Why the Apple iPhone decryption demands are rotten to the core

The last line of defence may be our portable devices, where access can be secured through passwords, data can be encrypted from prying eyes, and security settings can thwart would-be hackers.

By MICHAEL GEIST

PUBLISHED : Monday, Feb. 29, 2016 12:00 AM

If you are already a subscriber


Subscribe to The Hill Times

Subscribe to the print and electronic editions and get instant access to The Hill Times online.


Quick Purchase

Purchase this week's edition of The Hill Times in electronic format (PDF) for $5.00.


Quick Purchase

Purchase Story Issue in electronic format (PDF) for $5.00.