Verdict
Security pros offer opinions, solutions for FBI vs. Apple
eWeek
"If vendors were required to install backdoors or include recoverable keys in the encryption they use, there are a near-endless number of applications and software additions that can be installed by the user to ensure that those backdoors are irrelevant," Vectra CSO Günter Ollmann tells eWeek Editor Chris Preimesberger.