{"id":21375,"date":"2016-03-23T20:47:00","date_gmt":"2016-03-24T01:47:00","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=21375"},"modified":"2016-03-23T20:47:00","modified_gmt":"2016-03-24T01:47:00","slug":"nytimes-apple-policy-on-bugs-may-explain-why-hackers-would-help-f-b-i","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=21375","title":{"rendered":"NYTimes: Apple Policy on Bugs May Explain Why Hackers Would Help F.B.I."},"content":{"rendered":"<p>NYTimes: Apple Policy on Bugs May Explain Why Hackers Would Help F.B.I. by Nicole Perlroth and Katie Benner: <\/p>\n<blockquote><p>For all the steps Apple has taken to encrypt customers\u2019 communications and its rhetoric around customer privacy, security experts said the company was still doing less than many competitors to seal up its systems from hackers. And when hackers do find flaws in Apple\u2019s code, they have little incentive to turn them over to the company for fixing.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>NYTimes: Apple Policy on Bugs May Explain Why Hackers Would Help F.B.I. by Nicole Perlroth and Katie Benner: For all the steps Apple has taken to encrypt customers\u2019 communications and its rhetoric around customer privacy, security experts said the company &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=21375\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-21375","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21375"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21375\/revisions"}],"predecessor-version":[{"id":21376,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21375\/revisions\/21376"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}