Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Swordmaker

> The Apple ID passcode linked to the iPhone belonging to one of the San Bernardino terrorists was changed less than 24 hours after the government took possession of the device, senior Apple executives said Friday. If that hadn’t happened, Apple said, a backup of the information the government was seeking may have been accessible

The information was passcode protected prior to the FBI and was retrievable, yet the information passcode protect after the FBI is not retrievable?

How does Apple know when the device password was changed?

Apple has a backup of the information?

I think Apple is putting out a smoke screen


6 posted on 02/19/2016 6:32:19 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Ray76
How does Apple know when the device password was changed?
Apple has a backup of the information?
I think Apple is putting out a smoke screen

Encrypted data has a header showing last date of access and change. Even though you can't see the encrypted information, the header has just enough information for one to enter the correct password to access the rest. Apple is not hiding anything, they caught the feds digging themselves into a hole.

12 posted on 02/19/2016 6:45:21 PM PST by roadcat
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76
I think Apple is putting out a smoke screen

A conflict between two untrustworthy entities.

Who to believe?

14 posted on 02/19/2016 6:46:13 PM PST by BlatherNaut
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76
The information was passcode protected prior to the FBI and was retrievable, yet the information passcode protect after the FBI is not retrievable?

How does Apple know when the device password was changed?

Apple has a backup of the information?

I think Apple is putting out a smoke screen

While Apple cannot see the passwords or the data, Apple can see when the passwords or data on iCloud were last modified. These devices are connected to the Internet and iCloud. That is the point. Apple KNOWS that someone changed the AppleID password after the terrorists were dead and after the authorities had seized the iPhone.

Tim Cook has made statements in the name of Apple in his position as CEO of the company. If those statement turn out to be false, the Sarbanes Oxley Act of 2002 would kick in and he could be personally fined up to $20,000,000 and sent to Federal Prison for 20 years, if those statement adversely impact the value of the company or its stock. A statement about the security of Apple's main product, its iPhones, if found to be false, would certainly impact the value of the company and its stock. Therefore, you can pretty much take what Tim Cook has said about the security of the iPhones as absolute truth.

I suspect that the iPhone did not even have a passcode on it when the authorities got it, or alternately, they discovered the passcode in the papers they also seized. Otherwise how did they get into the iPhone to CHANGE the AppleID? If it did not have a passcode when seized, they added it after changing the AppleID because their actual goal is to get Apple to make a universal iPhone hacker tool to get into ALL iPhones. That has been the government's goal for several years now.

For example, in 2011, the NSA implied that Apple had joined PRISM by publishing a chart showing Apple would be a member as of October 2012, when they had not and would not be, in an attempt to get Apple to knuckle under, using the theory that if Apple had the reputation of already joining in the public's perception, Apple might as well do it anyway. Apple still refused. The government has been bringing all kinds of legal pressure against Apple including bogus anti-trust suits such as the e-books suit, where Apple was treated as a price-fixer, even though they brought MORE competition to the e-book market and actually brought prices of e-books DOWN overall, which Apple is still fighting all the way to the US Supreme Court.

Some legal observers are of the opinion that these legal woes Apple is experiencing is because Apple won't play ball with the NSA and allow backdoors on their devices.

18 posted on 02/19/2016 6:54:09 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76
The information was passcode protected prior to the FBI and was retrievable, yet the information passcode protect after the FBI is not retrievable?

How does Apple know when the device password was changed?

Apple has a backup of the information?

I think Apple is putting out a smoke screen

While Apple cannot see the passwords or the data, Apple can see when the passwords or data on iCloud were last modified. These devices are connected to the Internet and iCloud. That is the point. Apple KNOWS that someone changed the AppleID password after the terrorists were dead and after the authorities had seized the iPhone.

Tim Cook has made statements in the name of Apple in his position as CEO of the company. If those statement turn out to be false, the Sarbanes Oxley Act of 2002 would kick in and he could be personally fined up to $20,000,000 and sent to Federal Prison for 20 years, if those statement adversely impact the value of the company or its stock. A statement about the security of Apple's main product, its iPhones, if found to be false, would certainly impact the value of the company and its stock. Therefore, you can pretty much take what Tim Cook has said about the security of the iPhones as absolute truth.

I suspect that the iPhone did not even have a passcode on it when the authorities got it, or alternately, they discovered the passcode in the papers they also seized. Otherwise how did they get into the iPhone to CHANGE the AppleID? If it did not have a passcode when seized, they added it after changing the AppleID because their actual goal is to get Apple to make a universal iPhone hacker tool to get into ALL iPhones. That has been the government's goal for several years now.

For example, in 2011, the NSA implied that Apple had joined PRISM by publishing a chart showing Apple would be a member as of October 2012, when they had not and would not be, in an attempt to get Apple to knuckle under, using the theory that if Apple had the reputation of already joining in the public's perception, Apple might as well do it anyway. Apple still refused. The government has been bringing all kinds of legal pressure against Apple including bogus anti-trust suits such as the e-books suit, where Apple was treated as a price-fixer, even though they brought MORE competition to the e-book market and actually brought prices of e-books DOWN overall, which Apple is still fighting all the way to the US Supreme Court.

Some legal observers are of the opinion that these legal woes Apple is experiencing is because Apple won't play ball with the NSA and allow backdoors on their devices.

19 posted on 02/19/2016 6:54:10 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76
I think Apple is putting out a smoke screen

This isn't making much sense, is it?

25 posted on 02/19/2016 7:20:21 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76
I think Apple is putting out a smoke screen

Nope - worked in secure networking for many years - do some research and you'll find that some of the safeguards available would do just what Apple claims

The Feebs screwed themselves and want Apple to clean up the mess and add a complimentary backdoor (did you miss the several references to that in the article?) which renders the security useless - unless you actually trust the government in all things..

41 posted on 02/20/2016 4:02:44 AM PST by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76

If an iDevice is not set to back up to iCloud, Apple doesn’t have a copy - as these reportedly weren’t. However, when you change your AppleID password, it does change it on all your Apple ‘subaccounts,’ not just on the device you’re using. Specifically, it changes your password on the iTunes Music Store servers - that’s how you can establish chronology of password changes, among other things.


43 posted on 02/20/2016 6:31:08 AM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: Ray76

I don’t know if you have an iPhone, but if you do you know you have a password for the account, which allows you to access iTunes, the App store and your iCloud account; and then you have a PIN or passcode that allows you to unlock the phone itself. From this story, it sounds like the account password was reset, and as a result any backup that may have been stored on the iCloud account or synced with a desktop device is now inaccessible. That is different from saying the PIN to unlock the device was changed.


81 posted on 02/22/2016 6:45:12 AM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson