Vertex Technologies sponsors MCIT job fair to support youth employment and outsourcing talent    Unified real estate contract difficult to enforce; developer classification seen as more effective solution    Gold prices in Egypt surge by over EGP 2,000 in 2025: iSagha    Egypt sends 15th urgent aid convoy to Gaza in cooperation with Catholic Relief Services    Egypt proposes direct Cairo-Lilongwe flight and airport rehabilitation in Malawi talks    Egypt calls for Nile Basin inclusivity and rejection of unilateral measures in Rwanda talks    Egypt's Sisi directs efforts to continue fiscal stability, boost reserves    Al-Sisi meets Kurdistan Region PM Barzani, reaffirms support for Iraq's unity    URGENT: Egyptians' remittances jump 42.8% to $33.9 bln in Jan–Oct – CBE    Egypt's weekly food exports hit 192,000 tons – NFSA    Al-Sisi: Egypt seeks binding Nile agreement with Ethiopia    Mediterranean veterinary heads select Egypt to lead regional health network    Egyptian-built dam in Tanzania is model for Nile cooperation, says Foreign Minister    Egypt partners with global firms to localise medical imaging technology    The Long Goodbye: Your Definitive Guide to the Festive Season in Egypt (Dec 19 – Jan 7)    Egypt flags red lines, urges Sudan unity, civilian protection    Al-Sisi affirms support for Sudan's sovereignty and calls for accountability over conflict crimes    Central Bank of Egypt, Medical Emergencies, Genetic and Rare Diseases Fund renew deal for 3 years    Egypt's SPNEX Satellite successfully enters orbit    Egypt unveils restored colossal statues of King Amenhotep III at Luxor mortuary temple    Egyptian Golf Federation appoints Stuart Clayton as technical director    4th Egyptian Women Summit kicks off with focus on STEM, AI    Egypt's PM reviews major healthcare expansion plan with Nile Medical City    UNESCO adds Egyptian Koshari to intangible cultural heritage list    UNESCO adds Egypt's national dish Koshary to intangible cultural heritage list    Egypt recovers two ancient artefacts from Belgium    Egypt, Saudi nuclear authorities sign MoU to boost cooperation on nuclear safety    Giza master plan targets major hotel expansion to match Grand Egyptian Museum launch    Australia returns 17 rare ancient Egyptian artefacts    Egypt warns of erratic Ethiopian dam operations after sharp swings in Blue Nile flows    Egypt golf team reclaims Arab standing with silver; Omar Hisham Talaat congratulates team    Egypt launches Red Sea Open to boost tourism, international profile    Sisi expands national support fund to include diplomats who died on duty    Egypt's PM reviews efforts to remove Nile River encroachments    Egypt resolves dispute between top African sports bodies ahead of 2027 African Games    Germany among EU's priciest labour markets – official data    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Apple fight could grow worse with demand for 'source code'
Published in Amwal Al Ghad on 15 - 03 - 2016

In what observers of the case called a carefully calibrated threat, the U.S. Justice Department last week suggested that it would be willing to demand that Apple turn over the "source code" that underlies its products as well as the so-called "signing key" that validates software as coming from Apple.
Together, those two things would give the government the power to develop its own spying software and trick any iPhone into installing it. Eventually, anyone using an Apple device would be unable to tell whether they were using the real thing or a version that had been altered by officials to be used as a spy tool.
Technology and security experts said that if the U.S. government was able to obtain Apple's source code with a conventional court order, other governments would demand equal rights to do the same thing.
"We think that would be pretty terrible," said Joseph Lorenzo Hall, chief technologist at the nonprofit Center for Democracy & Technology.
The battle between Apple and the U.S Justice Department has been raging since the government in February obtained a court order demanding that Apple write new software to help law enforcement officials unlock an iPhone associated with one of the shooters in the December attack in San Bernardino, California that killed 14 people.
Apple is fighting the order, arguing that complying with the request would weaken the security of all iPhones and create an open-ended precedent for judges to make demands of private companies.
The Justice Department's comments about source code and signing keys came in a footnote to a filing last week in which it rejected Apple's arguments. Apple's response to the DOJ brief is expected on Tuesday.
Justice Department lawyers said in the brief that they had refrained from pursuing the iOS source code and signing key because they thought "such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple."
The footnote evoked what some lawyers familiar with the case call a "nuclear option," seeking the power to demand and use the most prized assets of lucrative technology companies.
A person close to the government's side told Reuters that the Justice Department does not intend to press the argument that it could seize the company's code, and someone on Apple's side said the company isn't worried enough to counter the veiled threat in its brief due Tuesday.
But many people expect the iPhone matter to reach the U.S. Supreme Court, and thus even fallback legal strategies are drawing close scrutiny.
ODDS OF SUCCESS UNCLEAR
There is little clarity on whether a government demand for source code would succeed.
Perhaps the closest parallel was in a case filed by federal prosecutors against Lavabit LLC, a privacy-oriented email service used by Edward Snowden. In trying to recover Snowden's unencrypted mail from the company, which did not keep Snowden's cryptographic key, the Justice Department got a court order forcing the company to turn over another key instead, one that would allow officials to impersonate the company's website and intercept all interactions with its users.
"Lavabit must provide any and all information necessary to decrypt the content, including, but not limited to public and private keys and algorithms," the lower court ruled.
Lavabit shut down rather than comply. But company lawyer Jesse Binnall said the Fourth Circuit Court of Appeals, which upheld the lower ruling, did so on procedural grounds, so that the Justice Department's win would not influence much elsewhere.
In any case, full source code would be even more valuable than the traffic key in the Lavabit case, and the industry would go to extreme lengths to fight for it, Binnall said.
"That really is the keys to the kingdom," Binnall said.
Source code is sometimes inspected during lawsuits over intellectual property, and the Justice Department noted that Apple won permission to review some of rival Samsung's (005930.KS) code in one such case. In that case and similar battles, the code is produced with strict rules to prevent copying.
No cases brought by the government have led to that sort of code production, or at least none that have come to light.
But intelligence agencies operate under different rules and have wide latitude overseas. Some advanced espionage programs attributed to the United States used digital certificates that were stolen from Taiwanese companies, though not full programs.
U.S. software code may have been sought in other cases, such as investigations relying on the Patriot Act or the Foreign Intelligence Surveillance Act (FISA), which applies within American borders.
Several people who have argued before the special FISA court or are familiar with some of its cases say they know of no time that the government has sought source code.
source: Reuters


Clic here to read the story from its source.