4.8 • 45 Ratings
🗓️ 24 March 2016
⏱️ 27 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Welcome to the Tech Policy Podcast. I'm Evan Swartzchstraber, your host. On today's show, Apple's fight with the FBI in California is on hold. This week, the San Bernardino Magistrate was supposed to hold a hearing, and a day before the hearing, the FBI postponed the |
| 0:22.5 | hearing because the Bureau said it had found a way into the phone that had caused so much |
| 0:28.3 | controversy and really sparked a global debate about digital security. Joining me to discuss |
| 0:34.2 | this is someone who is not secure in any way. |
| 0:37.9 | Baron, Soka. |
| 0:38.4 | Baron, thank you for joining me. |
| 0:40.3 | Oh, I forgot to add, you're also president of Tech Freedom. |
| 0:42.9 | Well, you know, that's where that meanness comes from, Evan. |
| 0:45.0 | It's deep-seated insecurity. |
| 0:49.2 | So, Baron, clearly people were really excited about this hearing. |
| 0:53.4 | I mean, this is an intense debate and the FBI |
| 0:56.1 | kind of just threw a wrench into the whole thing. And after they had previously said that they had |
| 1:01.6 | exhausted all options, they are now saying they have a method. And just to bring listeners up to speed, |
| 1:07.5 | what initially started the Apple's fight with the FBI and the DOJ and the |
| 1:11.5 | president and the court in San Bernardino is one of the San Bernardino attackers, Syed Farouk, |
| 1:18.4 | his phone has a security feature. It's a passcode. And if you guess the wrong passcode, |
| 1:24.9 | 10 times the phone wipes itself, which would then deny the FBI any potential data on the phone. |
| 1:30.6 | They asked, a court mandated that Apple write proprietary software to remove the 10 times limit so that the FBI could hook up a supercomputer and guess as many passwords as it wants. |
| 1:42.9 | Apple reviews. |
| 1:43.7 | Basically stop the phone from deleting its content. |
| 1:46.0 | Right. The self-destruct feature. |
| 1:47.5 | So this is not the same as necessarily the broader encryption debate. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from TechFreedom, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of TechFreedom and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.