The Golden Key: FBI vs Apple iPhone - Computerphile

367,512
144
Published 2016-03-04
Should Apple unlock a terrorists iPhone for the FBI? Professor Ross Anderson explains how this is a "Pandora's Box" situation.

Buffer Overflow Attacks:    • Running a Buffer Overflow Attack - Co...  
$5 Computer:    • Raspberry Pi Zero - the $5 Computer -...  
AI Safety:    • AI Safety - Computerphile  
EXTRA BITS:    • EXTRA BITS: iPhone Golden Key - Compu...  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

All Comments (21)
  • @OldePhart
    "photogenic case".. THATS the description I have been looking for. FBI waited till sympathy would be on their side to bring this debate to the public forum.
  • @armoredp
    "...then you're absolutely hosed." Loved that expression haha.
  • @IchiharaAsako
    It's nice to see some rational talk about this. The scope creep potential is vast, and a lot of people seem to fail to understand that.
  • @zfg87
    3:04 "and then you're absolutely hosed" was not expecting that lol
  • @micnor14
    I liked the jab at North Korea at the end.
  • @iSolarSunrise
    0:58 - Reminds me of this quote: "Any exploit is a Total exploit" from Person of Interest.
  • @SUFHolbek
    Thanks. very leveled headed and relatively unbiased opinion on the matter. Pretty refreshing actually.
  • Honestly, I'm less concerned about bad actors getting a backdoor than I am the FBI - I don't trust them any more than I do a common internet criminal. I don't want the FBI to have that capability either.
  • @AtheistExpert
    when I was a kid we acquired the key to all the lockers in our school... just an example of NOBUS. xD
  • @todkapuz
    The biggest issue in the "release" of the key... still seems to be missed is that if any of this evidence is to be used in a court of law, the "forensics tool" must be validated... the defense must be able to reproduce or otherwise confirm the methodology. When you are written a ticket for speeding from a radar gun.. it is only admissable because the radar gun is validated, and has calibration to show it is functioning adequately... when DNA is used in crime matching, the techniques have to be the validated techniques, that can be proven to be reliable. Since the FBI is doing this "out in the open"... it is assumed they want it so they can have legally obtained information... presumably so they can use the data in any possible conviction, etc... it is just like the current spying on us... they illegally obtain information that they use to find a source where they may have obtained it legally.... but still.... since they seem to want this iphone's data legally... they tool used to help them obtain it must be open to discovery process... while there are a couple ways this can be done.... it does allow for another way for the "golden key" (although its more of a golden lock modifer) to get out. ......... of course it is pretty simple, apple just needs to write a firmware/software or hardware revision that makes it impossible to update the phone while locked.... why this isn't the case is beyond me... then we wouldn't even be talking about this golden key... as it would be impossible to deploy it... granted I am glad that the idea of the government compelling companies/people to go out of their way to spy on people is getting its moment in court... as long as it goes the way it should.... to the people.
  • @4Gehe2
    I didn't know USA had an atomic bong.
  • the moment this "golden key" is made is the moment I wipe and stop using any and all iProducts I own.
  • @Yrouel86
    What the FBI is really asking is to be able to compel a company to make new tools to circumvent security features on their products whenever they deem necessary. It's not just about this case or this particular request it's more about setting such dangerous precedent.
  • @ccall48
    Would you leave your door unlocked 24/7 for government officials and agents to come through your house at any time convenient to them wherever and wherever they wanted, I don't think so. They may go after this in the guise of just to catch a bad guy, but they will use it against civilians at a whim. Makes sense why Australia brought in data retention laws late last year, they must of been expecting a win in this arena. The release of this would be the death of Apple.
  • You guys do great proof of work explanation and demonstration. I am very glad to have found this channel at my present stage in research.
  • @nullptr.
    Camera is finally not shaking! good job
  • @cykikvisage
    I'm glad I can share this to articulate these points better to those people who don't know any better! Thanks!
  • @TheThagenesis
    We've seen a fairly recent example how bad security backdoors are. once the TSA keys to unlock luggage got public it was only a matter of days until everybody was able to download a file and 3d print an own set of keys to unlock every TSA certified lock. why does nobody remember that? it was only 2 years ago
  • Thank you for making this topic so accessible. This is scary stuff, the second battle for personal encryption/privacy has begun.