Genuine question from @benjaminwittes @BobbyChesney and me. How does Apple strike access/security balance itself?https://twitter.com/lawfareblog/status/720978120229154822 …
@Susan_Hennessey Note, Apple sells mobile device management for businesses to access employee phones. @benjaminwittes @BobbyChesney
-
-
@Susan_Hennessey San Bernadino has it, but didn't have it implemented on Farook's phone.@benjaminwittes@BobbyChesney -
@emptywheel@Susan_Hennessey@BobbyChesney Right, but if they believe that only end-to-end encryption is secure, such backdoors ...
End of conversation
New conversation -
-
-
@emptywheel@Susan_Hennessey@BobbyChesney ...our questino is whether the company uses them itself.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.