Craig Federighi on Renewed Government Push for Backdoor Device Access: 'Weakening Security Makes No Sense'

Law enforcement officials are revisiting proposals that would require tech companies to build backdoor access into electronic devices to allow for better access to data in criminal investigations, reports The New York Times.

This is an issue that was heavily debated following the 2016 legal dispute between Apple and the FBI over the iPhone 5c that belonged to San Bernardino shooter Syed Farook. The government wanted Apple to create software that would allow them to access data on the device, which Apple refused to do.

applefbi
In response to rumors over renewed efforts to build such a tool, Apple software engineering chief Craig Federighi told The New York Times that weakening security protections in iOS devices would be a grave mistake, maintaining Apple's stance on the issue.

"Proposals that involve giving the keys to customers' device data to anyone but the customer inject new and dangerous weaknesses into product security," he said in a statement. "Weakening security makes no sense when you consider that customers rely on our products to keep their personal information safe, run their businesses or even manage vital infrastructure like power grids and transportation systems."

Apple has continually argued for the need for improvements to device security to stay ahead of hackers and other bad actors who exploit security vulnerabilities in iOS devices. During the dispute over the San Bernardino device, Apple refused to build a backdoor tool into its devices and argued that if such a tool existed, it could easily end up in non-government hands.

Federighi has previously spoken passionately on the issue, and in early 2016, he published an op-ed in The Washington Post using the same argument he reiterated in his statement to The New York Times. iOS devices, he said, are "part of the security perimeter that protects your family and co-workers." From Federighi in 2016:

To get around Apple's safeguards, the FBI wants us to create a backdoor in the form of special software that bypasses passcode protections, intentionally creating a vulnerability that would let the government force its way into an iPhone. Once created, this software -- which law enforcement has conceded it wants to apply to many iPhones -- would become a weakness that hackers and criminals could use to wreak havoc on the privacy and personal safety of us all.

According to The New York Times, FBI and DOJ officials have been "quietly" meeting with security researchers to work on approaches that would provide "extraordinary access" to encrypted devices like the iPhone. Based on this research, DOJ officials "are convinced" there's a way to create a backdoor to access data without weakening a device's defense against hacking.

One method under discussion involves a special access key that would be generated when a device encrypts itself, allowing data to be unlocked without a user's passcode. The key would be stored on the device itself, in a part of the hard drive that would be encrypted separately. Only the device manufacturer, with a court order, would be able to access it.

Susan Landau, a computer security professor at Tufts University, told The New York Times that this would create "significant additional security risks" given that "so many more tech companies" would need to access these keys to comply with the inevitable flood of law enforcement access requests.

Talks inside the executive branch have reportedly been renewed over whether to ask Congress to enact legislation that would require tech companies to create a new access mechanisms for law enforcement officials. The talks are said to be in a preliminary stage with no imminent request for legislation ready at this time.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Popular Stories

m5 macbook pro deal

Why You Shouldn't Buy the Next MacBook Pro

Tuesday February 10, 2026 4:27 pm PST by
Apple is planning to launch new MacBook Pro models as soon as early March, but if you can, this is one generation you should skip because there's something much better in the works. We're waiting on 14-inch and 16-inch MacBook Pro models with M5 Pro and M5 Max chips, with few changes other than the processor upgrade. There won't be any tweaks to the design or the display, but later this...
iOS 26

Apple Releases iOS 26.3 and iPadOS 26.3

Wednesday February 11, 2026 10:07 am PST by
Apple today released iOS 26.3 and iPadOS 26.3, the latest updates to the iOS 26 and iPadOS 26 operating systems that came out in September. The new software comes almost two months after Apple released iOS 26.2 and iPadOS 26.2. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. According to Apple's release notes, ...
Apple Logo Zoomed

Apple Expected to Launch These 10+ Products Over the Coming Months

Tuesday February 10, 2026 6:33 am PST by
It has been a slow start to 2026 for Apple product launches, with only a new AirTag and a special Apple Watch band released so far. We are still waiting for MacBook Pro models with M5 Pro and M5 Max chips, the iPhone 17e, a lower-cost MacBook with an iPhone chip, long-rumored updates to the Apple TV and HomePod mini, and much more. Apple is expected to release/update the following products...
iPhone 16e Bottom Crop

Apple Reportedly Unveiling a New iPhone Next Week

Tuesday February 10, 2026 1:51 pm PST by
Apple plans to announce the iPhone 17e on Thursday, February 19, according to Macwelt, the German equivalent of Macworld. The report said the iPhone 17e will be announced in a press release on the Apple Newsroom website, so do not expect an event for this device specifically. The iPhone 17e will be a spec-bumped successor to the iPhone 16e. Rumors claim the device will have four key...
Apple Logo Black

Apple Acquires New Database App

Wednesday February 11, 2026 6:44 am PST by
Apple acquired Canadian graph database company Kuzu last year, it has emerged. The acquisition, spotted by AppleInsider, was completed in October 2025 for an undisclosed sum. The company's website was subsequently taken down and its Github repository was archived, as is commonplace for Apple acquisitions. Kuzu was "an embedded graph database built for query speed, scalability, and easy of ...

Top Rated Comments

103 months ago
A backdoor for the US becomes a backdoor for China and Russia in no time. No thanks
Score: 45 Votes (Like | Disagree)
deanthedev Avatar
103 months ago
I’m still amazed there are idiots out there that think they can keep a secret master key/backdoor...
.
.
.
.
.
a secret.
Score: 40 Votes (Like | Disagree)
iObama Avatar
103 months ago
This whole Facebook thing has me really 'doubling down,' to use Tim's phrase, on my privacy online. Am I willing to sacrifice ease of use for privacy? I was two weeks ago. Now? I'm not so sure.

Suffering through ProtonMail (it's good, but it's no Gmail), DuckDuckGo, Ghostery, and meticulously staying on top of which apps have permissions for what.
Score: 17 Votes (Like | Disagree)
103 months ago
No compromised encryption.
Score: 14 Votes (Like | Disagree)
justiny Avatar
103 months ago
Perhaps if lawmakers and government officials would stop being lazy and do their jobs, the need to hack into a mobile device after a tragedy/criminal act wouldn’t become the paramount necessity to conduct a proper investigation.

The level of incompetence is astounding; government information on all levels is leaked out on a daily basis, and they believe the public would trust them to hack into devices while respecting privacy responsibly? What about the devices belonging to victims and witnesses?

The precedence of this is terrifying. Not no, but hell no.
Score: 14 Votes (Like | Disagree)
ArtOfWarfare Avatar
103 months ago
Gun violence issue? Instead of addressing the question of why the person was able to get a gun in the first place, lets spin this as an issue about encryption and privacy.
Score: 11 Votes (Like | Disagree)