Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Government versus Freedom
2/22/2016 | Tracker47

Posted on 02/22/2016 2:04:17 PM PST by Tracker47

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 02/22/2016 2:04:17 PM PST by Tracker47
[ Post Reply | Private Reply | View Replies]

To: Tracker47

That didn’t carry the punctuation.


2 posted on 02/22/2016 2:04:51 PM PST by Tracker47
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tracker47

Did you pay the King’s Tax on this morning’s whiskey?


3 posted on 02/22/2016 2:07:51 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mrsmith

No, but I hunted his forest without his approval....


4 posted on 02/22/2016 2:09:29 PM PST by Tracker47
[ Post Reply | Private Reply | To 3 | View Replies]

To: Tracker47

5 posted on 02/22/2016 2:12:34 PM PST by IncPen (There is not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tracker47

Paragraphs are your friend.


6 posted on 02/22/2016 2:14:24 PM PST by Fhios (circa 2016: Truth will be outlawed unless pre-approved.)
[ Post Reply | Private Reply | To 1 | View Replies]


7 posted on 02/22/2016 2:25:00 PM PST by DoughtyOne (Facing Trump nomination inevitability, folks are now openly trying to help Hillary destroy him.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tracker47
You have likely violated several laws just accessing and reading this

Now you tell me.

8 posted on 02/22/2016 2:27:54 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tracker47

The Apple case is unique in that the owner of the phone is dead, and the encryption technology separates the data from Apple like a locked suitcase which only the phone owner has.

Warrants are really great things. Backdoors where potentially anyone can access without a check — not so hot.

People understand both concepts, and hopefully agree with them. The phone or warrant can go to Apple, and they take care of it. The “suitcase” never goes outside Apple, but the data inside the suitcase goes to HSA.

Apple can update its end user agreement to reflect this. However, I do understand everyone’s meta data collection, warrant flooding, etc. concerns.

Maybe a compromise would means law enforcement is limited to x number of requests at y level severity per pre-determined timeframe (and maybe geographic area for the HIGHEST level). And once the threat passes or process of elimination is complete, then a new “suitcase lock” is put back in place.

I’m no lawyer, but even I know wiretap laws on the books can cover quite a bit of this.


9 posted on 02/22/2016 2:29:36 PM PST by Read Write Repeat
[ Post Reply | Private Reply | To 2 | View Replies]

To: IncPen

This looks like a job for Captain Carriage Return.


10 posted on 02/22/2016 2:57:00 PM PST by Idaho_Cowboy (Ride for the Brand. Joshua 24:15)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Read Write Repeat

More like a safe maker being ordered to crack their own safe: their whole point in making the thing in the first place was that NOBODY could get inside without the code/key. Should the safe maker crack their own safe (under duress) customer confidence plummets; if done right, they simply can’t crack it.

Any precedent for compelling a safe maker being ordered to crack their own safe?


11 posted on 02/22/2016 3:10:42 PM PST by ctdonath2 (History does not long entrust the care of freedom to the week or the timid. - Ike)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Tracker47
Not sure what that mass of text says, but I will contribute anyway.

"As government expands, liberty contracts." - Ronald Reagan

12 posted on 02/22/2016 3:40:45 PM PST by ConservaTexan (February 6, 1911)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tracker47
"Last week, it was revealed that Tim Cook had agreed to "security audits" of its products sold in the country"

A deal he has made with the ChiComs.

13 posted on 02/22/2016 3:53:55 PM PST by fella ("As it was before Noah so shall it be again,")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ctdonath2

Limited use warrants vs. metadata mass storage — which do you prefer?


14 posted on 02/22/2016 4:03:51 PM PST by Read Write Repeat
[ Post Reply | Private Reply | To 11 | View Replies]

To: Read Write Repeat
Maybe a compromise would means law enforcement is limited to x number of requests

I agree with that. Where x=0. There are only two choices in computer security, back doors or no back doors. If we force Apple to create a back door it just means China will sell a phone with a PLA back door for the terrorists who want to avoid US snooping but are not afraid of the PLA.

The "suitcase" never goes outside Apple, but the data inside the suitcase goes to HSA.

DHS? No, they can gather data some other way. The inevitable solution, whether or not anyone likes it, is that the phone will not unlock or update without the passcode. Then Apple cannot be forced to provide an update that breaks the security. It will simply be impossible rather than difficult and counterproductive.

15 posted on 02/22/2016 4:05:09 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Read Write Repeat
Limited use warrants vs. metadata mass storage - which do you prefer?

Didn't realize that was our choice. Seems like you left out banning Muslims, infiltrating Muslims where necessary, etc

16 posted on 02/22/2016 4:07:29 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 14 | View Replies]

To: palmer

One doesn’t have to be a Muslim to say “I spit on the Fourth Amendment! Stick your Fourth Amendment warrant where the sun don’t shine! I’ve got unbreakable encryption!”

I hope when injured parties seeking justice are denied access to information on Iphones and take the law into their own hands they are granted some clemency.

After all, without the Fourth Amendment what choice did they have?


17 posted on 02/22/2016 4:23:11 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: palmer

I’m always for liberty and freedom.

1AX2A


18 posted on 02/22/2016 4:23:48 PM PST by Read Write Repeat
[ Post Reply | Private Reply | To 16 | View Replies]

To: Read Write Repeat

4th Amendment.
Feds have the power to search and seize. They do NOT have the power to compel an unwilling third party to make sense of what was seized.

3rd Amendment.
Feds are expressly prohibited from positioning government agents, real or virtual, for arbitrary monitoring and intimidation of private activity.


19 posted on 02/22/2016 7:07:38 PM PST by ctdonath2 (History does not long entrust the care of freedom to the week or the timid. - Ike)
[ Post Reply | Private Reply | To 14 | View Replies]

To: ctdonath2

https://www.law.cornell.edu/uscode/text/18/2518

One of many. Please, I’m not talking about APPLE’S end. I’m talking about LIBERTY.


20 posted on 02/22/2016 7:13:27 PM PST by Read Write Repeat
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson