Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Talisker
Nevertheless, IMHO Apple is pursuing an incrementalist yet determined approach to biometrically identified, cloud controlled, off-site data computing. What they call security and safety is, to me, big brother monitoring. Their Apple ID is seriously non-trivial person-software-hardware data tracking, and they have been very open about wanting to move all of their OS architecture to “i” style.

No, Tallisker, Apple has NOT been "open about moving all their OS architecture to the 'i' style", that has been the ANALYSTS talking among themselves. Apple has been pretty much mum on the subject. What Apple has been doing is moving to interactivity between all Apple devices but NOT making everything the same as Microsoft has attempted to do.

So everyone else is doing it too? Yep, they are. I won’t even address the Seattle idiots, they’ve always been obvious. And of course Google just laughs in your face and has hipsters spit out arrogant data-grabbing declarations between lattes. But Apple’s refusal to admit they’re just as bad makes them even worse to me. They add an insult to injury, a demand I accept their Big Mommy assurances and that I make myself 9 years old with trust. Sorry, no sale. And the attempt is more than annoying - its enraging. Because its a demand and a lie that reveals Apples contempt for everyone. In other words, pure liberalism.

Nor is Apple attempting to do the same thing that Apple or Google is trying to do. It is different. You are simply NOT PAYING ATTENTION. You are tied into the FUD echo chambers of the analysts who are also not paying attention to the actions that Apple HAS announced. You claim that "Apple's refusal to admit they're just as bad" is really ridiculous. Perhaps it is because THEY ARE NOT PLAYING THE GAME YOU ACCUSE THEM OF PLAYING!

Your assumption that it has to be a lie flies in the face of the facts. No other company has taken the actions that Apple has taken. Google jumped on the bandwagon with a limp "Me Too" after Apple refused to provide the keys to their Cloud encryption to the government. . . but Google still can decrypt what is stored with them. Apple cannot. That is a BIG DIFFERENCE you refuse to recongnize.

And if any of you think this little drama about the FBI being unable to reach data is true because of Apple’s heroic software encryption standards, you haven’t been reading the same articles I have on hardware back doors, or lack of cloud security. Doesn’t anyone get curious when the FBI starts yelling about Apple’s impenetrable security right after Apple’s biggest and most embarrassing software security failure in its history? Well I do.

Tallisker, after over thirty-five years in the computer industry, I suspect I know one HELL of a lot more about computer encryption than do you, and I can tell you that what Apple is saying is true. Apple iCloud was NOT penetrated, contrary to your claims. The articles you have been reading about lack of security in Apple's iCloud are FUD. . . pure and simple. I've read them, but I've also read the ones contradicting them from people who DO know what they are talking about. One idiot at the New York Times claimed Apple's pass codes could be broken by anyone's computer in an afternoon. . . based on what he claimed he read in their current Security paper. But he didn't read far enough. He assumed a six character pass code made of lower case letters and numbers, 36 characters, 36 6 possible combinations of pass codes. Apple actually allows a 256 character pass code made of any of the 227 characters accessible from the Keyboard! That means there are 256 227 possible combinations of passcodes (actually, a bit less because the rules of pass code construction will not allow more than two identical consecutive characters but at this size, that is a minuscule deduction) to try by brute force. . . and Apple has built in a requirement they must be done ON the device. . . and it has an increasing wait time between attempts. The amount of time it would take to test all of them would exceed many multiple quadrillions of years. . . far longer than it is estimated for the Universe to reach heat death.

The individual celebrities were hacked because of their choosing stupid security questions and answers that could be learned by anyone reading their fanzine biographies. The few iCloud accounts that were compromised were gotten into by the completely prosaic method of researching their security questions through phishing, reading fanzines, and talking to friends, and changing their passwords, which gained the invaders full access to their accounts. The people involved have come out and described how this was done. Nothing more.

NO ONE HACKED INTO iCLOUD. No ONE. In fact, analysis of the published images' Metadata showing where they came from and what devices created them revealed that many of them were never stored on iCloud in the first place, coming instead from Instagram, photobucket, picasa, Flicrkr and other sources including Google sources. . . and while some came from iDevices, others were often taken with Android devices and Windows PC webcams which would never have been stored on Apple servers. The photos, even some of those from the first group, date back before Apple iCloud. Ergo, there was no breach in iCloud. . . but just in individual accounts that were weakly protected.

You are welcome to your own opinion, but you are not welcome to our own facts. I saw the images. Later research shows they were, in fact, posted on the Web one week before the iBrute script that could have broken Apple ID passwords through brute force in FindMyiPhone was published. . . and were ignored until the guy posting them finally, in his attempt get attention and sell them, falsely claimed he "got them from iCloud." Since then, MORE celebrity nudes have appeared, and they come from the same source: an underground networked community of collectors who hack into celebrity computers, social sites, and other sources to steal compromised photos—a community of which this guy was a member who broke their rules, attempting to sell, rather then trade photos, outside their closed group.

Like I said, I’m a fanboy. I use a Mac, and I love it. But what’s going on with Apple (as well as most of the rest of the computing world) has me pretty depressed. It’s all about tracking people now - all of it, everywhere. And it’s grown so stark that Apple’s Happy Face looks like a clown in one of those slasher movies to me.

You are failing to recognize that Apple has made it possible that everything I send to the iCloud is already encrypted with MY 256 bit key, not Apple's, and they do not have access to it. . . nor can they get access to it. My key can be as large as I choose to make it.

64 posted on 10/20/2014 12:14:49 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 56 | View Replies ]


To: Swordmaker

Nor is Apple attempting to do the same thing that Apple or Google is trying to do.

Make that read “Nor is Apple attempting to do the same thing that Microsoft or Google is trying to do.”


65 posted on 10/20/2014 12:17:51 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 64 | View Replies ]

To: Swordmaker
Tallisker, after over thirty-five years in the computer industry, I suspect I know one HELL of a lot more about computer encryption than do you...

So is all that expertise why you knew enough to stick to software and not address my point about back doors in hardware, since Apple is, of course, the SOLE provider of the hardware their "safe" software runs on?

And does the logic behind your insults towards me in every paragraph concerning what you say is me "not paying attention" the same as you not paying attention to, or addressing, my hardware back door point?

LOL, thanks for playing. You admitted far more than you realize. And I too have over thirty-five years of experience, but my experience is in dealing with people like you.

67 posted on 10/20/2014 4:16:18 PM PDT by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 64 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson