A Message to Our Customers

上传人:工**** 文档编号:458217206 上传时间:2023-08-05 格式:DOCX 页数:10 大小:23.89KB
返回 下载 相关 举报
A Message to Our Customers_第1页
第1页 / 共10页
A Message to Our Customers_第2页
第2页 / 共10页
A Message to Our Customers_第3页
第3页 / 共10页
A Message to Our Customers_第4页
第4页 / 共10页
A Message to Our Customers_第5页
第5页 / 共10页
点击查看更多>>
资源描述

《A Message to Our Customers》由会员分享,可在线阅读,更多相关《A Message to Our Customers(10页珍藏版)》请在金锄头文库上搜索。

1、A Message to Our Customers (致我们客户的一则信息)The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.美国政府要求苹果公司采取前所未有的措施,这将威胁到我们客户的安全。因这一情况已超我们现法律案例,故我们抵制这个

2、命令。This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.The Need for EncryptionSmartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, fro

3、m our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it wit

4、hout our knowledge or permission. Customers expect Apple and othertechnology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.Compromising the security of our personal information can ultimately put our per

5、sonal safety at risk. That is why encryption has become so important to all of us.For many years, we have used encryption to protect our customers personal data because we believe its the only way to keep their information safe. We have even put that data out of our own reach, because we believe the

6、 contents of your iPhone are none of our business.The San Bernardino CaseWe were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following th

7、e attack, and we have worked hard to support the governments efforts to solve this horrible crime.We have no sympathy for terrorists.When the FBI has requested data thats in our possession, we have provided it.Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino

8、case.We have also made Apple engineers available to advise the FBI, and weveoffered our best ideas on a number of investigative options at their disposal.We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that i

9、s both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.Specifically, the FBI wants us to make a new version of the i

10、Phone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software which does not exist today would have the potential to unlockanyiPhone in someones physical possession.The FBI may use differen

11、t words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limitedto this case, there is no way to guarantee such control.The Threat to Data SecuritySome

12、 would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.In todays digital world, the “key” to an encrypted system is a piece of information that

13、 unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.The government suggests this tool could only be used once, on one phone. But thats simply not

14、 true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks from restaurants and banks to stores and homes. No reasonable person would find that acc

15、eptable.The government is asking Apple to hack our own users and undermine decades ofsecurity advancements that protect our customers including tens of millions of American citizens from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to prote

16、ct our users would, ironically, be ordered to weaken those protections and make our users less safe.We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号