{"id":233491,"date":"2017-05-15T14:45:00","date_gmt":"2017-05-15T18:45:00","guid":{"rendered":"https:\/\/admin.rushlimbaugh.com\/?p=233491"},"modified":"2017-05-16T16:08:57","modified_gmt":"2017-05-16T20:08:57","slug":"ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door","status":"publish","type":"post","link":"https:\/\/admin.rushlimbaugh.com\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/","title":{"rendered":"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door"},"content":{"rendered":"<p>RUSH: You remember after the San Bernardino massacre that James Comey and the FBI were demanding that Apple create a back door for them to get into every iPhone? This ransomware, this is government developed stuff, they keep it like they keep diseases at the CDC, and this is a great example of why Apple was right.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: Okay, this ransomware stuff. It\u2019s a new kind of computer hacking, and it is becoming more widely proliferated out there. And essentially the way it works is, you can trigger it with a phishing email. You can fall victim to a phishing attack. It generally can\u2019t happen unless you help it to happen. It\u2019s not as though your computer is invaded without you knowing it. You get an email or something &#8212; a message &#8212; that looks legitimate from someplace, and you click on a link because it\u2019s requiring you to, suggesting you do.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-233507\" src=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg\" alt=\"\" width=\"650\" height=\"312\" srcset=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg 650w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech-300x144.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/>When you click on that link, you\u2019re sent to a website that then infects the computer. In this case, with this ransomware virus &#8212; which has a couple of different names &#8212; WannaCry, WannaCrypt, WannaCry-WannaCrypt ransomware. It\u2019s all over the world now, and once you click on the link, what happens is that the hacker encrypts all of the data on your computer and sends you an email (actually, you end up at a website) that tells you you\u2019ve been hacked.<\/p>\n<p>Your data has been encrypted and you have to pay a certain amount of money in a certain amount of time in order to be sent the decryption key, the password. And if you don\u2019t, then your data will be lost and destroyed forever. When that originally happened, the ransomware was attacking companies and institutions and the ransom was very expensive. Immediately, computer people began working on how to defeat the encryption without paying the ransom, and what the ransomware makers decided to do then was to really lower the cost of the ransom to make it the easiest option that somebody who had been hacked would face.<\/p>\n<p>If they charged you $150 or $200 or $500, that\u2019s theoretically much less of a hassle and it\u2019s much speedier than to try to go out and get rid of the virus that\u2019s in your computer or the hack and find a way to find the key to decrypt it. And so that\u2019s the latest manifestation. Ransomware is not usually that expensive. In this case, it is so widespread that it affected hospitals all over the world. It\u2019s an indication that if they do something like this, it could affect the power grid. Imagine being able to take us back to the seventeenth or eighteenth century with no electricity.<\/p>\n<p>So people take this stuff very seriously as they should. Now, how does it happen? Where does this stuff come from? You know, just like the Centers for Disease Control maintains every virus that they can get their hands on for study &#8212; learn how it mutates, learn to find ways to beat the virus or to treat it, try to find antidotes, what have you &#8212; computer viruses are the same way. They are kept by security agencies and governments, and they\u2019re studied. They\u2019re perfected.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-228392\" src=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/04\/Rush-Photos-SMALL-021-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/04\/Rush-Photos-SMALL-021-300x300.jpg 300w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/04\/Rush-Photos-SMALL-021-150x150.jpg 150w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/04\/Rush-Photos-SMALL-021.jpg 325w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>People seek ways to defeat them, and that is how this ransomware got out. It was hijacked from a government repository, or a version of it was, and it has led to an argument over whether or not government should be stockpiling these things because governments have shown that they\u2019re not the best safeguards. Governments are not the best protectors of these kinds of things. There\u2019s too many people involved. They may not have the best employees &#8212; the highest, the greatest engineers and so forth &#8212; working there.<\/p>\n<p>The private sector pays much more than government does, so goes the theory. And then we learned that that the NSA and the FBI had developed their own hacking tools that would allow them to hack a network or a computer and make it look like somebody else had done it. The latest WikiLeaks dump &#8212; featuring mountains and mountains of data from the CIA &#8212; proved just this, that the CIA and the NSA have all kinds of different exploits. Zero-day, any number of exploits that can hack enemy computers.