Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Trump Says Apple Should Hack San Bernardino Attacker Phone
ABC News ^ | 2/17/2016 | Ryan Struyk

Posted on 02/17/2016 8:49:09 AM PST by pgyanke

Republican presidential front-runner Donald Trump bashed the tech company Apple today for refusing to help investigators access the iPhone of a San Bernardino attacker.

"I agree 100 percent with the courts," he said on "Fox and Friends" this morning. "In that case, we should open it up."

"To think that Apple won't allow us to get into her cell phone -- who do they think they are?" Trump said. "No, we have to open it up."

(Excerpt) Read more at abcnews.go.com ...


TOPICS: Business/Economy; Computers/Internet; Miscellaneous
KEYWORDS: 2016election; apple; california; election2016; newyork; sanbernadino; sanbernardino; trump; waronterror
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 221-226 next last
To: Logical me
If Apple built the damn thing they know how to open it up.

Not necessarily true (and I certainly hope not, because compromised security isn't security). Depending on what version of the iPhone it is and what encryption is being used, Apple may not have any ability to open it up. And that's a good thing - if there are back-doors written into device security, that means that both Apple and the government would have access to the private contents of everyone's device, not just some terrorist's device.
61 posted on 02/17/2016 9:16:21 AM PST by AnotherUnixGeek
[ Post Reply | Private Reply | To 15 | View Replies]

To: bjcoop

“No. Apple is siding with terrorists.”

I haven’t followed this, so this is the first time I knew that it belonged to this guy!

And people here are screaming that the info should stay there and not be touched?!?


62 posted on 02/17/2016 9:16:43 AM PST by VanDeKoik
[ Post Reply | Private Reply | To 22 | View Replies]

To: uncitizen
I doubt very much that the federal government really needs Apples assistance with this. They have people that can do this. They just want to show us that Apple is under the government thumb just like yahoo and Google are.

That's how I see it.

63 posted on 02/17/2016 9:16:59 AM PST by dfwgator
[ Post Reply | Private Reply | To 48 | View Replies]

To: HarleyLady27

This is not that complicated.

Imagine a safe in a bank.

The FBI can go to the bank and ask for access to the criminals safety deposit box.

The FBI does not need the banks combination to its safe.

Trump is saying, open the safety deposit box. That’s all.


64 posted on 02/17/2016 9:17:08 AM PST by GeaugaRepublican ("Donald Trump is the last hope for America." Phyllis Schlafly)
[ Post Reply | Private Reply | To 5 | View Replies]

To: pgyanke

Who they think they are Mr. Trump, is a law abiding business that is being compelled to act under threat by a government that is, in theory at least, supposed to protect their individual liberties.


65 posted on 02/17/2016 9:17:11 AM PST by drop 50 and fire for effect ("Work relentlessly, accomplish much, remain in the background, and be more than you seem.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: old curmudgeon

As I understand it, Apple cannot break the encryption any more than the FBI can. Their OS is deliberately set up to NOT have a backdoor by which they (and potentially others) can access the encrypted data.


66 posted on 02/17/2016 9:18:29 AM PST by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 59 | View Replies]

To: pgyanke

There’s a huge dif between giving cops the keys or doing it for them.


67 posted on 02/17/2016 9:18:41 AM PST by moehoward
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sgt_Schultze

Borrowed from another thread ——

Apple uses a dedicated chip to store and process the encryption. They call this the Secure Enclave. The secure enclave stores a full 256-bit AES encryption key.

Within the secure enclave itself, you have the device’s Unique ID (UID) . The only place this information is stored is within the secure enclave. It can’t be queried or accessed from any other part of the device or OS. Within the phone’s processor you also have the device’s Group ID (GID). Both of these numbers combine to create 1/2 of the encryption key. These are numbers that are burned into the silicon, aren’t accessible outside of the chips themselves, and aren’t recorded anywhere once they are burned into the silicon. Apple doesn’t keep records of these numbers. Since these two different pieces of hardware combine together to make 1/2 of the encryption key, you can’t separate the secure enclave from it’s paired processor.

