Welcome to City-Data.com Forum!
U.S. CitiesCity-Data Forum Index
Go Back   City-Data Forum > General Forums > Politics and Other Controversies
 [Register]
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
View detailed profile (Advanced) or search
site with Google Custom Search

Search Forums  (Advanced)
 
Old 02-18-2016, 06:58 AM
 
Location: downtown
1,824 posts, read 1,668,500 times
Reputation: 408

Advertisements

Don't need the knowledge out there..
Reply With Quote Quick reply to this message

 
Old 02-18-2016, 07:27 AM
 
2,284 posts, read 1,585,059 times
Reputation: 3858
Those terrorists smashed their phones for a reason. Not many criminals do this before a shootout or is common practice you see every week.? Apple is simply assisting in the planning and killing of more innocent Americans.
For all those who don't trust the govt. with a key to open the terrorists' phone, why trust themwith having your:
SSN
Bank account info
Tax forms
Background check info
DMV and insurance records
Healthcare info

Has any of it lead to people falling dead in the street? No. get over the paranoia. It is not a ticket to assasinate you and your friends like the 1960's
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 07:40 AM
 
2,727 posts, read 2,834,136 times
Reputation: 4113
Here is my question - I don't have a huge understanding of tech.


So Apple is designed that the phone is wiped if an incorrect password is typed in a certain number of times. So the phone is accessible, you just risk wiping the data from the phone.


Is it impossible to recover the deleted data? The FBI is able to restore deleted data from hard drives (thinking Hillary), etc. Is that unable to happen with this type of hardware / software?
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 07:41 AM
 
Location: Sonoran Desert
39,078 posts, read 51,239,172 times
Reputation: 28324
Quote:
Originally Posted by LetsRock View Post
A court order can compel the owner to open the safe. In this case, the terrorist is dead. He cannot be compelled to un-encrypt his phone.
The thing is it was not his phone. It was his work phone and is owned by the county and the county has consented/asked to have it examined.
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 07:57 AM
 
Location: Long Island
57,294 posts, read 26,217,746 times
Reputation: 15645
Quote:
Originally Posted by Gungnir View Post
The iOS system was upgraded with this feature in iOS 8. What has been done before can no longer be done. A device specific key is used with the passcode to generate a decryption key, the device specific key is not extractable and is unique to that device (so you can't just image the phone and run it under an emulator on a Mac, or PC, with the GHz of processing power you have), making the decryption of that data specific to that device.

Apple's iPhone Encryption Is a Godsend, Even if Cops Hate It | WIRED

Ok so what is being asked of Apple...?
https://assets.documentcloud.org/doc...sst-iPhone.pdf

Look at section 2.



So Apple's encryption and data protection system is what? Lock the device and require a system reset to get it running again, system reset removing all private data, or on X failed attempts to gain access erase all private data. Failed passcode attempts back off for exponentially longer delays. So how is this not violating Apples data protection system? How will the phone know it's the FBI? Will they flash their badges at the camera and the camera will verify their identities?

Now next question, what are they looking for?
They have the phone records of that phone, they have the browser history of that phone, they have the SMS data of that phone, they have the cloud data of that phone. What else may be there that they can get? It's only something that was generated locally, and remained on the phone locally never synched to the cloud, or posted or downloaded, or called or received, so in reality nothing, because if like my phone, you create a file it's automatically synched to my cloud storage (by default), the FCC has rules for record retention of call logs, and SMS data, and ISP's are required to hand over browser histories on request, and I'm pretty sure that the cloud data associated with that phone has already been supplied by Apple.

So what are they looking for that matters so much it's going to compromise the security of over 100M devices?

Or is this actually an FBI trojan, that they want this facility, and are using this event to try to leverage Apple (or it could have just as easily been Google or Microsoft) into submitting to their constant paranoid demands for everyone's information all of the time? Let's be honest Holder and the Director of the FBI threw their toys out of the crib when they first heard about this.
They were able to recover from the first version of the I Phone 8 then Apple upgraded and that was no longer the case so it appears they decided to make their encryption secure. It's not clear what the FBI wants but I assume it's text messages and voice, they do already have the phone numbers and contacts but this is where Apple is drawing the line, they have not done so in the past.


This isn't the first time LE accessed phone records, their have always been wire taps.
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 07:58 AM
 
9,617 posts, read 6,065,647 times
Reputation: 3884
Bingo. You said it well. This is not about one instance, one phone. It is about creating a backdoor to Apple's encryption system. We cannot trust our government to not use it. Much less, to protect the backdoor. Today, there is almost zero reason to use special security suites with Apple devices. They are safe and secure as one can get in this world of internet of things.
Quote:
Originally Posted by lepoisson View Post
To the people who are angry at Apple, please think about it this way...

If the FBI asked a bank vault company to design a key/algorithm that would work in all of their vaults, but they swear they would only use it just this one time, would you support it knowing that the key/algorithm might eventually get leaked (government leaks happen all the time) and allow anyone to enter the bank vault?
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 08:07 AM
 
Location: Palo Alto
12,149 posts, read 8,418,303 times
Reputation: 4190
Assume that Apple complies. Assume that the FBI has the decryption algorithm. Nobody would ever know if they were reading your data with or without a warrant.

There is no doubt that the IRS was targeting conservative organizations. I'm sure the IRS has targeted liberals and conservatives in its lifetime. Man is capable of amazing evil. Politicians justify their actions as a means to a greater good. I hear this from liberals all the time.

I enlisted in the Navy to protect and defend the constitution. All of it. Not just the parts convenient on a particular day. There is nothing on the phone that will help them. It's a ruse, playing on public ignorance, to get the keys to the kingdom.
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 08:10 AM
 
Location: DFW
40,951 posts, read 49,198,692 times
Reputation: 55008
Quote:
Originally Posted by Ponderosa View Post
The thing is it was not his phone. It was his work phone and is owned by the county and the county has consented/asked to have it examined.
The county should have had a policy of every phone pass code on file. It's their screw up.

After this we'll see a change in policy of companies and govt bodies. May even see a law requiring it.
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 08:11 AM
 
Location: The Republic of Texas
78,863 posts, read 46,634,918 times
Reputation: 18521
Government cannot FORCE any person, or any company, to become an agent of government. That would be slavery.
Reply With Quote Quick reply to this message
 
Old 02-18-2016, 08:28 AM
 
Location: Itinerant
8,278 posts, read 6,276,391 times
Reputation: 6681
Quote:
Originally Posted by joeymags View Post
So Apple is designed that the phone is wiped if an incorrect password is typed in a certain number of times. So the phone is accessible, you just risk wiping the data from the phone.
Well you can image the device, try a password, if it's incorrect wait until it challenges you again, repeat until deletion. Then reimage the device with the image you made, and repeat until deletion or access.

That's part of the issue, the phone is secure, but the FBI have all the tools they need to access the device, it may take a long time, but it may be quicker than pursuing it through the courts (I'm thinking 9th Appeals circuit, and SCOTUS, will run at about 5-7 years and you could probably go through a 10 challenge reimage cycle once per hour, giving you 438,000 combinations for 5 years [which if it's 4 digit is 43.8 times more time than needed to hit all combinations] and 613200 combinations for seven years a 61.32% chance of getting the right combination with a 6 digit passcode).

What the FBI actually want is a convenient means to access the device, and that's not a requirement of a search warrant (and a search warrant doesn't apply to Apple anyway, it's not their device, nor data). If for instance you're served a search warrant, you are not required to open your doors for the police or assist them in any way, they are responsible for gaining access to the place to be searched and the search itself. In this event Apple isn't even being served a search warrant, because neither the device nor data is Apple's.

Hillary's hard drive was recoverable because she's an idiot, and employed idiots, and it's proof they have no idea what they're doing. It's a combination of mails sent to other people, and recovered data from the drive that was "deleted" but still present on the drive. Magnetic drives don't "delete" on a delete, they just mark sectors as writable, if they're not overwritten (sometimes several times) then the data is still accessible.


Quote:
Originally Posted by Goodnight View Post
It's not clear what the FBI wants but I assume it's text messages and voice, they do already have the phone numbers and contacts but this is where Apple is drawing the line, they have not done so in the past.
Text messages are stored for a period on the "tower", if they missed the window to recover them then it's not Apple's responsibility to cover their ass. Voice isn't stored on the phone, it's volatile, unless you have an active wiretap you'll not recover voice. If you're discussing voice messaging (i.e. missed calls) then they already have access to that mailbox, like the call data FCC requires it to be retained and handed over on demand.

Apple is drawing this line because the fundamental operation of their encryption changed. Where they once had access to people's data they no longer do, they're no more able to access that phone than Bob Seger is (see earlier post).
__________________
My mod posts will always be in red.
The Rules • Infractions & Deletions • Who's the moderator? • FAQ • What is a "Personal Attack" • What is "Trolling" • Guidelines for copyrighted material.
Reply With Quote Quick reply to this message
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.

Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.


Reply
Please update this thread with any new information or opinions. This open thread is still read by thousands of people, so we encourage all additional points of view.

Quick Reply
Message:


Over $104,000 in prizes was already given out to active posters on our forum and additional giveaways are planned!

Go Back   City-Data Forum > General Forums > Politics and Other Controversies

All times are GMT -6. The time now is 02:10 AM.

© 2005-2024, Advameg, Inc. · Please obey Forum Rules · Terms of Use and Privacy Policy · Bug Bounty

City-Data.com - Contact Us - Archive 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37 - Top