Apple vs. Feds
Forum rules
Be Civil. Go Hokies.
Be Civil. Go Hokies.
- Hokie CPA
- Posts: 2634
- Joined: Thu Aug 22, 2013 2:50 am
- Alma Mater: Norfolk Academy to Virginia Tech
- Party: I reject your party
- Location: Virginia Beach, VA
Apple vs. Feds
Surprised no thread on this already...
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
I don't care if you're a Democrat or a Republican... if you refuse to consider alternatives to the two parties, you support the Status Quo and you are a major part of the problem.
- RiverguyVT
- Posts: 30326
- Joined: Wed Aug 21, 2013 9:30 pm
Re: Apple vs. Feds
Im not tech savvy either. Based on the bit I understand, I'm w Apple too.Hokie CPA wrote:Surprised no thread on this already...
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
Trump is out there saying he'd force Apple to cooperate. That's just what we need in the WH huh?
So I put (the dead dog) on her doorstep!
Salute the Marines
Soon we'll have planes that fly 22000 mph
"#PedoPete" = Hunter's name for his dad.
Salute the Marines
Soon we'll have planes that fly 22000 mph
"#PedoPete" = Hunter's name for his dad.
Re: Apple vs. Feds
Agree, fellow CPA. I'm with Apple in this instance.
Fully vaccinated, still not dead
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
Sounds like BS to me from Apple. They don't want to jeopardize the Muslim market. Or they could go even further and advertise an IED app.
Unvaccinated,. mask free, and still alive.
Re: Apple vs. Feds
I don't understand why they can't just remove the memory from the phone, make a copy of it, and then have at it in a virtual environment. Is that not a thing?
Posted from my Commodore 64 using Tapatalk
- Bay_area_Hokie
- Posts: 6033
- Joined: Fri Aug 23, 2013 3:53 am
- Alma Mater: VT
- Party: Surprise Party
Re: Apple vs. Feds
I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
“With God there are only individuals” - Philosopher Nicolas Gomez Davila
Re: Apple vs. Feds
Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
Posted from my Commodore 64 using Tapatalk
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
They just don't want to give up the encryption key or key generator.BigDave wrote:Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
Unvaccinated,. mask free, and still alive.
-
- Posts: 11220
- Joined: Thu Aug 22, 2013 12:29 am
Re: Apple vs. Feds
The issue is that Apple says they don't have one and will have to develop it. Their concern, legitimate or not, is that once the "key" is developed it will be out there. There will be no way for them to contain it, even within their own business. Essentially they don't want to develop a monster.awesome guy wrote:They just don't want to give up the encryption key or key generator.BigDave wrote:Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
You have to have the key before you can encrypt. They already have the key. But a company I used to work for had a patent on doing secret encryption like this, where we didn't have the key and only the user could decrypt. And we too had tons of requests from the feds to stop criminals and couldn't without releasing the master key. This was also pre 9/11 so the stakes weren't as high.133743Hokie wrote:The issue is that Apple says they don't have one and will have to develop it. Their concern, legitimate or not, is that once the "key" is developed it will be out there. There will be no way for them to contain it, even within their own business. Essentially they don't want to develop a monster.awesome guy wrote:They just don't want to give up the encryption key or key generator.BigDave wrote:Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
Unvaccinated,. mask free, and still alive.
- Major Kong
- Posts: 15769
- Joined: Wed Aug 21, 2013 9:35 pm
- Alma Mater: Ferrum VT ASU
- Party: Independent
- Location: Somewhere between Marion and Seven Mile Ford
Re: Apple vs. Feds
One thing I heard yesterday was that these phones are made in China.
The Chinese probably already have the pass keys, so just ask China for the info.
The Chinese probably already have the pass keys, so just ask China for the info.
I only post using 100% recycled electrons.
Re: Apple vs. Feds
Apple prolly signed a nondisclosure agreement.Major Kong wrote:One thing I heard yesterday was that these phones are made in China.
The Chinese probably already have the pass keys, so just ask China for the info.
