@Wakko
So wurden derartige Anfragen früher gehandhabt:
Each data-extraction request was carefully vetted by Apple’s lawyers. Of those deemed legitimate, Apple in recent years required that law enforcement officials physically travel with the gadget to the company’s headquarters, where a trusted Apple engineer would work on the phones inside Faraday bags, which block wireless signals, during the process of data extraction.
Und so wollte man es dieses Mal machen:
After December’s San Bernardino attack, Apple worked with the F.B.I. to gather data that had been backed up to the cloud from a work iPhone issued to one of the assailants, according to court filings. When investigators also wanted unspecified information on the phone that had not been backed up, the judge this week granted the order requiring Apple to create a special tool to help investigators more easily crack the phone’s passcode and get into the device.
Apple had asked the F.B.I. to issue its application for the tool under seal. But the government made it public, .....
Apple hat also nicht wirklich ein Tool angeboten, mit dem man das iPhone selbst hätte auslesen können, sondern Apple hat bereits vor dem Bekanntwerden des Falls Daten aus dem Backup des iPhones eines der Beteiligten ausgelesen. Und darum gebeten, dass die Anfrage nach einem Tool, das auch Daten aus dem Gerät selbst auslesen kann, nicht öffentlich gemacht wird. Was die Regierung ja offensichtlich anders gehandhabt hat. Vom vermeintlichen Angebot, ein solches Tool bereitzustellen, lese ich da nichts.
Krass finde ich vor allem das hier (noch unter iOS 7):
By then, Mr. Snowden’s disclosures about how the National Security Agency had cozied up to some tech companies and hacked others to gain user data were reverberating worldwide. The disclosures included revelations of a comprehensive, decade-long Central Intelligence Agency program to compromise Apple’s products; C.I.A. analysts tampered with the products so the government could collect app makers’ data. In other cases, the agency was embedding spy tools in Apple’s hardware, and even modifying an Apple software update that allowed government analysts to record every keystroke.