Apple and that backdoor issue

A lot has been made of Apple’s refusal to develop a back door to the encryption they use on their newer products.  It’s so tight the FBI can’t even hack it.  It’s so tight Apple won’t even try even if it’s a dead terrorist with evidence of other terrorists they might have associated with intending to blow up babies.  It’s that tight and Apple’s NOT going to hack it, putting people’s information at risk.

Now, we get this:

The first fully functional ransomware targeting Apple’s Mac OS X operating system has been identified by security specialist Palo Alto Networks.

Ransomware, which is malicious software used to extort money, represents a growing threat to users.  The software can encrypt files until a ‘ransom’ is paid in a difficult-to-trace digital currency, such as bitcoins.

Now, understand this clearly, it encrypts files on a potentially encrypted file system.

In order to get your information back, and this is on any OS X platform, you have to pay them to decrypt your information.

Now, without getting too wonky and geeky.  The chances of information that has been encrypted twice being successfully recovered are risky at best.  IF, big IF, the KeRanger encryption corrupts the Apple encryption, guess what Apple would have to do in order for you to get your information back.

Go ahead, make my day.  Just guess!