Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Tech giants don’t want Obama to give police access to encrypted phone data
The Washington Post ^ | May 19 at 8:34 AM | By Ellen Nakashima

Posted on 05/19/2015 3:27:56 PM PDT by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last
To: dayglored
Ham radio (that's my current thinking)?

Do you have a tech license yet? Wife and I got ours a few years ago. I time to be able to do something with it though. Not enough hours in a day, especially with sites like Free Republic to suck all my spare cycles.

41 posted on 05/19/2015 6:44:02 PM PDT by zeugma (Are there more nearby spiders than the sun is big?)
[ Post Reply | Private Reply | To 35 | View Replies]

To: sargon

“And, as I mentioned, it would seem to me that forcing someone to reveal their password could raise Fifth Amendment issues. “

In England, you can go to jail right now for the above. Of course, they have no Constitution...


42 posted on 05/19/2015 6:46:52 PM PDT by The Antiyuppie ("When small men cast long shadows, then it is very late in the day".)
[ Post Reply | Private Reply | To 22 | View Replies]

To: zeugma
> Do you have a tech license yet? Wife and I got ours a few years ago.

Good for you! I'm still trying to find time... speaking of which...

> I time to be able to do something with it though. Not enough hours in a day, especially with sites like Free Republic to suck all my spare cycles.

LOL. Yep.

43 posted on 05/19/2015 6:48:54 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 41 | View Replies]

To: The Antiyuppie; Still Thinking

“How is this any different”
You can open the letter without the testimony of the suspect.
If you needed his testimony to open it, and he knew there was incriminating evidence in it, then the Fifth Amendment would preclude getting that testimony.

These companies position that they will not maintain a code to open the devices upon production of a warrant is going to make a constitutional mess.


44 posted on 05/19/2015 6:58:52 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 40 | View Replies]

To: dayglored

Talking out of my ass, how?

All I’m saying is that the Feds under Obama have ways of getting Apple to water down their encryption technology to the point that the Feds can utilize it for nefarious purposes.

Apple created the technology. So it can’t be undone or reversed?

From a capitalist perspective, I like Apple. But they drank the Obama kool-aid so the Hell with them.


45 posted on 05/19/2015 6:59:21 PM PDT by Extremely Extreme Extremist
[ Post Reply | Private Reply | To 33 | View Replies]

To: Extremely Extreme Extremist; Swordmaker
> All I’m saying is that the Feds under Obama have ways of getting Apple to water down their encryption technology to the point that the Feds can utilize it for nefarious purposes.

There are two major ways encryption can be "watered down". One way is to use an algorithm that is readily broken. If Apple were using a weak algorithm, it would be evident; lots of really good experts know these algorithms inside out, they know what the results look like, and they'd call Apple on it posthaste. The other way is to engineer a back door of some kind. The difficulty there is that the customer's private key is not known to anyone but the customer, by definition of how it's done, and you'd need to know that. Any back door that can get around the use of a good long private key will be so obvious that any of these security researchers would have found it long since.

Private keys are... private, unless the person who has it lets it loose. And in the case of Apple's encryption -- as I understand it -- the private key, encrypted by its passphrase, is only known to the customer who makes it. An encrypted private key, for example a 2048-bit or 4096-bit RSA key, with a passphrase of say 14 characters, is simply unbreakable in our or our children's lifetimes. That's what PGP/GnuPG typically relies on, and in the 20+ years that PGP has been around, nobody has been able to demonstrate a flaw in it. And a lot of people a lot smarter in this stuff than I am have tried mighty hard.

> Apple created the technology. So it can’t be undone or reversed?

To the best of my knowledge, Apple is using technology that's publicly available: 256 bit AES. Their particular implementation details may be unique, but the inner core algorithms are standard. They have to be -- nobody would trust a proprietary "new" encryption algorithm these days. I don't know the exact names/methods of Apple's algorithms; I'm gonna have to research that, or maybe Swordmaker knows :-) But I can virtually guarantee that they didn't invent some new one. Cryptographers all over would be rightly concerned and sounding the alarm over that. Cryptography is hard stuff, and Apple would only be compromising their own trustworthiness if they tried to invent some new crypto scheme.