Re: Apple vs. Feds
From what I've read, I'm with Apple. I don't think they should be providing a back door into all their software. Now, I think on a case by case basis they should hack into a phone if there is a warrant, but it sounds like that is more difficult than I would think.Hokie CPA wrote:Surprised no thread on this already...
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
I think the former would be a detriment to every U.S. tech company.
People who know, know.
- absolutvt03
- Posts: 2217
- Joined: Wed Oct 15, 2014 5:21 pm
- Alma Mater: Virginia Tech
- Party: Voter Apathy
Re: Apple vs. Feds
I think the problem with the case by case thing is once the "hack" is created, it exists and who knows who will try to get their hands on it or for what purposes. I don't know that it's a case of how difficult it would be and more the repercussions of the existence of a "skeleton key" to get into any Apple device.TheH2 wrote:From what I've read, I'm with Apple. I don't think they should be providing a back door into all their software. Now, I think on a case by case basis they should hack into a phone if there is a warrant, but it sounds like that is more difficult than I would think.Hokie CPA wrote:Surprised no thread on this already...
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
I think the former would be a detriment to every U.S. tech company.
Forum rules: Please be civil.
"You do suck and are a terrible human being." - awesome guy
"maybe because you're autistic" - USN_Hokie
Seriously... there's only ONE rule.
"You do suck and are a terrible human being." - awesome guy
"maybe because you're autistic" - USN_Hokie
Seriously... there's only ONE rule.
-
- Posts: 11220
- Joined: Thu Aug 22, 2013 12:29 am
Re: Apple vs. Feds
No, they have clearly stated they would have to develop this.awesome guy wrote:You have to have the key before you can encrypt. They already have the key. But a company I used to work for had a patent on doing secret encryption like this, where we didn't have the key and only the user could decrypt. And we too had tons of requests from the feds to stop criminals and couldn't without releasing the master key. This was also pre 9/11 so the stakes weren't as high.133743Hokie wrote:The issue is that Apple says they don't have one and will have to develop it. Their concern, legitimate or not, is that once the "key" is developed it will be out there. There will be no way for them to contain it, even within their own business. Essentially they don't want to develop a monster.awesome guy wrote:They just don't want to give up the encryption key or key generator.BigDave wrote:Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
They're lying133743Hokie wrote:No, they have clearly stated they would have to develop this.awesome guy wrote:You have to have the key before you can encrypt. They already have the key. But a company I used to work for had a patent on doing secret encryption like this, where we didn't have the key and only the user could decrypt. And we too had tons of requests from the feds to stop criminals and couldn't without releasing the master key. This was also pre 9/11 so the stakes weren't as high.133743Hokie wrote:The issue is that Apple says they don't have one and will have to develop it. Their concern, legitimate or not, is that once the "key" is developed it will be out there. There will be no way for them to contain it, even within their own business. Essentially they don't want to develop a monster.awesome guy wrote:They just don't want to give up the encryption key or key generator.BigDave wrote:Well, it's probably not as simple as that - I'm sure the data on the phone is encrypted and would have to be decrypted first. But you'd think that it would be separable where you could physically remove the data memory from the phone and then make a copy of it. The copy would still be encrypted, but the government could then brute force hack that copy.Bay_area_Hokie wrote:I am not an encryption expert at all. This is one are of IT I have never really learned and I have no desire to...
That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
Now, I think I just answered my own question. If they did this once, they would have to have a dept with 500 people doing this in a year. They could ask the gov't for $10K every time it's needed. I don't see what is wrong with that. They shouldn't have to bear the cost IMHO.
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
Unvaccinated,. mask free, and still alive.
Re: Apple vs. Feds
My understanding is that breaking into the phone will destroy all of it's contents. According to Apple, they'd have to write a program to avoid that. On a related note, it looks lIke John McAfee has offered to break into the phone within 3 weeks; or eat a shoe on live tv.
http://www.dailymail.co.uk/news/article ... -free.html
So there's that.
http://www.dailymail.co.uk/news/article ... -free.html
So there's that.
