@OrinKerr Here's a blogpost discussing this. Hopefully @dguido or @JZdziarski will be able to correct any errors
http://blog.erratasec.com/2016/03/can-apple-code-be-misused.html …
-
-
-
@ErrataRob@dguido@JZdziarski Thanks, Rob. Interesting.
End of conversation
New conversation -
-
-
@OrinKerr Once the source code exists, the core ideas are in the various programmer's minds. They can then leave and work elsewhere. -
@ErrataRob Given that it only takes a few days to write the source code, isn't that pretty much true now? -
@OrinKerr Possibly. "Only a few days" is the lower bound, assuming much of it already exists. It's more likely a couple weeks worth of code. -
@OrinKerr It's also likely to require a collaboration among more than one programmer that one couldn't produce by themselves.
End of conversation
New conversation -
-
-
@OrinKerr There's one set of problems with source-code, as mentioned above. Binary code can easily be reverse engineered.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@OrinKerr It's like the FBI forces Apple to write a novel, then the various employee authors leave and go work elsewhere, copying the ideas.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@OrinKerr I don't think Apple contests any of this. Doesn't want to have to hack any phone b/c could be forced to do it again.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@OrinKerr Also, the whole discussion ignores the difference between "source code" that Apple writes, and the "binary code" they give to FBIThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.