Given the (good) state of encryption it is basically never “breaking” encryption, but rather somehow circumventing it. Sadly this usually means installing some trojan on the devices exploiting a OS vulnerability.
This is a really bad idea for two reasons:
It gives law-enforcement an incentive to buy exploits and keep quiet about them afterwards and thus making devices much less secure and bugs are intentionally not fixed.
Once such a trojan is installed on a device it can not only be used to search for evidence, but just as easily to plant false evidence, which is sadly not as unlikely to happen as it sounds at first.
Given the (good) state of encryption it is basically never “breaking” encryption, but rather somehow circumventing it. Sadly this usually means installing some trojan on the devices exploiting a OS vulnerability.
This is a really bad idea for two reasons:
It gives law-enforcement an incentive to buy exploits and keep quiet about them afterwards and thus making devices much less secure and bugs are intentionally not fixed.
Once such a trojan is installed on a device it can not only be used to search for evidence, but just as easily to plant false evidence, which is sadly not as unlikely to happen as it sounds at first.
Planting of false evidence is something that we will have to worry about. It will probably be more common.