SAN FRANCISCO (Reuters) – On Wednesday, Apple Inc. announced that they will change iPhone settings to go beyond the most popular means for law enforcement to break into the devices. The company also announced that its main focus is to protect all its customers, especially in countries where phones are readily obtained by police or by criminals with extensive resources, and to head off further spread of the attack technique.
The privacy standard-bearer of the tech industry reported that it will change some of the default settings in the iPhone operating system to neglect the communication through the USB port when the phone has been theft or not have been unlocked in the past hour.
Apple representatives added that the changes in settings would protect customers in countries where law enforcement seizes and tries to crack phones with fewer legal restrictions than under U.S. law. As because all the criminals, spies and unscrupulous people often use the same type of the techniques to crack the phones.
In a statement Apple said, “We’re constantly strengthening the security protections in every Apple product to help customers defend against hackers, identity thieves and intrusions into their personal data”.it also added, “We have the greatest respect for law enforcement, and we don’t design our security improvements to frustrate their efforts to do their jobs.”
Apple had started working on the USB issue before having the knowledge of the law enforcement. Apple also added that after they had learned of the techniques, they also reviewed the iPhone operating system code and also improved its security.
With the help of all these modifications, police or hackers would typically, within an hour or less acquire the current location of a phone with the cracking machine and could cut access by as much as 90%, The modification done to the iPhone could also draw criticism from U.S. law enforcement officials, who have been engaged in an on-again, off-again campaign for legislation or other ways to force technology companies to maintain access to users’ communications.