Hypocrite. How can you whine about someone hijacking a thread and then hijack another thread within 10 minutes?“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
Takes a certain lack of moral fiber, wouldn't you say, shitfly? Originally Posted by Yssup Rider
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
Now explain how ...
"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer! Originally Posted by LexusLover
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”Nobody sweats the Austin Reacharound Crew. -gnadfly
― Robert A. Heinlein Originally Posted by DSK
LL, why are you so willing to trade Liberty for security? Originally Posted by CuteOldGuyWhy are you so willing to misinterpret what others post?
Apple now claiming the password had been changed after it was seized by authorities. Originally Posted by i'va biggenOh, my! How nefarious and diabolical of the investigators!
Oh, my! How nefarious and diabolical of the investigators!https://www.yahoo.com/finance/news/a...53147176.html#
So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!
Securing the evidence is a paramount consideration to protect the integrity! Originally Posted by LexusLover
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s). Originally Posted by gnadflyAnd you've "assumed" the software does not, and has not, existed prior to the phones being marketed with the "super encryption" software installed. Given the general intelligence the manufacturer has displayed, I have a reasonable doubt that the manufacturer installed encrypting software for which they had no "translator"!
https://www.yahoo.com/finance/news/a...53147176.html# Originally Posted by i'va biggenThe link is not SECURE! How ironic!!!!
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."
Now explain how ...
"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer! Originally Posted by LexusLover
That is a perfect example of an excellent chain of custody, but I can hear the ghost of Johnny Cochran saying this:
"If the data ain't encrypted then whitey done scripted to make the dark man convicted!" Originally Posted by DSK
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s). Originally Posted by gnadflyThere is always a risk. It's a "cost-benefit" analysis.