{"id":21684,"date":"2016-04-14T12:06:48","date_gmt":"2016-04-14T17:06:48","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=21684"},"modified":"2016-04-14T12:06:48","modified_gmt":"2016-04-14T17:06:48","slug":"nytimes-f-b-i-used-hacking-software-decade-before-iphone-fight","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=21684","title":{"rendered":"NYTimes: F.B.I. Used Hacking Software Decade Before iPhone Fight"},"content":{"rendered":"<p>NYTimes: <a href=\"http:\/\/www.nytimes.com\/2016\/04\/14\/technology\/fbi-tried-to-defeat-encryption-10-years-ago-files-show.html?ref=todayspaper&#038;_r=0\">F.B.I. Used Hacking Software Decade Before iPhone Fight<\/a> by Matt Apuzzo:<\/p>\n<blockquote><p>They persuaded a judge to let them remotely, and secretly, install software on the group\u2019s computers to help get around the encryption. That effort, revealed in newly declassified and released records, shows in new detail how F.B.I. hackers worked to defeat encryption more than a decade before the agency\u2019s recent fight with Apple over access to a locked iPhone.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>NYTimes: F.B.I. Used Hacking Software Decade Before iPhone Fight by Matt Apuzzo: They persuaded a judge to let them remotely, and secretly, install software on the group\u2019s computers to help get around the encryption. That effort, revealed in newly declassified &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=21684\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-21684","post","type-post","status-publish","format-standard","hentry","category-cell-phones"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21684"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21684\/revisions"}],"predecessor-version":[{"id":21685,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/21684\/revisions\/21685"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}