{"id":21875,"date":"2016-04-26T10:41:06","date_gmt":"2016-04-26T15:41:06","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=21875"},"modified":"2016-04-26T10:41:06","modified_gmt":"2016-04-26T15:41:06","slug":"nylj-passcodes-privacy-and-public-safety-apple-vs-doj","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=21875","title":{"rendered":"NYLJ: Passcodes, Privacy and Public Safety: Apple vs. DOJ"},"content":{"rendered":"<p>NYLJ: <a href=\"http:\/\/www.newyorklawjournal.com\/id=1202755807704\/Passcodes-Privacy-and-Public-Safety-Apple-vs-DOJ?slreturn=20160326114029\">Passcodes, Privacy and Public Safety: Apple vs. DOJ<\/a> by Peter Crusco:<\/p>\n<blockquote><p>Revelations that the Department of Justice (DOJ) in mid-March with the help of an undisclosed tech company discovered an access vulnerability and new method to unlock the Apple iPhone 5C used by one of the San Bernardino terrorists only delays the day of reckoning with respect to the significant security and privacy issues raised by the Apple litigation.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>NYLJ: Passcodes, Privacy and Public Safety: Apple vs. DOJ by Peter Crusco: Revelations that the Department of Justice (DOJ) in mid-March with the help of an undisclosed tech company discovered an access vulnerability and new method to unlock the Apple &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=21875\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-21875","post","type-post","status-publish","format-standard","hentry","category-cell-phones"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21875"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21875\/revisions"}],"predecessor-version":[{"id":21876,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21875\/revisions\/21876"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21875"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}