I'm gonna invite Swordmaker to comment. If I'm full of crap about how Apple is doing this, he'll call me out on it, and I would deserve and appreciate the correction.

46 posted on 05/19/2015 7:24:22 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Ernest_at_the_Beach; ...

47 posted on 05/20/2015 3:47:48 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Extremely Extreme Extremist

“I’m prepared if communications go down.”

We’re not talking about communications going down. We’re talking about the government, and anyone else with enough ingenuity to find the government’s backdoor, having instant access to any of your communications, electronic transactions, etc. Go ahead and think that isn’t your problem though, I guess some people have to learn the hard way.


48 posted on 05/20/2015 6:25:59 AM PDT by Boogieman
[ Post Reply | Private Reply | To 15 | View Replies]

To: mrsmith

” and that’s good enough for true believers.”

Well, or anyone who actually understands how encryption systems work...


49 posted on 05/20/2015 6:28:55 AM PDT by Boogieman
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker

“no one knows how to unlock 256 bit AES encryption without a key...”

Well, unless they’ve got a secret quantum computer at the NSA that we don’t know about, but that seems unlikely.


50 posted on 05/20/2015 6:31:24 AM PDT by Boogieman
[ Post Reply | Private Reply | To 31 | View Replies]

To: The Antiyuppie

“Of course, they have no Constitution...”

Say that to a Brit and they will object strongly that they do have a Constitution... it just isn’t written down. (What good that does them, I have no idea).


51 posted on 05/20/2015 6:37:21 AM PDT by Boogieman
[ Post Reply | Private Reply | To 42 | View Replies]

To: dayglored
To the best of my knowledge, Apple is using technology that's publicly available: 256 bit AES. Their particular implementation details may be unique, but the inner core algorithms are standard. They have to be -- nobody would trust a proprietary "new" encryption algorithm these days.

If you read Bruce Schneier's writings on cryptography, you'd see that he says the same thing. Anyone can create a crypto algorithm that they cannot break. What's hard is making one that other people can't. Since one of Bruce's algorithms (TwoFish) was among the top 3 finalists when AES was chosen, I'd have to say he might know what he's talking about. From what I've seen of Apple's implementation, it's a pretty good one. The devil is in the details of course. Some implementations have been shown to have weakness in key generation, and their PRNGs. I'd be surprised if Apple fell into those traps. It's the small things that can kill you even if you're using good crypto.

On the other hand, it would be a good thing for Apple to open up the code for their implementation. There would be enough interest to ensure a good, strong look would be directed to it, given how high profile any news of issues would be. Anything found could then be patched by Apple, making their product even stronger.

52 posted on 05/20/2015 7:01:52 AM PDT by zeugma (Are there more nearby spiders than the sun is big?)
[ Post Reply | Private Reply | To 46 | View Replies]

To: zeugma
> If you read Bruce Schneier's writings on cryptography, you'd see that he says the same thing. Anyone can create a crypto algorithm that they cannot break. What's hard is making one that other people can't. Since one of Bruce's algorithms (TwoFish) was among the top 3 finalists when AES was chosen, I'd have to say he might know what he's talking about.

I trust Schneier, and Phil Zimmerman, as much or more than I trust anyone in the field. They're the good guys, no question about it.

The fact that Snowden praised Zimmerman's PGP as the best encryption available to civilians counts with me too.

53 posted on 05/20/2015 8:23:00 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 52 | View Replies]

To: Extremely Extreme Extremist

Oh, so you’re one of those cowards who didn’t mind what happened to the Jews because he wasn’t a Jew.


54 posted on 05/22/2015 4:05:05 AM PDT by j.argese (/s tags: If you have a mind unnecessary. If you're a cretin it really doesn't matter, does it?)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Extremely Extreme Extremist
These techies knew what they were getting into when then jumped on the Obama bandwagon, and now the feds are about to put the screws to them. That smell you're smelling? Pure schaudenfraude.

Spot On!

55 posted on 05/22/2015 4:09:47 AM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson