If NSA has a way to break into a device without violating any parties’ rights, they would do so.
Even if NSA wrote the code you might argue the [Apple just has to sign it] step violates Apple’s rights.
If NSA has a way to break into a device without violating any parties’ rights, they would do so.
Even if NSA wrote the code you might argue the [Apple just has to sign it] step violates Apple’s rights.