Need Help? Email me at cdodge@seq.org with any questions or problems that you have.
6.9 Impacts of CS: Cryptography and the Government
Copy the following questions into a Google doc:
1. What types of security protections do cell phones have?
2.
Do most people you know use a password on their phones?
3.
In what instances might the government want information from an individual’s cell phone?
4.
Do you view privacy as an individual right?
Watch the following newscast - Apple vs FBI
5. Whose phone is the FBI trying to unlock?
6. Why have they been unsuccessful so far?
7. What is Apple’s response to the court order to unlock the phone?
8. What is a “backdoor” to a phone?
9. Apple stepped up it’s protection of phone data in response to what revelation?
10. What feature of the iPhone is the government worried about with regards to the attackers phone?
11. Do you think Apple should abide by the Court’s decision and unlock the mobile phone in the San Bernardino case? Explain.
Submit your answers to Canvas - 6.9 Cryptography and the Government Questions
If you did not complete 6.8 Debuging the Ceasar Cipher App - do so now and submit the questions and a screen shot of the blue dot to canvas.
Begin 6.10 Wrap Up - take a screen shot of your code for steps 1-2 and submit to canvas.