02-18-2016, 02:33 PM
(02-18-2016, 02:27 PM)fredtoast Wrote: AU made a good comparison. When a company sells someone a safe the person who purchases it sets the combination so that even the company that made the safe can not get into it.
But a safe is different because if the government gets a safe that belonged to a terrorist they can cut the door off.
I guess my confusion was that they were trying to see who they (she) were communicating with, that's why I said someone should be able to decrypt. I can see the differences if they are just looking for data stored on a device. I still think Apple has the tools required, but that's just an ignorant assumption.
Secondly, thanks to all about the lesson(s); I truly learned something today. Chalk that up to one more thing I am now an expert on. I think I am down now to only 2 or 3 things.
![[Image: bfine-guns2.png]](https://i.ibb.co/YBkDQJV/bfine-guns2.png)
![[Image: 4CV0TeR.png]](https://i.imgur.com/4CV0TeR.png)