Apple Kerfuffle—Part II

Just a few further thoughts on Apple’s refusal to unlock the San Bernardino terrorists’ iPhone . . .

Years ago, Apple decided that although the infrastructure of the United States made the development of the computer possible, it would be cheaper to manufacture them in China. The Chinese manufacturing facility was quite similar to a slave labor camp. Workers slept in barracks, and when Steve Jobs had a bright idea, the workers would be assigned to long hours to implement the new feature or whatever. Conditions were so bad that they drove some workers to commit suicide. In the meantime, iPhones have been copied and/or reverse engineered so that counterfeit copies are available.

But the manufacturing costs are cheaper, so Apple continues to manufacture in China.

However, Chinese products do not necessarily meet US quality standards. They have no compunction with using lead based paint for children’s toys or adding cadmium to products, even though it’s toxic. Some software shipped with their products has been found to be loaded with malware; even some memory sticks have software installed and hidden that would allow someone to bypass security measures to read the contents. There have even been reliable claims that Lenovo computers (formerly IBM computers before being purchased by the Chinese) have malware built into the firmware so it cannot be removed. Then, of course, many believe that the Chinese have hacked into the US Government computer systems to access personnel information, as well as hacking all information on various credit card holders.

Consider:

  1. If the Chinese Government wanted information stored in an iPhone in China, would they acknowledge, much less accept Apple’s arguments?
  2. Given their track record, and the fact that the iPhones are manufactured in China, what are the odds that there is already a built-in system for retrieving any information they might want.

Just something to think about.

Advertisements

One response to “Apple Kerfuffle—Part II

  1. Your solution to this “privacy” stalemate, Steve, makes what is age-old–
    new-age. By making data privacy a “hardware” issue is the very reason why some of our very old military computers still using floppy disks cannot be hacked. I suggest, Steve, you send your thesis to Donald Rumsfeld, c/o
    G.D. Searle, Des Plaines, Illinois. He’ll get it to the proper persons at the proper agencies, and will give YOU full credit. He is a man of good character. You’ll see. Great thinking, and thanks for sharing it first with us here.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s