Despite recent complaints about iOS security, it’s effective against at least one group: law enforcement. According to Declan McCullagh at CNET, police departments around the country are sufficiently stymied by iOS device encryption that they’re turning to Apple for help. They’ve flooded Apple with so many requests for assistance decrypting confiscated iPhones that Apple is putting them on a waiting list of up to 4 months. Of course, the flip side of this story is the suggestion that Apple has a backdoor method of cracking iPhone encryption. follow link
Viewing Wi-Fi Details in Snow Leopard
In Snow Leopard, hold down the Option key before clicking the AirPort menu. Doing so reveals additional technical details including which standards, speeds, and frequencies you're using to connect, as well as what's in use by other networks. With the Option key held down and with a network already joined, the AirPort menu reveals seven pieces of information: the PHY Mode, the MAC (Media Access Control) address, the channel and band in use, the security method that's in use, the RSSI (Received Signal Strength Indication) measurement, the transmit rate, and the MCS Index. In Leopard, some, but not all, of these details are revealed by Option-clicking the AirPort menu.
- ExtraBITS for 13 May 2013 (13 May 13)
Apple’s iOS Encryption Baffles Police
It is logical, in our current 'world', that consumer devices (if not all) that interface with national, and international communications, are allowed, because they meet non-public (secret) demands for access (backdoors). To believe otherwise is unrealistic.
Why would the PRC, or your choice of nation-state, allow it's population to use cellphones?