There’s a bomb hidden somewhere in a city. Law enforcement is in possession of a suspect’s mobile phone but can’t gain access because the device is encrypted, and the suspect is deceased. The authorities then demand that the device manufacturer create a backdoor so that they can bypass the encryption and learn how to stop the bomb. The clock is ticking. Literally thousands of lives are at stake. If the company complies, they will be exposing many times more users to potential security breaches in the future once the backdoor they provide is inevitably leaked to the world. If they…
[Continue Reading]