Horseclinton.
Every once in a while, we read about lots of “important” people getting their phones hacked and their personal photos are plastered all over.
It can obviously be done, with or without Apple’s assistance.
This is all a smokescreen to protect Hussein’s terrorist BFFs.
You are assuming they use strong encryption, and don't disable the security by using a simple password or completely turning encryption off. I don't think most famous people are that smart about their electronic security.
Apple turned them down, so the Fraud can say, “Sorry, we ‘tried’”, and half of American voters and seemingly not a few freepers will be satisfied, if not happy.
“Every once in a while, we read about lots of âimportantâ people getting their phones hacked and their personal photos are plastered all over.
It can obviously be done, with or without Appleâs assistance.
This is all a smokescreen to protect Husseinâs terrorist BFFs.”
I’m sorry, obviously you don’t have the technical background to discuss this. This article should clue you in a bit:
http://www.reuters.com/article/us-apple-court-encryption-idUSKCN0SE2NF20151021
(As to the “high profile hacks”, those used an entirely different mechanism - the perps got the user’s passwords.)
Oh, I'm sure the NSA has the ability to get the data. But having the NSA do it would expose capabilities that the government doesn't want exposed, and make those capabilities and techniques subject to discovery motions by terrorist defense lawyers.