<\/p>\n<p>We\u2019re constantly trying to hack the ChiComs and the Norks. They\u2019re constantly trying to hack us. That\u2019s another reason why this Russian collusion stuff&#8230; People are being led to believe that it hardly ever happens and the Russians are way ahead of the game. &#8220;The Russians tried to tamper with our elections!&#8221; We have long&#8230; We\u2019ve not just tampered with elections, we really have affected elections in certain places. It\u2019s not uncommon. This is what happened at the highest levels of government security.<\/p>\n<p>The Pentagon, the CIA, they\u2019re constantly under assault from any number of people, pajama-clad little kids in their basements are trying to hack in and everybody else in the world is. And that\u2019s why computer network security is such an improved thing, a great thing, and why there\u2019s so much attention paid to it, because the exploits and the attacks are getting more and more sophisticated. So this takes us back to the San Bernardino massacre where the couple involved had an iPhone 5c. It was recovered, but it was password protected.<\/p>\n<p>It was locked, and the FBI had no way of getting in, because Apple security is pretty tight. If you use the touch ID and if you use a six-digit number to lock your machine, it can take years with a computer trying every possible combination. So the FBI called Apple and they said, &#8220;We want you &#8212; we command you &#8212; to build us a back door into your operating system for just this kind of thing. We need to find out what these people were doing. We need to find out who their accomplices, if any, are. We need to find out what other plans they might have.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-233558\" src=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/AppleCook-FBI-B.jpg\" alt=\"\" width=\"585\" height=\"222\" srcset=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/AppleCook-FBI-B.jpg 585w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/AppleCook-FBI-B-300x114.jpg 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/>&#8220;And it\u2019s all on that phone, potentially. And if you won\u2019t let us in then you, Apple, you\u2019re a bunch of creeps and you\u2019re not good Americans.&#8221; You remember the fight. And the Apple CEO, Tim Cook&#8230; See, Apple has made a big, big push on privacy. It\u2019s not just a marketing thing. They really are into it for a substantive belief in privacy. Let me give you an example of how Apple does it versus others. Google has hardly any privacy whatsoever because they use every bit of data from every user they can to custom tailor advertising to everybody.<\/p>\n<p>Now, Google has something called Google Now, they have Google Assistant, which is their version of Siri. Google is able to predict what their users are going to do before the users do it, because they have data of what all their users are doing. They have location data, they have where their customers are going to dinner, they have what hotels they\u2019re staying in because it\u2019s all in Google\u2019s system. It\u2019s all on the Google Cloud. And Google uses&#8230; They claim it\u2019s private. They claim nobody ever has access to it except Google, and they don\u2019t even know it personally.<\/p>\n<p>They just use it to tailor advertising to each individual that uses Google. Apple doesn\u2019t do that. Apple keeps all of that data on your phone, not in their Cloud. Now, this results in Google being able to offer more of these predictive services. Like, locations. For example, you pick up your phone and it tells you out of the blue that it\u2019s gonna take you 20 minutes to get to wherever your kids at day care. And you say, &#8220;How does know it that? How does it know?&#8221; You think it\u2019s cool, 20 minutes &#8212; and the next day might tell you 25 \u2019cause traffic is bad.<\/p>\n<p>And you go, &#8220;Wow, how does it know that?&#8221; Well, it knows that because you\u2019ve done this. You go to day care every day at a certain time, Google knows it, and they return the favor to you in the form of having your phone alert you to what traffic problems there are, maybe an alternate route. Apple does the same thing but they keep it on the phone. And it\u2019s not nearly as much data, because there are storage concerns and there\u2019s memory concerns and battery life concerns. But all of that data &#8212; even your location data &#8212; Apple does not have it.<\/p>\n<p>If I may make a brief aside, it\u2019s what makes the iPhone even more dazzling as a device, because it\u2019s able to do all of these predictive things. Not nearly as much as Google can, but it\u2019s still able to do the same thing. You go to day care every day, the iPhone will tell you after about a week, it takes a week to build up the pattern, and then if you go to day care once in the morning, once in the afternoon, it will tell you &#8212; if you know where to look.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-233560\" src=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/Applefbi-VS-App-B.jpg\" alt=\"\" width=\"585\" height=\"270\" srcset=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/Applefbi-VS-App-B.jpg 585w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/Applefbi-VS-App-B-300x138.jpg 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/>But Apple keeps as much of that data on the phone, not in their cloud, because of their commitment to privacy. As a result, Apple\u2019s services in this area are not nearly as wide and expansive as Google\u2019s are, and Apple has rolled the dice and has said that their customers will appreciate that and be more inclined to use Apple products, because their activities and locations are actually private. It\u2019s not anywhere on Apple\u2019s servers. It\u2019s on your phone. And the way you can demonstrate this to yourself &#8212; it takes awhile for &#8212; let\u2019s talk location data. It takes a while for all of this data to build up.