Anybody Notice The Feds Wants Apple To Break Into An Americans phone

Apple now claiming the password had been changed after it was seized by authorities.
cptjohnstone's Avatar
Apple now claiming the password had been changed after it was seized by authorities. Originally Posted by i'va biggen
you got a link? or just more babble babble
CuteOldGuy's Avatar
LL, why are you so willing to trade Liberty for security? You put way too much trust in government. You're not an idiot like so many on here. Figure it out, man!
  • DSK
  • 02-19-2016, 11:06 PM
Hypocrite. How can you whine about someone hijacking a thread and then hijack another thread within 10 minutes?

Takes a certain lack of moral fiber, wouldn't you say, shitfly? Originally Posted by Yssup Rider
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."

Now explain how ...

"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer! Originally Posted by LexusLover
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein Originally Posted by DSK
Nobody sweats the Austin Reacharound Crew. -gnadfly
LexusLover's Avatar
LL, why are you so willing to trade Liberty for security? Originally Posted by CuteOldGuy
Why are you so willing to misinterpret what others post?

I can ask you a similar question.

Why are you so willing to trade security for your so called "liberty"?

If you are so concerned about "protecting" your personal information on your cell phone, then don't put your personal information on your cell phone. If you don't want your personal information "perused" by the "government" then don't have your personal information where it can been "seen."

What apparently none of you "libertarians" have figured out is the Fourth Amendment doesn't keep the "government" from "looking and seeing," it only keeps the "government" from using what it "sees" against you!

Do you use WIFI?

You want to huff and puff about your information is no one else's business ... and if you want to keep it that way, ..

.. then don't do any crimes using your cell phone/Iphone as an instrumentality of the furtherance of the elements of the offense ... and also don't become a victim of crime for which the content of your cell phone/Iphone may produce some clues as to the person or persons responsible.

The appellate courts are perfectly willing (as a general rule) to protect your "right of privacy," but the decades of exceptions that have been crafted have ALWAYS been centered around "public safety" and changes in the technology available to crooks.....and now terrorists. Fly much?
LexusLover's Avatar
Apple now claiming the password had been changed after it was seized by authorities. Originally Posted by i'va biggen
Oh, my! How nefarious and diabolical of the investigators!

So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!

Securing the evidence is a paramount consideration to protect the integrity!
Oh, my! How nefarious and diabolical of the investigators!

So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!

Securing the evidence is a paramount consideration to protect the integrity! Originally Posted by LexusLover
https://www.yahoo.com/finance/news/a...53147176.html#
LexusLover's Avatar
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s). Originally Posted by gnadfly
And you've "assumed" the software does not, and has not, existed prior to the phones being marketed with the "super encryption" software installed. Given the general intelligence the manufacturer has displayed, I have a reasonable doubt that the manufacturer installed encrypting software for which they had no "translator"!

Do you all actually believe Apple has no idea how to translate their own encryption? Or worse yet, do you believe a software engineer created a program to encrypt data without knowing how it is structured, how it functions, and how to defeat it?

All of the fear mongering about "criminals" obtaining the "translating software" can just as easily be the basis for confiscating firearms by the government from those lawfully in possession. How do "we" know the "bad guys" won't get them?

My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place.
LexusLover's Avatar
https://www.yahoo.com/finance/news/a...53147176.html# Originally Posted by i'va biggen
The link is not SECURE! How ironic!!!!
LexusLover's Avatar
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."

Now explain how ...

"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer! Originally Posted by LexusLover
That is a perfect example of an excellent chain of custody, but I can hear the ghost of Johnny Cochran saying this:

"If the data ain't encrypted then whitey done scripted to make the dark man convicted!" Originally Posted by DSK
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s). Originally Posted by gnadfly
There is always a risk. It's a "cost-benefit" analysis.
WTF's Avatar
  • WTF
  • 02-20-2016, 09:43 AM

My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place. Originally Posted by LexusLover
And if you are wrong...
LexusLover's Avatar
And if you are wrong... Originally Posted by WTF
.. and if you are "wrong"?

Do you want "encryption" that protects your personal information? Or not?