"I predict future happiness for Americans, if they can prevent the government from wasting the labors of the people under the pretense of taking care of them." - Thomas Jefferson
Re: Apple vs. Feds
If the Commerce Clause means that you can be forced to buy health insurance, then why shouldn't the government be able to compel Apple to write a new program for them?HokieJoe wrote:My understanding is that breaking into the phone will destroy all of it's contents. According to Apple, they'd have to write a program to avoid that. On a related note, it looks lIke John McAfee has offered to break into the phone within 3 weeks; or eat a shoe on live tv.
http://www.dailymail.co.uk/news/article ... -free.html
So there's that.
Posted from my Commodore 64 using Tapatalk
Re: Apple vs. Feds
BigDave wrote:If the Commerce Clause means that you can be forced to buy health insurance, then why shouldn't the government be able to compel Apple to write a new program for them?HokieJoe wrote:My understanding is that breaking into the phone will destroy all of it's contents. According to Apple, they'd have to write a program to avoid that. On a related note, it looks lIke John McAfee has offered to break into the phone within 3 weeks; or eat a shoe on live tv.
http://www.dailymail.co.uk/news/article ... -free.html
So there's that.
Good point. Maybe we should get Justice Robert's to read the political tea leaves and make decision. Because politics is a central concern of the SC. And Supreme's aren't appointed to life time tenures for a reason.
"I predict future happiness for Americans, if they can prevent the government from wasting the labors of the people under the pretense of taking care of them." - Thomas Jefferson
Re: Apple vs. Feds
I'm not an encryption or iThing expert, but I did read the iOS security guide and think I have a pretty good understanding of the issue.Hokie CPA wrote:Surprised no thread on this already...
http://www.latimes.com/opinion/editoria ... story.html
Analogy I saw yesterday is Feds are asking for a pass-key that would open any door in the building in order to search one hotel room. There's got to be a way around that.
Any tech peeps in the room able to expound on Apple's encryption and whether Apple can crack one specific phone vs writing in a universal update that would create a back door into any iPhone? I understand Apple says they don't have the key to their own encryption... is that true?
So far, I'm in agreement with Apple as far as keeping iPhones secure, on the whole.
Apple does not have the encryption keys or passwords of the phone. The encryption keys are created during manufacturing and not saved anywhere. The FBI is asking Apple to create a custom version of the iOS, which can be installed without unlocking the phone, which bypasses two specific security features: 1) The time delay between password entries and 2) The setting which automatically deletes all data on the phone after 10 failed attempts at the password. This will allow the FBI to brute-force the password on the phone and unlock it.
They could, but to read the memory, they'd have to brute-force guess at the encryption key, rather than the password to read the data, which is orders of magnitude more difficult. There may be more sophisticated ways to hack the hardware to access the encryption keys (which are not in memory, but are on a separate chip), but if the FBI has that capability, they're not going to expose it and thus can't use it in any legal cases (I've also heard that such methods would break the chain-of-custody of the evidence).BigDave wrote:I don't understand why they can't just remove the memory from the phone, make a copy of it, and then have at it in a virtual environment. Is that not a thing?
Their concern (which is justified IMO) is the precedent it sets. If the FBI has access to this capability, so will local law enforcement, foreign governments, and it won't take long before hacker groups get a hold of the software too. In an era where we constantly hear stories about Target, Sony, OPM, and everybody else getting hacked, we should be happy that someone in the tech industry finally built a secure product, not asking them to deliberately weaken the security that protects all of their users. It's incorrect to think about Apple's position in the context of only San Bernardino, or even Apple vs. the US Govt.Bay_area_Hokie wrote: That being said, I don't understand why they can't take the phone to their facility, and return every document, image, text message from the phone on a memory stick and give it to the Feds.
....
I guess if they had that dept with 500 people, and Samsung didn't, a lot of people would go to Samsung. I think this whole thing quickly spirals to the point of it being a giant cluster.
One other important point - There are 1000s of encryption products in the market - many developed outside the US, and some are actual good (i.e. possibly not breakable even by sophisticated entities like the NSA). They're largely not as usable as what's built into the iPhone, but groups like ISIS already do use them. Weakening the security of the iPhone will weaken it for the average user, but a determined threat will still have plenty of options to use to avoid surveillance.
-
- Posts: 5
- Joined: Mon Feb 22, 2016 10:54 pm
- Alma Mater: Virginia Tech
- Party: Independent
Re: Apple vs. Feds
I can answer everyone's question. There are two separate issues going on here.
First, let's talk about this guys iPhone it was an iPhone 5c. The iPhone 5c was a less powerful version of the iPhone 5 and did not have what Apple called a Security enclave in it. What does that mean, basically you can upload a different operating system to the phone allowing the FBI do to what it wants. No problem right, agree except for this....
Starting with iPhone 5 or 5s (don't remember), Apple added the Security enclave. What this does is encrypt everything on the phone using the devices UUID, a random string of text, and your passcode. That means even Apple cannot decrypt your phone. They cannot upload a custom operating system circumventing the software controls or give access to anyone. Ever notice when you go to install an iOS update it asks for your passcode? Its unlocking the encrypted part of your system to allow the iOS update.
So you are saying to yourself so what, Apple can help in this case, yes it can, but now you have set a precedence. If Apple complies with this order, a subsequent case could have Apple being required to unlock any iPhone at any time and what does that mean you ask. Simple they will have to release an iOS update that gives the Government backdoor access to your phone effectively circumventing encryption and every American citizen's right to privacy. The problem here is there is no way to limit WHO uses the backdoor like say a hacker.
So this is a privacy issue and a security issue all "stop" terrorism. Before some of you agree with what the Government is asking I ask that you look up the statistics of what the chances are being killed by a terrorist vs say cancer, car accident, etc. You would be surprised at the lengths we are going to "stop" terrorism.
HokieForever
First, let's talk about this guys iPhone it was an iPhone 5c. The iPhone 5c was a less powerful version of the iPhone 5 and did not have what Apple called a Security enclave in it. What does that mean, basically you can upload a different operating system to the phone allowing the FBI do to what it wants. No problem right, agree except for this....
Starting with iPhone 5 or 5s (don't remember), Apple added the Security enclave. What this does is encrypt everything on the phone using the devices UUID, a random string of text, and your passcode. That means even Apple cannot decrypt your phone. They cannot upload a custom operating system circumventing the software controls or give access to anyone. Ever notice when you go to install an iOS update it asks for your passcode? Its unlocking the encrypted part of your system to allow the iOS update.
So you are saying to yourself so what, Apple can help in this case, yes it can, but now you have set a precedence. If Apple complies with this order, a subsequent case could have Apple being required to unlock any iPhone at any time and what does that mean you ask. Simple they will have to release an iOS update that gives the Government backdoor access to your phone effectively circumventing encryption and every American citizen's right to privacy. The problem here is there is no way to limit WHO uses the backdoor like say a hacker.
So this is a privacy issue and a security issue all "stop" terrorism. Before some of you agree with what the Government is asking I ask that you look up the statistics of what the chances are being killed by a terrorist vs say cancer, car accident, etc. You would be surprised at the lengths we are going to "stop" terrorism.
HokieForever
-
- Posts: 1355
- Joined: Thu Jun 18, 2015 4:24 pm
- Alma Mater: Virginia Tech
- Party: Independent
Re: Apple vs. Feds
HokieForever dropping the knowledge bomb.HokieForever wrote:I can answer everyone's question. There are two separate issues going on here.
First, let's talk about this guys iPhone it was an iPhone 5c. The iPhone 5c was a less powerful version of the iPhone 5 and did not have what Apple called a Security enclave in it. What does that mean, basically you can upload a different operating system to the phone allowing the FBI do to what it wants. No problem right, agree except for this....
