Apple vs FBI, GovtOS Helps to Break into Suspect iPhone

AppleGovtOS” custom operating system, which helps FBI to break into iPhone 5c which belongs to Shooter Suspect case is very persistence to Apple, FBI requesting Apple to break into Suspect iPhone but Apple care for their customers Digital Privacy. Therefore, the company had said it would create a custom operating system in order to help break into iPhone as a request by FBI.

On Thursday, Apple filed its formal legal response to the standoff between it and the Department of Justice.

Why “GovtOS“?

You might having several question why Apple creating “GovOS” first they wanted to distract several employees from their primary responsibilities stays up to four weeks.

According to TheVerge:

“Although it is difficult to estimate, because it has never been done before, the design, creation, validation, and deployment of the software likely would necessitate six to ten Apple engineers and employees dedicating a very substantial portion of their time for a minimum of two weeks, and likely as many as four weeks,”

GovtOS” never existed before, Apple including their operating system core engineers to manage and write new operating system that never existed before, later designing new OS they will implement it by creating new installable image from suspect’s iPhone to new “GovtOS” which, crucially, would have to be signed with Apple’s proprietary cryptographic key.

After completing everything, And working on “GovtOS” Apple will require a day to deploy their OS in its own “secure, isolated” physical facility where FBI can test their brute force system without interfering with the investigation or disrupting Apple’s operations.

There are at least 13 more Apple devices which is currently subject to court by FBI. The danger to Apple’s resources lie beyond one iPhone, where Apple has insisted losing this case would only be the start of routine requests from law enforcement, for example, it would then have to replicate the above process three times a week, every week. ” Each such commissioned operating system will need to be tailored to the specific combination of hardware and operating system running on the relevant device,”


Noor Qureshi

Experienced Founder with a demonstrated history of working in the computer software industry. Skilled in Network Security and Information Security.

Related Articles

Back to top button