-
(单词翻译:双击或拖选)
Privacy and security
隐私与安全
Code to ruin?
解密手机?
The rights and wrongs of Apple's fight with the FBI苹果对抗FBI的对与错
CITIZENS have a right to both security and privacy. The difficulties arise when these two rights are in conflict, as they now are in the battle between the world's most valuable company and its most famous law-enforcement agency. Apple has refused to comply with a court order to help the FBI unlock an iPhone used by Syed Farook, one of the terrorists involved in the San Bernardino shootings in December. The company says the government's request fundamentally compromises the privacy of its users; the feds say that Apple's defiance1 jeopardises the safety of Americans (see article).
公民应该享有安全和隐私的权利。然而当两者冲突的时候,问题就来了:这就是目前的情形——世界上市值最高的公司站在了赫赫有名的执法机构的对立面。苹果拒绝执行一项帮助FBI解锁iPhone的法院判决,该手机是使用者名叫Syed Farook,是参与12月份圣贝纳迪诺枪击案的恐怖分子之一。公司表示政府命令从根本上违背了消费者隐私权,而联邦政府则声称,如果苹果对该项判决拒不执行会危害美国人民的安全,Some frame the stand-off in terms of the rule of law: Apple cannot pick and choose which rules it will obey, they say. That is both true and beside the point. The firm has the right to appeal against a court order; if it eventually loses the legal battle, it will have to comply. The real question is whether Apple's substantive2 arguments are right. That hinges on two issues.
一些人把这个僵局归因为法制:苹果不能选择性地遵守法律。这个观点没错但是并不切题。公司有权对于法院判决进行上诉,如果它在终审判决中败诉,就不得不遵守。真正的问题是,苹果这种实质性的争论是否正确。这取决于两点。
The first is whether the FBI's request sets a precedent3. The law-enforcers say not. This is not an attempt to build a generic4 flaw in Apple's encryption, through which government can walk as needed. It is a request to unlock a specific device, akin5 to wiretapping a single phone line. The phone belonged to a government department, not Farook. Apple and other tech firms regularly co-operate with the authorities on criminal cases; this is no different. Yet Apple is being asked to do something new: to write a piece of software that does not currently exist in order to sidestep an iPhone feature that erases6 data after ten unsuccessful password attempts. Later models of the iPhone than the one Farook used are harder to compromise in this way. But if the court's ruling is upheld, it signals that companies can be compelled by the state to write new operating instructions for their devices. That breaks new ground.
第一要看FBI的要求是否会开先例。执法机构认为不会,这并不会在苹果的加密系统中制造一个政府可以随意进出的普遍漏洞,他们只是要求解锁一个特定装置,这就相当于搭线窃听一个特定的电话一样。这部手机属于政府部门,而不再是Farook。苹果和其他科技公司经常会配合当局解决犯罪案件,这次也并无不同。然而这次执法机构要求苹果做的是一件前所未有的事情:写一个全新的程序去阻拦iPhone中“输错10次密码就会清除所有数据”的程序设定。在Farook手机之后生产的新型号iPhone较难用这种方法破解。但是,一旦此判决被执行,就表示政府可以强令公司改写其产品的运行指令。这会为后人打破先例。
The second issue is whether that precedent is justified7. And that entails8 a judgment9 on whether security would be enhanced or weakened by Apple's compliance10. In the short term, the answer is that security will be enhanced. Farook was a terrorist; his phone is the only one being unlocked; and the device might give up the identity of other malefactors. But in the longer term, things are much fuzzier.
第二要看先例是否公正。问题来了:苹果此番承诺后,安全性是增强还是减弱呢?短期而言,答案是安全性会被加强。Farook曾是个恐怖分子,他的手机是现在唯一正被解锁的,而且可能从这台设备中发现其他罪犯的身份。但长期而言,事态越来越扑朔迷离。
Security does not just mean protecting people from terrorism, but also warding11 off the threat of rogue12 espionage13 agencies, cybercriminals and enemy governments. If Apple writes a new piece of software that could circumvent14 its password systems on one phone, that software could fall into the hands of hackers15 and be modified to unlock other devices. If the capability16 to unlock iPhones exists, so will the temptation for the authorities to use it repeatedly. And if tech firms are forced to comply with this sort of request in America, it is harder for anyone to argue against similar demands from more repressive governments, such as China's. This newspaper has long argued against cryptographic backdoors and skeleton keys on these grounds. It is possible to imagine a scenario17 that might override18 such concerns: if information is needed to avert19 a specific and imminent20 threat to many lives, for example. But in this instance, Apple's case is the stronger.