<\/p>\n<p>In the old days, when you got a new iPhone, it would take two weeks of going to and from home and work before the data of travel times, traffic problems, routes that you should take would show up, because they had programmed it for the phone to take two weeks to make sure they got an accurate approximate time of day you left every day. In other words, if you leave at 11 a.m., they\u2019re not gonna show you at six how long it\u2019s gonna take you to get to work. It\u2019ll start showing up at nine a.m. That takes two weeks of this.<\/p>\n<p>If you have purchased a new phone, and if you set the new phone up by migrating your data from the old phone to the new phone, you will notice that there is no location data on your new phone. You have to start all over with every new phone, every year. If you get a new phone, whenever you get a new phone, whatever location data, usage data is on your phone does not transfer in the migration. If you back up and restore, that data is not there. It does not move from that phone. And Apple does this for security reasons. You\u2019re starting all over with each new phone.<\/p>\n<p>I guess that most people are not even aware of all this, but this is the best illusion that I can come up with for now of Apple\u2019s commitment to privacy. And it\u2019s not a thousand percent solid. It\u2019s not a hundred percent solid. But, anyway, it\u2019s because of these restrictions that the FBI wanted a back door into that phone. They wanted Apple to give them a back door that would allow them to go into that phone\u2019s operating system without cracking the security codes and all that that had locked. And Apple refused. And they were prepared to go to court to refuse. And this malware business is exactly why.<\/p>\n<p>Governments have these hacking apps, these hacking tools and programs, and look, they end up in the public domain, and they end up being used widely. Governments are just lousy at protecting this stuff. And Apple was arguing at the time to Comey and the FBI, &#8220;If we give you a back door, it\u2019s gonna be two weeks and that back door is gonna be all over the world, and not a single iPhone\u2019s gonna be safe. If we create a back &#8211;&#8221; There isn\u2019t a back door. Right now there isn\u2019t. If you get locked out of your phone and you forget how to get into it, you have got problems. It\u2019s that secure. There are ways, but it\u2019s almost impossible.<\/p>\n<p>Same thing with iCloud. If you forget your credentials there, you can\u2019t call Apple. They do not know your log-in data. They do not know this stuff. It\u2019s there on their servers, but they don\u2019t know it, and it\u2019s purposely kept away from customer service people, because anybody can call and lie about who they are and say, &#8220;I lost my password and here\u2019s the information.&#8221; It used to be somebody was able to do this at one time. That\u2019s why Apple tightened it down even further.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-233561\" src=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/GoogleLiberal-Monopoly.jpg\" alt=\"\" width=\"585\" height=\"270\" srcset=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/GoogleLiberal-Monopoly.jpg 585w, https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/GoogleLiberal-Monopoly-300x138.jpg 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/>Google doesn\u2019t do any of this stuff but they\u2019re able to offer vastly more predictive services that dazzle people. It\u2019s called AI, artificial intelligence. It dazzles people, &#8220;Look what my phone knows.&#8221; The phone doesn\u2019t know anything. It just keeps a record of what you do and then spits it back at you.<\/p>\n<p>But the overall point here is that this San Bernardino iPhone 5c, Apple took the right course in denying the FBI permission, or the demand from the FBI that they write essentially a back door entryway into the iOS, which would allow the FBI to get into any phone they wanted to. And this is the greatest illustration of why governments should not be given these tools, because they can\u2019t keep them secure. They can\u2019t keep them private.<\/p>\n<p>Look at what all has ended up on WikiLeaks about the CIA and the NSA\u2019s own hacks that they have made, written and so forth, able to leave fingerprints &#8212; by the way, this Crowdsource business, this outfit that was hired to forensically examine the DNC computer network, they\u2019re based out of the Ukraine.<\/p>\n<p>The guy hates Putin. The guy that runs Crowdsource hates Putin. And he said, &#8220;Look what we found. We found Russian fingerprints here.&#8221; How stupid are the Russians. You never leave your own fingerprints unless you\u2019re trying to intimidate somebody, unless you want to be found as a means of frightening people. But a circumstance like this, can\u2019t see any logical reason why Putin or the Russians would feel fingerprints of their hack of the DNC computer. It doesn\u2019t make any sense.<\/p>\n<p>The point being that it would be wise to disbelieve this idea that the Russians hacked the DNC in the first place, precisely because those are the only fingerprints found. Then when you learn that Crowdsource, the outfit hired to study and find out who did it, is run by a guy that hates Putin. We\u2019re being led down a path on this whole Russian hacking-the-election business and Trump colluding, this is one of the biggest scams, and it has survived for over a year with no evidence.<\/p>\n<p>And the only way that\u2019s possible is the U.S. media working in conjunction with embeds in the deep state who have their own malicious reasons for leaking enough that allows the media to keep reporting on it, but it\u2019s just stunning. There isn\u2019t any evidence, there isn\u2019t gonna be any evidence, because it didn\u2019t happen. The election outcome had &#8212; it\u2019s silly to keep saying it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RUSH: You remember after the San Bernardino massacre that James Comey and the FBI were demanding that Apple create a back door for them to get into every iPhone? This ransomware, this is government developed stuff, they keep it like they keep diseases at the CDC, and this is a great example of why Apple was right.<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0},"categories":[12,1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:title\" content=\"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show\" \/>\n<meta name=\"twitter:description\" content=\"RUSH: You remember after the San Bernardino massacre that James Comey and the FBI were demanding that Apple create a back door for them to get into every iPhone? This ransomware, this is government developed stuff, they keep it like they keep diseases at the CDC, and this is a great example of why Apple was right.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"George Prayias\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\",\"name\":\"The Rush Limbaugh Show\",\"description\":\"Excellence In Broadcasting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg\",\"contentUrl\":\"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg\",\"width\":650,\"height\":312},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#webpage\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/\",\"name\":\"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show\",\"isPartOf\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#primaryimage\"},\"datePublished\":\"2017-05-15T18:45:00+00:00\",\"dateModified\":\"2017-05-16T20:08:57+00:00\",\"author\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/a2bc43fbe4b4e1ff4d1f092c6086a349\"},\"breadcrumb\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/a2bc43fbe4b4e1ff4d1f092c6086a349\",\"name\":\"George Prayias\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a43c262983f0228d5f474ce08e691cf9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a43c262983f0228d5f474ce08e691cf9?s=96&d=mm&r=g\",\"caption\":\"George Prayias\"},\"url\":\"https:\/\/admin.rushlimbaugh.com\/daily\/author\/georgeeibnet-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/","twitter_card":"summary","twitter_title":"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show","twitter_description":"RUSH: You remember after the San Bernardino massacre that James Comey and the FBI were demanding that Apple create a back door for them to get into every iPhone? This ransomware, this is government developed stuff, they keep it like they keep diseases at the CDC, and this is a great example of why Apple was right.","twitter_image":"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg","twitter_misc":{"Written by":"George Prayias","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/","name":"The Rush Limbaugh Show","description":"Excellence In Broadcasting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg","contentUrl":"https:\/\/www.rushlimbaugh.com\/wp-content\/uploads\/2017\/05\/650-051517-Rush-Talks-Tech.jpg","width":650,"height":312},{"@type":"WebPage","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#webpage","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/","name":"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door - The Rush Limbaugh Show","isPartOf":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#primaryimage"},"datePublished":"2017-05-15T18:45:00+00:00","dateModified":"2017-05-16T20:08:57+00:00","author":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/a2bc43fbe4b4e1ff4d1f092c6086a349"},"breadcrumb":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2017\/05\/15\/ransomware-attack-shows-why-apple-was-right-to-deny-the-fbi-an-iphone-back-door\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/live-rush-limbaugh.pantheonsite.io\/"},{"@type":"ListItem","position":2,"name":"Ransomware Attack Shows Why Apple Was Right to Deny the FBI an iPhone Back Door"}]},{"@type":"Person","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/a2bc43fbe4b4e1ff4d1f092c6086a349","name":"George Prayias","image":{"@type":"ImageObject","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/a43c262983f0228d5f474ce08e691cf9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a43c262983f0228d5f474ce08e691cf9?s=96&d=mm&r=g","caption":"George Prayias"},"url":"https:\/\/admin.rushlimbaugh.com\/daily\/author\/georgeeibnet-com\/"}]}},"_links":{"self":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/233491"}],"collection":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/comments?post=233491"}],"version-history":[{"count":14,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/233491\/revisions"}],"predecessor-version":[{"id":233616,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/233491\/revisions\/233616"}],"wp:attachment":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/media?parent=233491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/categories?post=233491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/tags?post=233491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}