Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
Those terrorists smashed their phones for a reason. Not many criminals do this before a shootout or is common practice you see every week.? Apple is simply assisting in the planning and killing of more innocent Americans. For all those who don't trust the govt. with a key to open the terrorists' phone, why trust themwith having your:
SSN
Bank account info
Tax forms
Background check info
DMV and insurance records
Healthcare info
Has any of it lead to people falling dead in the street? No. get over the paranoia. It is not a ticket to assasinate you and your friends like the 1960's
Here is my question - I don't have a huge understanding of tech.
So Apple is designed that the phone is wiped if an incorrect password is typed in a certain number of times. So the phone is accessible, you just risk wiping the data from the phone.
Is it impossible to recover the deleted data? The FBI is able to restore deleted data from hard drives (thinking Hillary), etc. Is that unable to happen with this type of hardware / software?
The iOS system was upgraded with this feature in iOS 8. What has been done before can no longer be done. A device specific key is used with the passcode to generate a decryption key, the device specific key is not extractable and is unique to that device (so you can't just image the phone and run it under an emulator on a Mac, or PC, with the GHz of processing power you have), making the decryption of that data specific to that device.
So Apple's encryption and data protection system is what? Lock the device and require a system reset to get it running again, system reset removing all private data, or on X failed attempts to gain access erase all private data. Failed passcode attempts back off for exponentially longer delays. So how is this not violating Apples data protection system? How will the phone know it's the FBI? Will they flash their badges at the camera and the camera will verify their identities?
Now next question, what are they looking for?
They have the phone records of that phone, they have the browser history of that phone, they have the SMS data of that phone, they have the cloud data of that phone. What else may be there that they can get? It's only something that was generated locally, and remained on the phone locally never synched to the cloud, or posted or downloaded, or called or received, so in reality nothing, because if like my phone, you create a file it's automatically synched to my cloud storage (by default), the FCC has rules for record retention of call logs, and SMS data, and ISP's are required to hand over browser histories on request, and I'm pretty sure that the cloud data associated with that phone has already been supplied by Apple.
So what are they looking for that matters so much it's going to compromise the security of over 100M devices?
Or is this actually an FBI trojan, that they want this facility, and are using this event to try to leverage Apple (or it could have just as easily been Google or Microsoft) into submitting to their constant paranoid demands for everyone's information all of the time? Let's be honest Holder and the Director of the FBI threw their toys out of the crib when they first heard about this.
They were able to recover from the first version of the I Phone 8 then Apple upgraded and that was no longer the case so it appears they decided to make their encryption secure. It's not clear what the FBI wants but I assume it's text messages and voice, they do already have the phone numbers and contacts but this is where Apple is drawing the line, they have not done so in the past.
This isn't the first time LE accessed phone records, their have always been wire taps.
Bingo. You said it well. This is not about one instance, one phone. It is about creating a backdoor to Apple's encryption system. We cannot trust our government to not use it. Much less, to protect the backdoor. Today, there is almost zero reason to use special security suites with Apple devices. They are safe and secure as one can get in this world of internet of things.
Quote:
Originally Posted by lepoisson
To the people who are angry at Apple, please think about it this way...
If the FBI asked a bank vault company to design a key/algorithm that would work in all of their vaults, but they swear they would only use it just this one time, would you support it knowing that the key/algorithm might eventually get leaked (government leaks happen all the time) and allow anyone to enter the bank vault?
Assume that Apple complies. Assume that the FBI has the decryption algorithm. Nobody would ever know if they were reading your data with or without a warrant.
There is no doubt that the IRS was targeting conservative organizations. I'm sure the IRS has targeted liberals and conservatives in its lifetime. Man is capable of amazing evil. Politicians justify their actions as a means to a greater good. I hear this from liberals all the time.
I enlisted in the Navy to protect and defend the constitution. All of it. Not just the parts convenient on a particular day. There is nothing on the phone that will help them. It's a ruse, playing on public ignorance, to get the keys to the kingdom.
So Apple is designed that the phone is wiped if an incorrect password is typed in a certain number of times. So the phone is accessible, you just risk wiping the data from the phone.
Well you can image the device, try a password, if it's incorrect wait until it challenges you again, repeat until deletion. Then reimage the device with the image you made, and repeat until deletion or access.
That's part of the issue, the phone is secure, but the FBI have all the tools they need to access the device, it may take a long time, but it may be quicker than pursuing it through the courts (I'm thinking 9th Appeals circuit, and SCOTUS, will run at about 5-7 years and you could probably go through a 10 challenge reimage cycle once per hour, giving you 438,000 combinations for 5 years [which if it's 4 digit is 43.8 times more time than needed to hit all combinations] and 613200 combinations for seven years a 61.32% chance of getting the right combination with a 6 digit passcode).
What the FBI actually want is a convenient means to access the device, and that's not a requirement of a search warrant (and a search warrant doesn't apply to Apple anyway, it's not their device, nor data). If for instance you're served a search warrant, you are not required to open your doors for the police or assist them in any way, they are responsible for gaining access to the place to be searched and the search itself. In this event Apple isn't even being served a search warrant, because neither the device nor data is Apple's.
Hillary's hard drive was recoverable because she's an idiot, and employed idiots, and it's proof they have no idea what they're doing. It's a combination of mails sent to other people, and recovered data from the drive that was "deleted" but still present on the drive. Magnetic drives don't "delete" on a delete, they just mark sectors as writable, if they're not overwritten (sometimes several times) then the data is still accessible.
Quote:
Originally Posted by Goodnight
It's not clear what the FBI wants but I assume it's text messages and voice, they do already have the phone numbers and contacts but this is where Apple is drawing the line, they have not done so in the past.
Text messages are stored for a period on the "tower", if they missed the window to recover them then it's not Apple's responsibility to cover their ass. Voice isn't stored on the phone, it's volatile, unless you have an active wiretap you'll not recover voice. If you're discussing voice messaging (i.e. missed calls) then they already have access to that mailbox, like the call data FCC requires it to be retained and handed over on demand.
Apple is drawing this line because the fundamental operation of their encryption changed. Where they once had access to people's data they no longer do, they're no more able to access that phone than Bob Seger is (see earlier post).
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.