安全性不仅意味着保护人们免受恐怖主义危害,还能规避流氓间谍机构、网络罪犯与敌军政府的威胁。如果苹果写了一个新的软件,能够规避一部手机的口令系统,那么软件就能落入黑客手中,被他修改并解锁其他设备。如果有能力解锁iPhones,那么当局也同样会反复使用此项技能。如果技术公司被迫同意美国这种请求的话,那么换作其他更具压迫性的政府,例如中国,他们若提出这般相似请求,会更难对抗。本报长期反对解密后门与基于此方面的万能钥匙。可以去想象一个这样的场景,或许能扫除这些担忧:需要获取数据信息来避免对许多人构成的一次特殊紧急威胁。但在这种情形下,苹果案例比较有说服力。
Core arguments
核心论证
This battle presages21 others. If the courts rule against Apple, it will work to make its devices so secure that they cannot be overridden22 by any updates. In that event (or, indeed, if the tech firm wins the Farook case), legislators will be tempted23 to mandate24 backdoor access via the statute25 book. If Tim Cook, Apple's boss, is not to hasten the outcome he wishes to avoid, he must lay out the safeguards that would have persuaded the firm to accede26 to the FBI's request. Tech firms are at the centre of a vital policy debate (see article). Apple has rejected the authorities' solution. Now it must propose its own.
这场对战还预示了其他方面。如果法庭判苹果败诉,它将会使它的设备安全到不会被任何更新软件推翻。倘或确实科技公司在Farook案例上获胜,执法人员将会选择通过成文法强制指令解密后门。如果苹果老板Tim Cook不打算加速实现他想规避的结果,那他必须安排好本可以说服公司同意FBI要求的安全措施。科技公司处于重要政策争论的中心。苹果已经拒绝官方的解决方式。现如今它必须提出自己的解决方式。
1.law enforcement 执法部门
例句:The SEC, however, functions as law enforcement.
SEC则发挥着执法机构的作用。
2.involve in 介入
例句:A late booking may involve you in extra cost.
预订晚了的话你可能要额外多花钱。
3.in terms of 依据
例句:This is an ecological27 approach, the occurrence of disease is examined in terms of the interrelationship between man and his total environment.
根据人群与其总环境的相互关系对疾病的发生进行调查。
4.attempt to 试图
他铤而走险,企图劫持一架飞机。
点击收听单词发音
1 defiance | |
n.挑战,挑衅,蔑视,违抗 | |
参考例句: |
|
|
2 substantive | |
adj.表示实在的;本质的、实质性的;独立的;n.实词,实名词;独立存在的实体 | |
参考例句: |
|
|
3 precedent | |
n.先例,前例;惯例;adj.在前的,在先的 | |
参考例句: |
|
|
4 generic | |
adj.一般的,普通的,共有的 | |
参考例句: |
|
|
5 akin | |
adj.同族的,类似的 | |
参考例句: |
|
|
6 erases | |
v.擦掉( erase的第三人称单数 );抹去;清除 | |
参考例句: |
|
|
7 justified | |
a.正当的,有理的 | |
参考例句: |
|
|
8 entails | |
使…成为必要( entail的第三人称单数 ); 需要; 限定继承; 使必需 | |
参考例句: |
|
|
9 judgment | |
n.审判;判断力,识别力,看法,意见 | |
参考例句: |
|
|
10 compliance | |
n.顺从;服从;附和;屈从 | |
参考例句: |
|
|
11 warding | |
监护,守护(ward的现在分词形式) | |
参考例句: |
|
|
12 rogue | |
n.流氓;v.游手好闲 | |
参考例句: |
|
|
13 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
14 circumvent | |
vt.环绕,包围;对…用计取胜,智胜 | |
参考例句: |
|
|
15 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
16 capability | |
n.能力;才能;(pl)可发展的能力或特性等 | |
参考例句: |
|
|
17 scenario | |
n.剧本,脚本;概要 | |
参考例句: |
|
|
18 override | |
vt.不顾,不理睬,否决;压倒,优先于 | |
参考例句: |
|
|
19 avert | |
v.防止,避免;转移(目光、注意力等) | |
参考例句: |
|
|
20 imminent | |
adj.即将发生的,临近的,逼近的 | |
参考例句: |
|
|
21 presages | |
v.预示,预兆( presage的第三人称单数 ) | |
参考例句: |
|
|
22 overridden | |
越控( override的过去分词 ); (以权力)否决; 优先于; 比…更重要 | |
参考例句: |
|
|
23 tempted | |
v.怂恿(某人)干不正当的事;冒…的险(tempt的过去分词) | |
参考例句: |
|
|
24 mandate | |
n.托管地;命令,指示 | |
参考例句: |
|
|
25 statute | |
n.成文法,法令,法规;章程,规则,条例 | |
参考例句: |
|
|
26 accede | |
v.应允,同意 | |
参考例句: |
|
|
27 ecological | |
adj.生态的,生态学的 | |
参考例句: |
|
|
28 hijack | |
v.劫持,劫机,拦路抢劫 | |
参考例句: |
|
|