Posted on 03/28/2016 3:01:02 PM PDT by DugwayDuke
I am a 30 years IT veteran. I have knowledge of encryption.
If you have the device in your hand, even if it’s encrypted, and you know some of the clear text (like a contact, a picture, etc), then breaking the encryption is trivial.
This was yet another play to scare the public into giving up their rights.
They both win. I wonder what kind of stunts were going on. The FBI could have been stalling for time to try to get NSA to track terrorists all over the world.
fyi
I’m sure it was a recent vulnerabilty that iOS 9.3 fixes. Also, it was a low-end 5, which doesn’t have the same level of secure processor that the 6 does.
Is this just one time only (for terrorists)or will this become a routine thing?
Its so simple.
What are they calling the remote viewers now a days?
Gubbermints is so smart! So why couldn’t they produce a picture of the terrorist woman for almost a week? (psst, because they didn’t want to)
Appears to be “was IN”
:)
Who knows the truth anymore.
The government and all the Senators, Congressman, and those who have power all lie to us peasants.
I’m sick of it and to think there are still people who trust government and elected officials.
The NSA did it, and the Israeli company was a beard. I don’t know this as fact, but it’s plausible.
And now Apple inc looks stupid. Their vaunted security didn't even take very long to break through.
This will make people wonder about their latest and greatest version. Perhaps it is weak too?
I wish I understood what you mean :)
embarrassing that I don’t have a clue.
Oh, and what about all the screaming little babies worried about a "back door" into their phones? Seems like they are going to get their "back door" anyways, doesn't it?
what is the security? I have NO knowledge of this.
is it an incredibly long number/letter sequence?
how does it work?
I don’t understand viruses or hackers either. I need to buy a book for dummies.
“I am a 30 years IT veteran. I have knowledge of encryption.
If you have the device in your hand, even if its encrypted, and you know some of the clear text (like a contact, a picture, etc), then breaking the encryption is trivial.”
Well, I have 40+ years in computing, “personal” and otherwise, and if you have physical access to it, it might not be trivial, but it is absolutely doable, even if it gets down to peeling off the layers of the IC’s involved and observing the state and flow of the logic under a scanning electron microscope.
Apparently they tried “jihad” as the password.
More like they are overjoyed that the rule of law was kept in effect even though Apple inc did everything it could to deliberately undermine the rule of law by stampede a bunch of emotional children into supporting their deceitful claims.
“I dont understand viruses or hackers either. I need to buy a book for dummies.”
Actually, I don’t think that this has been written yet. Someone should - “Security Threats for Dummies”. There are plenty of insecure things that people do that don’t involve a computer that they themselves possess.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.