Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker

Who needs brute force when you can have the key. Brute force is only that last option.

It’s entirely possible the NSA forced back doors in the encryption algorithms. They’ve done it on computers for years. We’ve heard about that in the trades.

Taking that leap it’s entirely possible that someone could figure out or leak the secret. I’ve read that some back doors have been exploited in the past.

It’s even entirely possible that every government computer is compromised thus leaking every encryption key made in the last few years. I know how software works and it would be completely undetectable unless you know exactly where to look.


30 posted on 09/09/2015 1:16:14 PM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | To 29 | View Replies ]


To: ImJustAnotherOkie
Taking that leap it’s entirely possible that someone could figure out or leak the secret. I’ve read that some back doors have been exploited in the past.

Again, what part of "Apple does not even store the key on the iOS device," do you fail to comprehend?

It’s entirely possible the NSA forced back doors in the encryption algorithms. They’ve done it on computers for years. We’ve heard about that in the trades.

And, again, what part of "Apple does not have any backdoors in their software or Operating Systems" do you fail to comprehend, Okie?

I am beginning to think you really do not understand math, Okie. You don't force a backdoor into a mathematical encryption like the AES 256 bit standard.

It's an open source standard and algorithm, Okie, well understood and examined in detail over the 14 years since it was accepted by the National Institute of Standards and Technology in 2001. Before that it underwent years of development in the cryptography community. . . it is not just something a programmer came up with on the spur of the moment.

Further, Apple has stated categorically, under the most severe personal penalties for the officers and top managers of the corporation making the statements, due to the 2002 Sarbanes Oxley Act, that Apple has not allowed any backdoors in their software or operating systems. These penalties are $20,000,000 and 20 years in Federal prison for uttering official statements that turn out to be false that have negative affects on the value of the company or the company's stock values.

". . . Finally, I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will. . . "Tim Cook's Open Letter to Apple Customers, also cited in Apple's Financial reports and Financial Conference Calls.

Such a communications from the CEO of Apple is a legal, Sarbanes Oxley triggering document. As such, if it is NOT true, Tim Cook would be liable for the personal fines which could not be re-imbursable from Apple, and prison term of 20 years. Ergo, the statement is true. Apple has not put any backdoors in their Operating Systems.

You keep throwing spit wads against the wall without really knowing what you are attacking . . . because you haven't bothered to research Apple's system at all. You assume it is like everyone else's poor approach to security. It is not. You prove your ignorance about Apple's approach in every post.

31 posted on 09/09/2015 2:17:28 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 30 | View Replies ]

To: ImJustAnotherOkie
Who needs brute force when you can have the key. Brute force is only that last option.

How are they going to get that passkey, Okie? Torture of the iPhone's owner? It is not stored on the iPhone. The only thing representing that passcode is a One Way HASH. . . and that is in the Secure Element inside the processor, inaccessible from the outside, and only accessible to the processor for comparison with a newly generated HASH from a newly input passcode entered by the user, which cannot be retained.

Keep in mind, it is a two factor because the passcode is entangled with the iPhone's UUID. So any putative hacker will also require the UUID from the internals of the iPhone. The UUID is NOT on the outside of the iPhone. . . nor is it available from the iPhone without being able to unlock it. OOPS. So the hacker needs both the passcode from the user and the UUID from inside the iPhone. Then to find the real encryption key, our hacker ALSO needs the algorithm which is used to entangle the two to actually generate to encryption key. Good luck with all of that.

Now do you begin to appreciate the mountain that must be climbed???

32 posted on 09/09/2015 2:29:32 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 30 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson