Be like those two bozo's who lied about PPH that were charged by the government , right LL.Stay on topic you stupid bitch.
Everything the government charges another with is correct, right.
Originally Posted by WTF
You actually believe the "criminals" and "terrorists" are going to get a copy of the software to crack the encryption and then go around "cracking" everyone's Apple Phone? Originally Posted by LexusLoverYes. Kinda. Criminals, terrorists, the Chinese, NSA, exwife's lawyer, etc will exploit whatever is exploitable.
Yes but the question is ,Should they be able to compel Apple to do so?
Does the government have a legitimate interest in being able to access the data in phones? Originally Posted by LexusLover
The phone producers and consumers are probably better off with lawsuit to get a phone examined than a statute prohibiting a "government proof encryption."Certain phones. With a warrant. But they have no authority to demand a third party do their work for them.
"Frying pan into the fire!"
Does the government have a legitimate interest in being able to access the data in phones? Originally Posted by LexusLover
But they have no authority to demand a third party do their work for them. Originally Posted by CuteOldGuyAnd I thought the Government could not compel a citizen to purchase health insurance coverage or face a fine for not doing so either ..... but until someone shit cans the ACA .. that's what the law is as approved by the SCOTUS.
You actually believe the "criminals" and "terrorists" are going to get a copy of the software to crack the encryption and then go around "cracking" everyone's Apple Phone? Originally Posted by LexusLover
Yes. Kinda. Criminals, terrorists, the Chinese, NSA, exwife's lawyer, etc will exploit whatever is exploitable. Originally Posted by gnadflyIt's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."That is a perfect example of an excellent chain of custody, but I can hear the ghost of Johnny Cochran saying this:
Now explain how ...
"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer! Originally Posted by LexusLover
And I thought the Government could not compel a citizen to purchase health insurance coverage or face a fine for not doing so either ..... but until someone shit cans the ACA .. that's what the law is as approved by the SCOTUS.The ACA is unconstitutional, regardless of what the Court says. What is on my phone is not your, or anyone else's business. You want to see it? Get a warrant. Can't figure out how to open it? Too bad. The Fifth Amendment says I don't have to open it for you. And the 13th Amendment says you can't force Apple to, either. Why are you so afraid of freedom?
Each year ink manufacturers ARE REQUIRED to add to their formula specifically identifiable trace elements (metal) for that year's ink (for ball point pens). For what reason? Government tracing.
My question is: Who wants a statute passed prohibiting a manufacturer of cell phones (sold in this country or used in this country) from installing an encryption program that prevents the government from obtaining the data on the phone? Or would you rather the manufacturer "cooperate" on a case-by-case basis with a court order in house so that the data is mined from the phone IN HOUSE with the investigating agency represented when the data is retrieved to assure proper chain of custody in compliance with the order?
I can get a court order authorizing a lock smith to open a combination safe, who gets the "master combination" from the manufacturer of the safe? What's the difference as far as the manufacturer providing access to the "secure vault" the contents of which a third-party wants to examine and/or confiscate?
The only difference I see is someone puts too much shit on the cell phones and then wants to protect it, when what they should have done in the first place is not put all that shit on there! How many times has some hysterical hobbyist or provider posted about "losing" their Iphone and ALL THEIR CONTACT INFORMATION! When you start using your phone as a MAIN FRAME for your whole fucking life data storage ... then you "assume" the risk of it getting mined or lost. You are shifting the responsibility of your own security to Apple et al. Originally Posted by LexusLover
You would think that a warrant from the justice dept, on a case by case basis, especially on a terrorist would let Apple open the phone, without a software backdoor. Originally Posted by i'va biggenThat would be the "smart" thing to do. The "not so smart" thing to have done was to allow it get into the press and get jammed up in the Courts. Apple is banking on a Democratic President in 2017 to thwart any effort by a Republican controlled Congress to legislate a prohibition against untouchable "encryptions."