The second half of the encryption key is generated using a random number generator chip. It creates entropy using the various sensors on the iPhone itself during boot (microphone, accelerometer, camera, etc.) This part of the key is stored within the Secure Enclave as well, where it resides and doesn’t leave. This storage is tamper resistant and can’t be accessed outside of the encryption system. Even if the UID and GID components of the encryption key are compromised on Apple’s end, it still wouldn’t be possible to decrypt an iPhone since that’s only 1/2 of the key.

The secure enclave is part of an overall hardware based encryption system that completely encrypts all of the user storage. It will only decrypt content if provided with the unlock code. The unlock code itself is entangled with the device’s UDID so that all attempts to decrypt the storage must be done on the device itself. You must have all 3 pieces present: The specific secure enclave, the specific processor of the iphone, and the flash memory that you are trying to decrypt. Basically, you can’t pull the device apart to attack an individual piece of the encryption or get around parts of the encryption storage process. You can’t run the decryption or brute forcing of the unlock code in an emulator. It requires that the actual hardware components are present and can only be done on the specific device itself.

The secure enclave also has hardware enforced time-delays and key-destruction. You can set the phone to wipe the encryption key (and all the data contained on the phone) after 10 failed attempts. If you have the data-wipe turned on, then the secure enclave will nuke the key that it stores after 10 failed attempts, effectively erasing all the data on the device. Whether the device-wipe feature is turned on or not, the secure enclave still has a hardware-enforced delay between attempts at entering the code: Attempts 1-4 have no delay, Attempt 5 has a delay of 1 minute. Attempt 6 has a delay of 5 minutes. Attempts 7 and 8 have a delay of 15 minutes. And attempts 9 or more have a delay of 1 hour. This delay is enforced by the secure enclave and can not be bypassed, even if you completely replace the operating system of the phone itself. If you have a 6-digit pin code, it will take, on average, nearly 6 years to brute-force the code. 4-digit pin will take almost a year. if you have an alpha-numeric password the amount of time required could extend beyond the heat-death of the universe. Key destruction is turned on by default.

Even if you pull the flash storage out of the device, image it, and attempt to get around key destruction that way it won’t be successful. The key isn’t stored in the flash itself, it’s only stored within the secure enclave itself which you can’t remove the storage from or image it.

Each boot, the secure enclave creates it’s own temporary encryption key, based on it’s own UID and random number generator with proper entropy, that it uses to store the full device encryption key in ram. Since the encryption key is also stored in ram encrypted, it can’t simply be read out of the system memory by reading the RAM bus.

The only way I can possibly see to potentially unlock the phone without the unlock code is to use an electron microscope to read the encryption key from the secure enclave’s own storage. This would take considerable time and expense (likely millions of dollars and several months) to accomplish. This also assumes that the secure enclave chip itself isn’t built to be resistant to this kind of attack. The chip could be physically designed such that the very act of exposing the silicon to read it with an electron microscope could itself be destructive.


68 posted on 02/17/2016 9:19:18 AM PST by AFreeBird
[ Post Reply | Private Reply | To 33 | View Replies]

To: dfwgator

If the government couldn’t hack into a cellphone there’s no way they would openly admit such. Especially months after they should have.


69 posted on 02/17/2016 9:20:10 AM PST by uncitizen (TRUMP THE SYSTEM)
[ Post Reply | Private Reply | To 63 | View Replies]

To: HarleyLady27
So there we are...do we, and hope the government will stop at that or do we not and don't know who the rest of the 'terrorist cell' is?

We know that government never "stop[s] at that", or willingly gives up any power it has seized. We also know that domestic tyranny is a greater threat to We the People than foreign terrorism. The bloody history of the XX Century shows us clearly what unrestrained governments do to their subject people.

70 posted on 02/17/2016 9:20:14 AM PST by NorthMountain ("The time has come", the Walrus said, "to talk of many things")
[ Post Reply | Private Reply | To 5 | View Replies]

To: davidb56

To all you in favor. This will allow the alphabet agencies a legal pathway to unconstitutional eaves dropping on all of us. Its not about the info on the phone... THEY AREADY HAVE IT. It is about LEGALLY obtaining a pathway to use it.


71 posted on 02/17/2016 9:20:51 AM PST by davidb56
[ Post Reply | Private Reply | To 31 | View Replies]

To: Boogieman
Trump doesn't even understand that Apple can't help the government hack into that phone even if they wanted to. So much for the "smartest man in the room", LOL!

So if that is the case that Apple can't even help, then why does Cook say the following?

"But Apple argues that providing access to this cell phone would make it possible to hack into any other iPhone as well.

"The implications of the government’s demands are chilling," Apple CEO Tim Cook said in a statement. "The government suggests this tool could only be used once, on one phone. But that's simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks -- from restaurants and banks to stores and homes."

Why doesn't Cook say that the tool cannot be created? That it is not technically possible to retrieve the information? Laugh that off.

72 posted on 02/17/2016 9:21:09 AM PST by kabar
[ Post Reply | Private Reply | To 26 | View Replies]

To: Westbrook

> The problem is that, by providing the decryption algorithm to the FBI, Apple opens up the possibility of hacking YOUR iphone WITHOUT probable cause.

Apple is not being asked to provide any help in decryption.
They are being asked to stop the phone from nuking itself after some number of failed attempts at guessing the password.


73 posted on 02/17/2016 9:21:47 AM PST by BuffaloJack (Slavery will continue to exist and thrive as long a Islam continues to exist.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dfwgator

See my post #72.


74 posted on 02/17/2016 9:22:08 AM PST by kabar
[ Post Reply | Private Reply | To 50 | View Replies]

To: Westbrook

Agree, Apple should hack the phone and make the data available to the feds. No need to give the FBI the auto erase kill algorithm


75 posted on 02/17/2016 9:23:34 AM PST by KC_for_Freedom (California engineer (ret) and ex-teacher (ret) now part time Professor (what do you know?))
[ Post Reply | Private Reply | To 7 | View Replies]

To: pgyanke
I don't know whether or not Trump knows that this is not just about that one phone.

The court order does not ask Apple to break the encryption on that one phone, but rather to provide software that will disable the feature that wipes the data on any of their phones after 10 incorrect tries at entering a password.

That will allow them to "brute force" the password on ANY of their phones by having a computer try any number of passwords until the correct password is found.

That gives the FBI (and whoever else) a backdoor into ANY Iphone.

If Trump doesn't know this, someone should tell him and then ask him if he still supports it.

76 posted on 02/17/2016 9:24:05 AM PST by Washi (All lives matter, or none do.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: kabar
So if that is the case that Apple can't even help, then why does Cook say the following?

Cook is referring to government demands that Apple build back-doors to their device security going forward - something that could and would be abused by the government, by Apple, and by random hackers to probe every device, not just those belonging to terrorists. Both Cook and the government know that there is nothing Apple can do to decrypt the terrorist's phone, if it's a modern iPhone with encryption.
77 posted on 02/17/2016 9:25:02 AM PST by AnotherUnixGeek
[ Post Reply | Private Reply | To 72 | View Replies]

To: dirtboy
Spare me. Apple to me is taking this too far. The FBI is looking for help with a specific phone tied to a specific crime.

That may be how the FBI is couching it, but that's not true. They are asking for a method of breaking the encryption that could them be used on any phone.

78 posted on 02/17/2016 9:25:32 AM PST by Washi (All lives matter, or none do.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ransomed

Why would it even have to be disclosed publicly? This could have been done without any public knowledge. I do find it interesting that this battle is being fought out publicly. Maybe it is a smokescreen to protect Apple and to give the terrorists a false sense of security when using I-phones. Regardless, there is no such thing as any code being unbreakable.


79 posted on 02/17/2016 9:25:40 AM PST by kabar
[ Post Reply | Private Reply | To 55 | View Replies]

To: dfwgator

Tim Cook is very worried because if Apple creates a program to decrypt the phone Apple could be hacked and the program stolen ALL phones could THEN be in danger!!! I don’t think Trump understands this!!! I did not fully understand this!!! Once Apple starts to create this program for this ONE phone it never goes away it IS OUT THERE a hackers DREAM!!!!


80 posted on 02/17/2016 9:27:05 AM PST by Kit cat (OBummer must go)
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 221-226 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson