Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Talisker
So is all that expertise why you knew enough to stick to software and not address my point about back doors in hardware, since Apple is, of course, the SOLE provider of the hardware their "safe" software runs on?

I don't address the existence of the tooth fairy either. There is no credible evidence anywhere for the existence of back doors in Apple products. If one existed, it would be irrelevant, anyway.

However, for the moment, let me grant you the existence of your mythical hardware "backdoor." Let's hypothesize the government or a thief siezes your iPhone and then uses this "backdoor" to get into your device. What have they gained, Talisker? Not a damn thing!

Why? All they have succeeded getting is access to an encrypted pile of gobble-de-gook. Without YOU entering your passcode to unencrypt the data as you access it, the data remains encrypted! Your passcode isn't stored anywhere on the device, and neither is the entangling code, which has to be calculated each time your passcode is presented. Their break-in attempts through your magical "back-door," to look at the data, whether through hardware or software, can get them only diddly and squat! That's it.

Try reading the technical specifications and protocols of exactly what Apple is doing instead of relying on some ill-educated pundits' or analysts' theories. . . It really is pretty straight forward. The data on the iPhone and iPad is by default encrypted as soon as the user sets a passcode. That passcode is entangled with a hardware hash unique to the device created from the UUID. If the device has a finger print sensor then the hash of the prints are entangled as well, as I understand it. For the iCloud, you can set Two-Factor ID, which requires Apple to send a six digit passcode to a device known to be in your control, which you must enter, before you may gain access, change anything, etc.

About the only way they could access your data would be to grab your iPhone/iPad out of your hand after you've entered your passcode and it's open.

As I told you, you are entitled to your own opinion, including opinions about "people like me," but since you know nothing about me, you are not entitled to your own facts. . . especially when you post things that are blatently not facts. . . like uninformed, opinionated claims about mythical "back doors." . . . especially when they are essentially irrelevant to gaining access to data.

71 posted on 10/20/2014 5:25:15 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 67 | View Replies ]


To: Swordmaker
I don't address the existence of the tooth fairy either. There is no credible evidence anywhere for the existence of back doors in Apple products. If one existed, it would be irrelevant, anyway...

Well then you better rush your good news to MIT, NSA, CIA & the DOD, Mr. Invisible, because they seem to be a little worried about it. Maybe they just don't have your professional expertise in the matter. Or maybe they don't realize that software encryption makes hardware backdoors irrelevant. Go get 'em, Tiger, and remember to castigate them for their "theories." LOL, you're dismissed.

NSA’s Own Hardware Backdoors May Still Be a “Problem from Hell”

75 posted on 10/24/2014 7:33:02 PM PDT by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 71 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson