Once armed with a method for gaining access to iPhones, the government could ask to use it proactively, before a suspected terrorist attack—leaving Apple in a bind as to whether to comply or risk an attack and suffer a public-relations nightmare.
2017年12月六级真题(第三套)阅读 Section B