Tuesday, February 23, 2016

Let's Get iHacky

Very, Very Different
Let's just get this out of the way quickly. I'm probably the wrong person to ask about the importance of personal privacy as it relates to personal electronic devices.

Why? Well, I've worked at companies that were successful, for a time, because they correctly predicted how little consumers actually cared about it, at least when it related to shopping behavior, and how they had the opportunity to trade parts of it in for discounts. I also grew up in a time and economic background before ubiquitous personal technology, which means that I've never completely cottoned to the idea that I should give a screen all of my secrets. Or that such things were actually all that valuable, or interesting, to anyone, really.

So when the point comes around to discuss, as everyone with a column seemingly must, where the world should sit in terms of Apple's continued battle to avoid hacking their own gear... well, um, I have a few questions. Independent of the powerless propagation of one of two opinions.

1) Hasn't this entire discussion for the past few days made Apple's products, well, must-own equipment for criminals?

They're going to bat for you, bad people. Patronize them accordingly! But you probably want to act fast about that, since...

2) Isn't the iPhone the single biggest target on the planet for hackers right about now?

All we've heard for the past week is how incredibly powerful and valuable a hack of this hardware would be. If you've got the skills or the contacts, you'd have to think this would be on the top of your to-do list now. After all, if you can hack a phone -- just one measly phone! -- all of the rest of them become incredibly vulnerable to any criminal mischief you can imagine, and you can sell your hack for bitcoins on the dark Web, which is where I presume all such spectacular fits of criminal behavior are patronized. Speaking of which...

3) How is it that we don't have people capable of this tremendous criminal mischief on the public payroll?

I have to say, I'm a little bit disappointed. Any number of television dramas and conspiracy theorists have assured me of the remarkable degree of State Power, from black helicopters to drone warfare to extradition and Edward Snowden's adventures and so on, and so on. And yet, here's a maniac's phone, the same phone that millions of other people have, and no one can crack it. It's very disappointing, really. Next, you'll be telling me the moon landing wasn't faked, there's no aliens in Area 51, and there aren't treasure maps on the back of historical documents. Is there nothing left to believe in?

As for the actual privacy issues here... well, what we've got is a crisis of invention. No one invented a perfect car trunk that could never be opened by anyone but the owner of the car, but if they had... well, there probably might have been law enforcement having an issue along the way. Particularly if this was a relatively new feature to trunks, since the iPhone didn't have the current level of encryption just 18 months ago.

I'm not a fan of rampant government access to my devices; no one is. But the idea that a company gets to profit when unintended criminal consequences occur... well, um, not usually. I'm also not quite sure why your special little phone gets to be different from your computer, your car, your home, your safety deposit box, and so on, and so on.

But then again, I'm the wrong person to ask about personal privacy...

* * * * *

Feel free to comment, as well as like or share this column, connect with me on LinkedIn, or email me at davidlmountain at gmail dot com, or hit the RFP boxes at top right. RFPs are always free, and we hope to hear from you soon.

No comments:

Post a Comment