Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: dhs12345; ClearCase_guy
Like the locksmith, Apple would and should help the feds open the phone as long as the feds have followed due process and got a search warrant. Apple could set the number of password retrys to unlimited which is what I heard that the feds asked for. I don’t think that the feds were asking Apple to put a hidden port in their general software release. That, I would be very worried about.

To do that requires writing an entirely new version of the operating system of the iPhone and then installing it on the SUBJECT DEVICE, as the court order calls it. Apple is also ordered to GIVE that new tool, the hacked OS and the means to put it on an iPhone to the FBI. That software would be a universal unlock key to every iPhone everywhere. That would destroy the invulnerability of the entire iOS ecosystem that Apple has been building for five years.

Any such ability to unlock the passcode trials compromises the security of over 800,000,000 iOS users around the world, people who have bought the system with the assurance that it is safe and secure. The US Government is demanding that Apple itself hack its own OS and then give them the hack. There is ZERO chance that hack will remain safe and not be released out into the wild where hackers and crooks will get their hands on it.

Several years ago, RIM was asked to write a hack that would get the authorities into a Blackberry phone that a child molester was suspected of having kiddie porn in. They agreed only after being assured that the hack they supplied would be destroyed after being used. The police used it, found thousands of vile pictures, and got a conviction. During the trial, in which the pictures played a prominent role, the judge ordered the defense was entitled to examine the code of the hack, so ordered it turned over to them under seal. Then AFTER the trial, the media sued to get a copy in the public interest! The idiot judge ruled the public's right to know trumped any agreement the police may have made about destroying the code, and ordered it released! But that didn't really matter anyway. That didn't matter anyway. The defense's IT expert who examined the code, kept a copy, and gave it to some friends, who gave it to other friends, and so on. So did the defense lawyers.

"Interesting game. The only winning move is not to play." Joshua, WOPR, War Games

The only way to keep it out of the hands of crooks and hackers is to never make it in the first place.

42 posted on 02/27/2016 10:01:51 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 35 | View Replies ]


To: Swordmaker

Thanks swordmaker.


49 posted on 02/28/2016 9:17:49 AM PST by dhs12345
[ Post Reply | Private Reply | To 42 | View Replies ]

To: Swordmaker
Not necessarily.

I bet that there are “vulnerabilities” in the current releases, that only Apple already knows about, and I bet that Apple could break into the >perp’s phone, only< and provide access without “including it in the product software releases.” After all, they designed the OS, apps, and hardware! They are the experts.

On the other hand, I am against Apple giving the ability to crack a phone to the FBI because then the feds would be bypassing due process. The FBI or other agencies would be able to bypass a judge and search warrant.

Maybe there is an intermediate entity, like locksmiths, whose job it is to crack and hack. Like locksmiths, they would be certified. After all, a locksmith could break into anyone’s home or business and I don't believe that happens too often.

Also, the down side to all of this is that Apple, Apple employees, Apple affiliates would know how to crack a phone (if they don't already know) and this information would probably be leaked to bad people.

A side note: most of the information on a device (but not all) is probably already available via other means. Telephone call records and maybe even text messages are tracked by the provider, pictures and other personal information is uploaded to “the cloud” — weren't a bunch of actor's personal photos stolen from an unsecured “cloud device?” and emails are stored on the email server which is probably owned by the ISP or email provider like Yahoo, etc.

54 posted on 02/29/2016 7:37:24 AM PST by dhs12345
[ Post Reply | Private Reply | To 42 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson