And what do you do when whoever is being prosecuted based on the information in the phone claims “Apple made it up” or that “the decryption tool compromised authenticity of the original information”? Also who’s paying to make this software?
And what do you do when whoever is being prosecuted based on the information in the phone claims “Apple made it up” or that “the decryption tool compromised authenticity of the original information”? Also who’s paying to make this software?