Skip to main content

Apple to rehire security expert in wake of showdown with FBI

Apple has rehired Jon Callas, co-founder of Silent Circle, the company behind the Blackphone.

Silent Circle is a security company that offers encrypted software services, as well as secure devices like the Blackphone and the Blackphone 2. Before co-founding Silent Circle, as well as Pretty Good Privacy, Callas worked at Apple in the 1990s, then returned between 2009 and 2011 to design an encryption system for data protection on Macs, according to Reuters.

Recommended Videos

Rehiring Callas wouldn’t seem like too much of a big deal if it didn’t happen in the backdrop of a massive encryption fight between Apple and the U.S. Department of Justice.

It all began after the San Bernardino, California, shooting, which left 14 people dead. One of the shooters left behind a locked iPhone, and while Apple cooperated with authorities at first, it refused to comply with a court order that demanded it to create a tool to weaken the encryption on the iPhone.

Apple feared such a tool could be replicated and would allow for backdoor access into all iPhones — thereby threatening the security and privacy of its customers. The tech community, privacy advocates, and human rights groups agreed.

The FBI dropped the case a mere day before the court date, as it managed to gain access into the phone after paying professional “gray hat” hackers. It dropped a second case a few weeks later over a locked iPhone in New York.

Apple, Google and other companies have repeatedly faced requests and orders from the government demanding access into these devices. These companies have complied in the past, but ever since the National Security Agency leaks by Edward Snowden in 2013, there has been an increased resistance in giving consumer data away.

Apple said it would make iOS and its upcoming devices even more secure, hoping to keep out not only the government, but also cyber criminals. The company’s rehiring of Callas may be aimed at making that happen.

Julian Chokkattu
Former Mobile and Wearables Editor
Julian is the mobile and wearables editor at Digital Trends, covering smartphones, fitness trackers, smartwatches, and more…
The M1 has a major security loophole that Apple can’t patch
Apple M1 processor on a mainboard.

Researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) have discovered a new security vulnerability that targets Apple's popular M1 processor. The attack, dubbed PACMAN, is capable of bypassing the last line of defense against software bugs on the M1 and potentially other ARM-based processors.

PACMAN attacks pointer authentication, which is the final stop for most software vulnerabilities. Pointer authentication confirms that a program hasn't been changed in any malicious way, serving as a "safety net ... in the worst case scenario," as MIT PhD student Joseph Ravichandran put it. MIT's researchers developed PACMAN as a way to guess the pointer authentication signature, bypassing this critical security mechanism. Researchers say PACMAN exploits a hardware mechanism, so a software patch won't be able to fix it.

Read more
Samsung Expert RAW vs. Apple ProRAW
Taking photos of false hellebore flowers using the Samsung Galaxy S22 Ultra and the Expert RAW app.

As a photographer who owns plenty of high-end camera gear, from pro-grade cameras to drones, a surprising number of my photos are captured using my phone. Most people these days snap pictures using the cameras integrated into their phones, and the quality of these cameras has increased by leaps and bounds. Now, the latest and greatest smartphones include the kind of features that not only appeal to amateur photographers, but to professionals as well.

Among these features are Apple ProRAW and Samsung's Expert RAW, which allow you to capture and edit photos with a significantly higher degree of control over the process. Unlike a DSLR or mirrorless camera, these camera apps shoot using multi-frame RAW, in which multiple images are captured and combined together to give you an image more akin to what you would capture in a single RAW photo with a dedicated camera.

Read more
How Apple’s tight ecosystem of products can undermine its own security
Person accessing a state ID using their Apple Watch.

There’s an old belief that you can’t have both security and convenience, and that’s seen as especially true in your digital life. I’m sure Apple would dispute that assertion, pointing to things like Face ID as evidence it can do both.

Yet, as we've seen in recent months, there are actually times when Apple’s ecosystem, so tightly linked across its platforms, can actually undermine its own security. If your dwelling only has one locked door, it only takes one key to have access to the whole house.
Face ID, the iPhone, and the Apple Watch

Read more