Starting with iPhone 5 or 5s (don't remember), Apple added the Security enclave. What this does is encrypt everything on the phone using the devices UUID, a random string of text, and your passcode. That means even Apple cannot decrypt your phone. They cannot upload a custom operating system circumventing the software controls or give access to anyone. Ever notice when you go to install an iOS update it asks for your passcode? Its unlocking the encrypted part of your system to allow the iOS update.
So you are saying to yourself so what, Apple can help in this case, yes it can, but now you have set a precedence. If Apple complies with this order, a subsequent case could have Apple being required to unlock any iPhone at any time and what does that mean you ask. Simple they will have to release an iOS update that gives the Government backdoor access to your phone effectively circumventing encryption and every American citizen's right to privacy. The problem here is there is no way to limit WHO uses the backdoor like say a hacker.
So this is a privacy issue and a security issue all "stop" terrorism. Before some of you agree with what the Government is asking I ask that you look up the statistics of what the chances are being killed by a terrorist vs say cancer, car accident, etc. You would be surprised at the lengths we are going to "stop" terrorism.
HokieForever
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
They have yhe uuid of every device so that's not really true.HokieForever wrote:I can answer everyone's question. There are two separate issues going on here.
First, let's talk about this guys iPhone it was an iPhone 5c. The iPhone 5c was a less powerful version of the iPhone 5 and did not have what Apple called a Security enclave in it. What does that mean, basically you can upload a different operating system to the phone allowing the FBI do to what it wants. No problem right, agree except for this....
Starting with iPhone 5 or 5s (don't remember), Apple added the Security enclave. What this does is encrypt everything on the phone using the devices UUID, a random string of text, and your passcode. That means even Apple cannot decrypt your phone. They cannot upload a custom operating system circumventing the software controls or give access to anyone. Ever notice when you go to install an iOS update it asks for your passcode? Its unlocking the encrypted part of your system to allow the iOS update.
So you are saying to yourself so what, Apple can help in this case, yes it can, but now you have set a precedence. If Apple complies with this order, a subsequent case could have Apple being required to unlock any iPhone at any time and what does that mean you ask. Simple they will have to release an iOS update that gives the Government backdoor access to your phone effectively circumventing encryption and every American citizen's right to privacy. The problem here is there is no way to limit WHO uses the backdoor like say a hacker.
So this is a privacy issue and a security issue all "stop" terrorism. Before some of you agree with what the Government is asking I ask that you look up the statistics of what the chances are being killed by a terrorist vs say cancer, car accident, etc. You would be surprised at the lengths we are going to "stop" terrorism.
HokieForever
Unvaccinated,. mask free, and still alive.
-
- Posts: 5
- Joined: Mon Feb 22, 2016 10:54 pm
- Alma Mater: Virginia Tech
- Party: Independent
Re: Apple vs. Feds
But they don't have the random key or the user's security code, the only thing the UUID does is associate the encryption with that device and that device only. That is why they can't take a "copy" of the memory and take it elsewhere to "crack", the encrypted part of the system won't even attempt to allow an unlock unless the UUID associated with it is present. The UUID is just an identifier not a part of the encryption itself.awesome guy wrote: They have yhe uuid of every device so that's not really true.
HokieForever
- awesome guy
- Posts: 54187
- Joined: Wed Aug 21, 2013 7:10 pm
- Party: After 10
- Location: Plastic Flotilla:Location Classified
Re: Apple vs. Feds
HokieForever wrote:But they don't have the random key or the user's security code, the only thing the UUID does is associate the encryption with that device and that device only. That is why they can't take a "copy" of the memory and take it elsewhere to "crack", the encrypted part of the system won't even attempt to allow an unlock unless the UUID associated with it is present. The UUID is just an identifier not a part of the encryption itself.awesome guy wrote: They have yhe uuid of every device so that's not really true.
HokieForever
Sure they do. They have the random keys for every phone created at the factory. They don't need the security code as that's not part of the key. Just listen to what they're saying, they say they have the capability to push an update to all phones to unlock it. They couldn't do that if the key was in the user domain. They just don't want to do it and the claims of breaking every phone just isn't true.
Unvaccinated,. mask free, and still alive.