Apple and Google replied, in essence, that they could not [access the phones] — because they did not know the user’s passcode. (...United Way Update...) There is no evidence that it would address institutional data breaches
In words of one syllable (well, I can't do anything about the fact that "Apple" and "Google" are two syllables, so the authors of the article will just have to pop an aspirin and such it up): The whole point is to stop that kind of data leak -- if Apple and Google don't have it, a bad guy can't steal it from them.
Safes can be accessed with a warrant only because it is beyond our ability to make an uncrackable safe.
That's not really a significant difference, since is is within our ability to make safes that are effectively impossible to crack without destroying the contents, which is equivalent from the point of view of government agents seeking information.
Another approach would be breakable encryption with an auditable trail such that anyone who breaks an individual's encryption would have to defend such actions in court.
Voo-doo magic does not count as "another approach". (I am using the term in its precise technical sense. Unless the Feds' actions in breaking one copy of the file somehow produce observable effects upon the owner's copy of the same file (i.e. voo-doo magic), there is no way to "audit" their behind-the-scenes actions.)
In 2013, Reuters reported that documents released by Edward Snowden indicated that the NSA had paid RSA Security $10 million to make Dual_EC_DRBG the default in their encryption software, and raised further concerns that the algorithm might contain a backdoor for the NSA.
Here's the outcome of
They are just making this hubub to throw people off. They have key loggers and ways to view your screens that can not be detected with normal means. Using some other form of network that is hard to spot. Don your tin foil hats cause they can read brain waves too. Who really knows? With all the things I have read on USB and viruses being able to bridge air gaps; I don't know, it could very well be as advanced as I am making fun of. Mosquito sized drones and all.
That's true, and it shows that the ONOZ OMG TERRAISTS!!1! rhetoric is a pack of lies. You've listed (setting aside the facetious "tin foil hats" part) some techniques available to the government for monitoring legitimate targets of suspicion. However, it wants to snoop on everybody, and those techniques don't scale large enough to make that possible.
The point here is that the backdoor could be a second key instead of a way to break your key. Assuming that second key is also resistant to breaking then you haven't introduced any vulnerabilities to an outsider--assuming that the second key is kept secure. And that, it must be admitted, is a pretty damn big if.
That makes it an exercise in futility, easily defeated by hacking the system to substitute some other second key (which could be random gibberish, since it's not actually used, just put in to defeat the backdoor).
any reference to evolution will also be forbidden
Who knew that the Islamic State was run by the GOP?
All power corrupts, but we need electricity.