Connect with us

Tech News

Apple says their hacking San Bernardino attackers’ phones sets a “dangerous precedent”

A federal court has ruled that Apple must build a backdoor into a terrorist’s iPhone, sparking a national debate on how to balance national security with digital privacy.

Published

on

farook malik

Apple fights federal order to break into iPhone

After the Sen Bernardino terrorist attacks, Americans were rocked back on their heels. It led to questions about how it could happen here, how it could go undetected, and so forth, with one of the now-deceased attackers’ phone potentially holding answers.

Federal magistrate, Judge Sheri Pym has ordered Apple to break into an encrypted iPhone that FBI investigators found not on the attacker, but in a search after the attack. They’re seeking data that phone carrier Verizon cannot recover, as it is encrypted. That leaves Apple the remaining option for investigators.

Apple CEO said in a statement that the order “has implications far beyond the legal case at hand,” and Apple hacking their own user sets a “dangerous precedent.”

“We have great respect for the professionals at the FBI, and we believe their intentions are good,” said Cook. “Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.”

This unique case sets a precedent, indeed

The challenge with this unique situation is that it is rallying people whose primary voting issue is national security, while rallying those who are primarily concerned with digital privacy, pitting them against each other. The ruling implies the two are disjointed, and created an immediate misunderstanding – the Judge did not ask Apple to open up one phone of one terrorist, rather build a back door into all Apple devices for the federal government.

In a Congressional hearing last week, FBI Director James Comey expressed that encryption is a tremendous challenge for law enforcement officials, given that a recovered device can’t be opened even when a judge rules probable cause.

In Tuesday’s court proceeding, where Apple was not allowed to participate, federal prosecutors said they didn’t have Farook’s work phone password, and work phones typically belong to an employer. In this case, the employer also cannot unlock the phone, so they’ve asked the judge to force Apple to do so and although Judge Pym agreed, Apple says they’ll fight the order.

So why is Apple fighting back?

Since 2014, iPhones have been encrypted by default so that contents can only be accessed by someone with the password, and too many attempts to crack the password automatically erases the device’s data. Before 2014, Apple could simply plug an iPhone into their extraction tool and offer data in response to warrant requests.

Because of the newer encryption (which Comey indicates is a road block to investigators), the courts are now requiring Apple supply a specialized software that the FBI can load on to an iPhone to bypass security, which Cook calls a “backdoor.”

Apple is fighting back because of the slippery slope. Cook said, “the government may argue that its use would be limited to this case, there is no way to guarantee such control.”

“The implications of the government’s demands are chilling,” Cook says, calling for a national discussion on the topic. “The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.”

Some ask what can’t already be retrieved by third party companies like Google or Facebook, but the investigators may be after clues like location data or photos that exist only on the device. Part of what investigators are stuck on is the missing 18 minutes wherein the suspects escaped law enforcement eyes.

With voices like Edward Snowden and Donald Trump weighing in with their opinions, Cook’s wish for a conversation is coming true, but will it be enough for people to understand the true risks and rewards of the court’s ruling?

#FBIversusApple

Lani is the Chief Operating Officer at The American Genius - she has co-authored a book, co-founded BASHH and Austin Digital Jobs, and is a seasoned business writer and editorialist with a penchant for the irreverent.

Tech News

Want to save snippets of a Zoom meeting? Listener makes it possible!

(TECHNOLOGY) Listener lets you screenshot or bookmark important sections of live meetings, as well as curate a playlist of snippets, to share or playback.

Published

on

Listener for Zoom tool landing page on laptop.

We live in a very computer-mediated world where the bulk of communication is done virtually. Many of us spend a great deal of time – whether for work or pleasure – on video calls connecting with people that we’re unable to meet with in person.

Zoom became the unofficial mascot for the pandemic and has shown no signs of going anywhere. So naturally, people are looking for ways to put this to even more of an advantage – like by creating messaging extensions to utilize in lieu of live meetings.

Now the folks behind Listener are getting in on the action by creating Listener for Zoom.

The new tool allows users to bookmark important moments of Zoom calls in real-time and easily turn long recordings into bite-sized video clips.

As founder Nishith Shah puts it, “Zoom meetings just got more productive!”

Listener allows users to do a myriad of things, including live bookmarking to create short video clips; ability to transcribe your entire meeting; edit video clips by using transcripts instead of struggling with video editing tools; share video highlights with your team; create playlists from video highlights across different Zoom meetings to tell powerful stories; use projects to organize your meetings and playlists.

Founders say that Listener is designed for pretty much anyone who uses Zoom. In early testing, the founders found that it is especially helpful for product managers and UX researchers who do customer interviews.

They also reported that early-stage founders have been using Listener to add powerful customer videos to their investor pitch decks. It is also helpful for recruiters and hiring managers who search transcripts across hundreds of hiring interviews to remember who said what and to pass on important clips to other people in the interview process.

The tool is also beneficial for teams and hiring, as customer success and sales teams create a knowledge base with Listener to train and onboard new employees. They also use it to pass on customer feedback to the product teams.

This could also be great for clipping video elements that are appropriate for social media use.

On January 11, 2022, Listener was awarded #3 Product of the Day on Product Hunt.

Listener for Zoom is free while in Beta. The tool works only with licensed (paid) Zoom accounts.

Continue Reading

Opinion Editorials

Job listings are popping up left and right, so what exactly *is* UX writing?

(EDITORIAL) While UX writing is not technically new, it is seemingly becoming more and more prevalent. The job titles are everywhere, so what is it?

Published

on

UX writing

The work of a UX writer is something you come across every day. Whether you’re hailing an Uber or browsing Spotify for that one Drake song, your overall user experience is affected by the words you read at each touchpoint.

A UX writer facilitates a smooth interaction between user and product at each of these touchpoints through carefully chosen words.

Some of the most common touchpoints these writers work on are interface copy, emails, and notifications. It doesn’t sound like the most thrilling stuff, but imagine using your favorite apps without all the thoughtful confirmation messages we take for granted. Take Eat24’s food delivery app, instead of a boring loading visual, users get a witty message like “smoking salmon” or “slurping noodles.”

Eat24’s app has UX writing that works because it’s engaging.

Xfinity’s mobile app provides a pleasant user experience by being intuitive. Shows that are available on your phone are clearly labeled under “Available Out of Home.” I’m bummed that Law & Order: SVU isn’t available, but thanks to thoughtful UX writing at least I knew that sad fact ahead of time.

Regardless of where you find these writer’s work, there are three traits an effective UX writer must-have. Excellent communication skills are a must. The ability to empathize with the user is on almost every job post. But from my own experience working with UX teams, I’d argue for the ability to advocate as the most important skill.

UX writers may have a very specialized mission, but they typically work within a greater user experience design team. In larger companies, some UX writers even work with a smaller team of fellow writers. Decisions aren’t made in isolation. You can be the wittiest writer, with a design decision based on obsessive user research, but if you can’t advocate for those decisions then what’s the point?

I mentioned several soft skills, but that doesn’t mean aspiring UX writers can’t benefit from developing a few specific tech skills. While the field doesn’t require a background in web development, UX writers often collaborate with engineering teams. Learning some basic web development principles such as responsive design can help writers create a better user experience across all devices. In a world of rapid prototyping, I’d also suggest learning a few prototyping apps. Several are free to try and super intuitive.

Now that the UX in front of the writer no longer intimidates you, go check out ADJ, The American Genius’ Facebook Group for Austin digital job seekers and employers. User-centric design isn’t going anywhere and with everyone getting into the automation game, you can expect even more opportunities in UX writing.

Continue Reading

Tech News

How Apple is trying to combat the AirTag backlash (hint – its not working)

(TECHNOLOGY) Apple’s weak-kneed attempts at fixing their AirTags issues aren’t working. They can be placed on anything (or anyone), and it is detrimental.

Published

on

Apple airtag being held between two fingers.

A few weeks ago, I wrote up an article on how the Apple AirTag can be used to stalk and track people, and now it’s happening. Unfortunately, not all stalkers have the same glamour as Joe from the hit series You.

Engadget reported that model, Brooks Nader, says someone used an AirTag to track her. Per her account, she didn’t receive the notification until she was walking home, alone, at night. If that’s not scary enough, now imagine she was an android user. The only way for her to know someone was tracking her would be if she had installed the Tracker Detect app.

As stated by TechCrunch, “Apple has made its own post-launch efforts to tighten up how AirTags that don’t belong to a certain user can be detected, but these notifications have proven buggy and have often waited far too long to alert users. Add in the fact that Apple has seemed to treat Android integration as an afterthought, not a necessary partnership in order to ship a device like this, and Apple’s incompetence looks a bit more severe.”

The app itself, which was released on December 11, 2021, is getting a lot of negative feedback. One issue is that to see if you’re being tracked you have to manually scan to find the AirTag. How often and when you do that is up to the user. Whereas with the Apple Find My app, it alerts you automatically without the user having to scan anything. It’s not perfect, however. It’s buggy and can take hours to notify the user that an AirTag is tracking them. However, it’s still better than the android app.

Another dreadful scenario that hasn’t been factored in this equation is children. Not all kids have devices, much less Apple devices, nor should they necessarily, but if someone was going to track them, they would be easy targets.

Apple, for the love of all that’s decent, pull AirTags and reconsider how they function. Examine the ways an AirTag could be used without using the mesh network of all iPhone users so that it doesn’t continue to emit a location or, I don’t know, give up. If it doesn’t mean anything to you to risk other’s lives with this product then consider the possible dangerous consequences as a reflection on Apple.

Contrary to popular belief, not all publicity is good publicity.

Continue Reading
Advertisement

Our Great Partners

The
American Genius
news neatly in your inbox

Subscribe to our mailing list for news sent straight to your email inbox.

Emerging Stories

Get The American Genius
neatly in your inbox

Subscribe to get business and tech updates, breaking stories, and more!