Apple-FBI Update: FBI Cracks San Bernardino Killer’s iPhone, Apple Wants to Know How

This episode of Device Squad, the podcast for the mobile enterprise, features a roundtable discussion with Mobile Strategists Nitin Bhatia & Glenn Gruber. Hosted by Steven Brykman.

This is an update on our earlier podcast detailing the situation between Apple and the FBI.

As you’ll recall, Apple rejected a judge’s order to help the FBI hack into the iPhone of one of the San Bernardino shooters, calling the action “an overreach by the U.S. government.” The FBI had now dropped its case against Apple, claiming they were able to successfully break into the phone.

LA Times just reported Apple wants the FBI to reveal how they hacked into the San Bernadino phone but so far the FBI hasn’t said how they did it or who they hired for help, though the consensus is it was the Israeli cybersecurity firm, Cellebrite.

“One way or another, Apple needs to figure out the details,” said Justin Olsson, product counsel at security software maker AVG Technologies. “The responsible thing for the government to do is privately disclose the vulnerability to Apple so they can continue hardening security on their devices.”

“There is very little debate that it is in everyone’s best interest that Apple find out about this vulnerability and everyone should be asking why that is not the case,” said Alex Rice, chief technology officer at San Francisco security company HackerOne.

Does Apple have a right to know how the FBI broke into the phone?

Tune-in and find out!

Subscribe to Device Squad in iTunes

Share on

linkedin sharing button twitter sharing button

Ready to get started?

Enter your information to keep the conversation going.
Location image
4 Sentry Parkway East, Suite 300, Blue Bell PA, 19422

Email Image

Phono Image610 239 8100

Location Image4 Sentry Parkway East, Suite 300, Blue Bell PA, 19422
Phono Image610 239 8100