Agreed, it doesn't exist because it's Pandora's Box. For me, personally, if you are asking me to open Pandora's Box, it better be thought out and applied back to us. So they develop the ability to hack into the locked and encrypted phone. Now, tell me what the consequences are when the good guys phones and in the hands of the enemy with the same technology? If you can't accept that as being okay, then you have to walk away from the premise. You can't have it both ways. It's tragic that that data can't be easily gotten to. However, it would be far more tragic to have the good guys data gotten to. Imagine some network with the ability to have data from 1000's of our good guys fighting them. Talk about putting lives at risk? You'd be doing that at a scale that is unimaginable, all to get into 1 single phone. This dirtbag wasn't the leader of a terrorist network, he was a follower, a nobody. With phone records available, they already know every single person he ever called, so they already know his "network" of friends. I just don't believe there could ever be enough data on that phone to warranty the potential damage it would do on the opposite side.
If people believe that it's so easy for Apple to do, then why don't some of the FBI tech gurus develop it and get in without Apple's help? Either it's really that hard, or all the tech geeks we have working at the FBI aren't that good at their jobs of cracking things. My guess is that it's really that hard.
Lasers : Trotec Speedy 300 75W, Trotec Speedy 300 80W, Galvo Fiber Laser 20W
Printers : Mimaki UJF-6042 UV Flatbed Printer , HP Designjet L26500 61" Wide Format Latex Printer, Summa S140-T 48" Vinyl Plotter
Router : ShopBot 48" x 96" CNC Router Rotary Engravers : (2) Xenetech XOT 16 x 25 Rotary Engravers
Real name Steve but that name was taken on the forum. Used Middle name. Call me Steve or Scott, doesn't matter.