The Guardian is reporting that...
On Wednesday, the FBI confirmed it wouldn't tell Apple about the security flaw it exploited to break inside the iPhone 5C of San Bernardino gunman Syed Farook in part, because the bureau says it didn't buy the rights to the technical details of the hacking tool.
"Currently we do not have enough technical information about any vulnerability that would permit any meaningful review," said Amy Hess, the FBI's executive assistant director for science and technology.
$1.3m and no source code?
(Score: 2) by maxwell demon on Friday April 29 2016, @07:47PM
They got the data?
I don't know how decoding mp3s works. And yet I can usually tell whether a program decoded an mp3 correctly.
The Tao of math: The numbers you can count are not the real numbers.
(Score: 2) by urza9814 on Friday April 29 2016, @08:41PM
They got *some* data. If they don't know how it works, they have no way to be certain that data wasn't completely fabricated. If you decode an MP3 and you get white noise, but you don't know what the MP3 was supposed to contain, is it decoded wrong or is it just a recording of white noise?
(Score: 2) by KiloByte on Friday April 29 2016, @09:42PM
They already had that data before -- the phone was unlocked when the FBI got it. It was only them carelessly (or perhaps even purposefully) messing with it that caused it to lock.
The whole "locked phone" brouchacha was carefully tailored to produce a "werewolf case" -- it's hard to find a case with more public support than investigating a terrorist.
Ceterum censeo systemd esse delendam.