FREN

#FF00AA


17 feb. 2016

The more I think about it (and I can’t seem to stop), the more puzzled I am by Apple’s strategy here. I imagine the crux of the issue was avoiding at all costs to be in the headlines for helping the FBI’s case by hacking into an iPhone. Or, yeah, maybe they’re sincerely that hung up about privacy, whatever — aside from questions about the legality of forcing a company to develop software to aid an investigation, from the pure privacy and ethics perspectives this case isn’t very different from all the earlier times Apple helped law enforcement get into a locked iPhone. It’s an obsolete iPhone; it’s less secure than more recent iPhones; Apple is able to access its data.

Instead:

  • They’re emphatically acknowleding that an iPhone’s data is completely vulnerable and, in an effort to muddy the waters and make the case appear more general than it is, they’ve even avoided pointing out that any iPhone 5s, 6 or 6s would be completely immune from this form of attack.

  • Instead of fighting the issue on broad, abstract terms when it is inevitably discussed in Congress, they’ve taken their stand on a case where their opponents can literally accuse them of aiding terrorists.

  • By making a big splash now instead of waiting for legislative debates, they’re making it a presidential campaign issue — and I’ll bet that very few candidates will choose to be on Apple’s side.

How on earth can this be a good PR strategy? Oh, sure, they have the nerds’ support. Fat load of good that will do, for them and for us.

Want to know when I post new content to my blog? It's a simple as registering for free to an RSS aggregator (Feedly, NewsBlur, Inoreader, …) and adding www.ff00aa.com to your feeds (or www.garoo.net if you want to subscribe to all my topics). We don't need newsletters, and we don't need Twitter; RSS still exists.

Legal information: This blog is hosted par OVH, 2 rue Kellermann, 59100 Roubaix, France, www.ovhcloud.com.

Personal data about this blog's readers are not used nor transmitted to third-parties. Comment authors can request their deletion by e-mail.

All contents © the author or quoted under fair use.