You aren't. But it is pointless to engage with the Apple fanboy/tool contingent.Glad I'm not the only one![]()
You aren't. But it is pointless to engage with the Apple fanboy/tool contingent.Glad I'm not the only one![]()
On second thought, let's hope exactly the opposite of that.Let's hope that what comes out of this is government regulation on the cell phone industry that mandates certain levels of backdoor capabilities to help facilitate in investigations like this. I'm all for the cell phone company being the "keepers of the keys" and charging the government a fee for this though.
FYPThis thing seemed to go off the rails when the "backdoors for everyone except Quez" meme showed up.
Of course not, one of their customers was a terroristDon't they have a right to protect their company and brand, along with hundreds of millions of their customers?
Don't they have a right to protect their company and brand, along with hundreds of millions of their customers?
of course. but they also have to comply with the court. It gets gray when the court demands something that puts the above at risk and "backdoors for all" would certainly be an overstep.Don't they have a right to protect their company and brand, along with hundreds of millions of their customers?
I have a problem with the government forcing a company to create software that does not exist. For the sole purpose of negating one of the selling points of their own products. If Apple loses the battle in court, I hope they put an intern on it and it takes them two decades.Do you like hackers having access to your banking/financial information? It doesn't have to be coordinates to the lost arc of the covenant to be really important.
The bigger issue I have is the government forcing the company to create something which itself is illegal.I have a problem with the government forcing a company to create software that does not exist. For the sole purpose of negating one of the selling points of their own products. If Apple loses the battle in court, I hope they put an intern on it and it takes them two decades.
It's ok guys, we got the Commish's word that this wont ever be hacked or leaked, ever. Time to let it go.
Jesus christ.Let's hope that what comes out of this is government regulation on the cell phone industry that mandates certain levels of backdoor capabilities to help facilitate in investigations like this. I'm all for the cell phone company being the "keepers of the keys" and charging the government a fee for this though.
To that, Apple does come across as a bit of a ####. Something like this shouldn't have gotten to a court order.
Then it can't be done, right? They'd explain why and be done with it.How can the government, who can't figure out how to do something, compel someone else to do it? what if the answer is "it can't be done"? How do they force someone to do something that they can't do? How do they prove that it can even be possible if they themselves can't do it?
agreedAs a long time Apple basher I find myself in the somewhat awkward position of siding with Apple. The government has no right to a "master key" IMHO.
The goverment is asking Apple to create a Master Key.agreedAs a long time Apple basher I find myself in the somewhat awkward position of siding with Apple. The government has no right to a "master key" IMHO.
go back and read my other posts...not posting it all again. If you really care, and I suspect you don't, I said that if I were Apple, I'd tell them to pound sand on the request for a master key. I'd give them all the data they requested though and I'd stay away from the fear/strawman line around "OMG WHAT IF IT GOT OUT?!?!?!?!?!?!?!" shtick. I'd demand complete control over the device and it would never leave the Apple facilities. It's not that complicated.The goverment is asking Apple to create a Master Key.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
We PROMISE this will never get out and it will only be used this once!go back and read my other posts...not posting it all again. If you really care, and I suspect you don't, I said that if I were Apple, I'd tell them to pound sand on the request for a master key. I'd give them all the data they requested though and I'd stay away from the fear/strawman line around "OMG WHAT IF IT GOT OUT?!?!?!?!?!?!?!" shtick. I'd demand complete control over the device and it would never leave the Apple facilities. It's not that complicated.
It's as much reality as a developer going rogue and dropping a backdoor on their own. How do you live with the fear knowing that's possible?We PROMISE this will never get out and it will only be used this once!
Never mind I feel better now.
It's not a strawman argument, it's reality. It doesn't matter if Apple creates the backdoor and uses it to get the info or if they provide the backdoor to the FBI. Once the OS security has been compromised the encryption is worthless because eventually that flaw will be found and used.
You should email that to Tim Cook. Seems like he's been approaching this all wrong from the beginning.It's as much reality as a developer going rogue and dropping a backdoor on their own. How do you live with the fear knowing that's possible?
By the way, the correct way to "hack" this thing is to remove the encryption all together for a period of time. There is zero need to poke holes in it for the reasons you state. Take it out of the picture completely, get the data, reinstate it.
I don't have a problem with the way he reacted to the initial request. I don't care too much that he politicized this though. It wasn't necessary. There's a way for both parties to get out of this what they want. All he's done is ruffle the feathers of the minions.You should email that to Tim Cook. Seems like he's been approaching this all wrong from the beginning.
you could alter your code in a way that basically says "if it's installed on device X do this....otherwise, do this" sure.....or they could take the memory out of the phone and run the encrypted data through their encryption algorithm, decrypt it and hand it over.Correct this if it's wrong but I heard some "expert" talking on the radio about how it is possible to create this based on the UDID or the unique device ID so that it can only be applied to this one device?
THISyou could alter your code in a way that basically says "if it's installed on device X do this....otherwise, do this" sure.....or they could take the memory out of the phone and run the encrypted data through their encryption algorithm, decrypt it and hand it over.
exactly....If the government has a legally compelling reason to get the decrypted data, it doesn't necessarily follow that they can dictate how the data is decrypted or who decrypts it.
Apple can do this as well...no need to go off the deep end with all this crap that's been spewed in this thread.
Not that it matters who the customer is, but in this case the customer was the government.Of course not, one of their customers was a terrorist
You think this is about Apple? This is about personal liberty. Nobody's opinion would change if this was Android being asked to do this.You aren't. But it is pointless to engage with the Apple fanboy/tool contingent.
Well, in this case, the OS is device specific, but the rest is basically true. It couldn't be controlled if they just turned it over which is why it's stupid they'd even ask Apple to do it. There's no way in hell.I know pretty much nothing about e-device security, so talks of encryption and methods of end-rounding safety measures is mostly lost on me...
That said, there seems to be 2 methods available of retrieval and this is directed solely at the creation of a new iOS method and the slippery slope of leakage argued after creation:
OS is software and not necessarily device specific, correct? The phone in question is not a possession of Apple but of the County (don't remember which one). If such open software were created and put on the phone in order to get the data that's hidden, once retrieved that phone does not go back to Apple. It most likely remains in the possession of the FBI with a slight chance of return to the County. That, I think, is where the "master key can't be controlled" argument rests. The FBI now has the software needed to access other iOS devices and has no need to ask Apple's permission any longer, correct?
ExactlyYou think this is about Apple? This is about personal liberty. Nobody's opinion would change if this was Android being asked to do this.
Best I can tell, the gov't has demanded X and Apple's told them to pound sand. Of course there are options but they get in the way ofCan someone catch me up here. Is it currently an option for the GOV to hand the phone to Apple or someone else to crack, and for them to hand that back with the desired information?
I get that the government has requested something much bigger, but I'm having trouble following what is actually an agreeable option between both parties at this point.
Yeah, upon further review, NFW. It's a very bad precedent.1) what if someone other than the US govt uses the exploit to get your info. I look forward to your plan to collect.1) what if someone other than the US govt uses the exploit to get your info. I look forward to your plan to collect.
2) what about when the US govt uses the exploit, you say "you did", they say "nuh uh". Explain how that plays out in your world.
2) what about when the US govt uses the exploit, you say "you did", they say "nuh uh". Explain how that plays out in your world.
Great idea. I think the FISA court should hold jurisdiction over this as well. They seem to be doing a fine job.There is no fundamental right or high expectaion to privacy on your smart phone or any phone. The "strongest" right to privacy exisits in your domicile. That is often overcome by a warrant or appropriate probable cause. Outrage over privacy rights being taken away here are pretty outrageous considering the circumstances and the law
The governement cannot likely force Apple at the moment to create software for them to create a backdoor for their phones. However, this will likely lead to legislation that requires such backdoor access be available on all phones with proper court approval being necessary to access them. If companies don't comply, then they shouldn't be allowed to sell their goods and all noncompliant phones in the stores seized.
Apple should work with the government here.
Another aspect of this is that once Apple does what the FBI asks this time there will be expectations that Apple will comply in the future when another "urgent" case pops up. Which means that Apple will likely keep the modified iOS around so they don't have to reinvent the wheel every time thus increasing opportunity for the software to get out.That one guy said:I know pretty much nothing about e-device security, so talks of encryption and methods of end-rounding safety measures is mostly lost on me...
That said, there seems to be 2 methods available of retrieval and this is directed solely at the creation of a new iOS method and the slippery slope of leakage argued after creation:
OS is software and not necessarily device specific, correct? The phone in question is not a possession of Apple but of the County (don't remember which one). If such open software were created and put on the phone in order to get the data that's hidden, once retrieved that phone does not go back to Apple. It most likely remains in the possession of the FBI with a slight chance of return to the County. That, I think, is where the "master key can't be controlled" argument rests. The FBI now has the software needed to access other iOS devices and has no need to ask Apple's permission any longer, correct?
It's basically what is going to happen if Apple doesn't help voluntarily.Great idea. I think the FISA court should hold jurisdiction over this as well. They seem to be doing a fine job.
This is like when the guy from The Big Short wrote a letter to the US Government offering to help them by explaining how he predicted the crash. He never heard back and got audited a bunch of times.coyote5 said:
How's that work? The government can say what products can and can't be sold, even if there is a huge demand for that product? This isn't like FDA approval for a drug.There is no fundamental right or high expectaion to privacy on your smart phone or any phone. The "strongest" right to privacy exisits in your domicile. That is often overcome by a warrant or appropriate probable cause. Outrage over privacy rights being taken away here are pretty outrageous considering the circumstances and the law
The governement cannot likely force Apple at the moment to create software for them to create a backdoor for their phones. However, this will likely lead to legislation that requires such backdoor access be available on all phones with proper court approval being necessary to access them. If companies don't comply, then they shouldn't be allowed to sell their goods and all noncompliant phones in the stores seized.
Apple should work with the government here.
Hey man, if, like, you don't have nothin' to hide, or somethin', then why do you hate 'Murica?DOJ filed motion to compel Apple to assist FBI.
You have no expectation to privacy, period. Right guys? Neat "free" country.