Asana
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckin
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in Tech
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in Tech
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with Asana
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101
 
JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.org
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A Wizard
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Apple vs FBI on Data Privacy

  • 2. San Bernardino Terrorist Attack 12/2/15 › 14 civilians killed › 22 civilians and 2 police officers severely injured › Second deadliest mass shooting in CA since 1984 › Deadliest US mass shooting since 2012 Sandy Hook incident › Worst terrorist attack since 9/11
  • 3. Couple fled. Killed in a shoot out 4 hours later. FBI declares counter-terrorism investigation the next day.
  • 4. The Dilemma › The two attackers both destroyed their personal cell phones before the attack › However, the iPhone 5C of Farook issued to him by his company was recovered intact › However the phone is locked with a 4 digit passcode
  • 5. FBI wants Apple’s help Because if the wrong password is entered too many times, the phone is locked and the data can be potentially erased.
  • 6. What does the FBI really want? › New version of iOS that can be installed and run in Farook’s phone RAM to disable certain built in security features › This would allow a passcode to be inputted electronically instead of manually and would make it easier to unlock an iPhone using brute force methods (trying out millions of passcode combos)
  • 7. How did Apple react? › Apple declined to help FBI in that case because it has policy to never undermine product security features › However they have already complied with FBI by provided Farook’s iCloud storage files that were present a few weeks before the attack
  • 8. How did the FBI respond to that? › Successfully applies to federal judge to issue court order under the All Writs Act of 1789 (227 years old) so that Apple can create and provide the requested software
  • 9. All Writs Act of 1789 › A writ is basically a formal order that is issued by a court and represents a sweeping legal gesture to issue orders compelling people to do things, so long as it’s for a legal and necessary reason. › Part of the Judiciary Act of 1789 which was adopted during the first session of the first US Congress and signed into law by the first president, George Washington.
  • 10. Data privacy is a big deal. All of your data is protected using encryption. But the law has not kept pace.
  • 11. “This dispute concerns whether or not the US federal courts can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected”
  • 12. Essentially the FBI is asking Apple for a cheat code that hackers could get access to. First, it’s one iPhone. Then it’s an Android. Then it’s your data.
  • 13. A MESSAGE TO OUR CUSTOMERS The US Government has demanded Apple takes an unprecedented step that threatens the security of all their customers. We oppose this order, which has implications far beyond the legal case at hand.
  • 14. Apple Has A Lot of Support Already (Reform Government Surveillance)
  • 15. Edward Snowden NSA Whistleblower › Has stated the FBI already has the technical means to unlock Apple’s devices › FBI saying it can’t unlock iPhone is “bullshit” “The global technological consensus is against the FBI”
  • 16.
  • 17. Our verdict? While we believe the FBI has good intentions, it would be terrible if the government got hold of a backdoor to all iOS based products. Such a demand undermines the very freedom that our government is meant to protect. We stand with Apple.
  • 18. How does iPhone Security work ? Every iOS device combines software, hardware, and services designed to work together for maximum security and a transparent user experience.
  • 19. How Text Messages are Received
  • 21.
  • 22. FBI and Security Risks If backdoors are created for the FBI › Companies a Apple and Facebook will receive similar demands from other governments. › Less trustworthy countries will demand access also.
  • 23. “Is Apple more concerned with protecting a dead ISIS terrorist’s privacy over the security of the American people?”
  • 25. Credits Special thanks to all the people who made and released these awesome resources for free: › Presentation template by SlidesCarnival › http://www.hbo.com/last-week-tonight-with-john-oliver › https://www.wikiwand.com/en/2015_San_Bernardino_attack › http://time.com/4262480/tim-cook-apple-fbi-2/ › http://www.huffingtonpost.com/entry/nbc-live-tv-images-san-bernardino-shooting- suspects_us_5661d3bce4b072e9d1c5f047 › http://www.apple.com/customer-letter/ › http://fortune.com/2016/03/09/snowden-fbi-apple-iphone/ › http://www.popularmechanics.com/technology/a19483/what-is-the-all-writs-act-of-1789-the-225- year-old-law-the-fbi-is-using-on-apple/ › https://www.youtube.com/watch?v=SGCSy2Ogoa4 › http://www.wired.com/2016/02/magistrate-orders-apple-to-help-fbi-hack-phone-of-san- bernardino-shooter › https://support.apple.com/en-us/HT204060 › http://ios.wonderhowto.com/how-to/disable-security-lockouts-from-too-many-failed-passcode- attempts-your-iphone-0150884/ › https://www.apple.com/business/docs/iOS_Security_Guide.pdf › http://9to5mac.com/2016/02/17/apple-fbi-court-order-method/ › http://www.newsmax.com/Newsfront/US-Apple-Encryption-End-Run/2016/02/17/id/714858/