To: SeekAndFind
Poor Apple got it’s @$$ handed to it in just a week.
2 posted on
03/28/2016 4:43:29 PM PDT by
DiogenesLamp
("of parents owing allegiance to no other sovereignty.")
To: SeekAndFind
256 bit AES encryption is highly secure, but not totally.
Brute force can eventually get in.
3 posted on
03/28/2016 4:43:39 PM PDT by
Blueflag
(Res ipsa loquitur: non vehere est inermus)
To: SeekAndFind
4 posted on
03/28/2016 4:44:16 PM PDT by
dynoman
(Objectivity is the essence of intelligence. - Marilyn vos Savant)
To: SeekAndFind
“it was successfully able to access the data on the iPhone without Apple’s help”
I don’t think this is a victory for Apple. It shows that anyone can break into Apple phones, without their help, so their phones are not as secure as they claim
7 posted on
03/28/2016 4:45:01 PM PDT by
Innovative
("Winning isn't everything, it's the only thing." -- Vince Lombardi)
To: SeekAndFind
Apple won a major victoryA Pyrrhic victory at best.
8 posted on
03/28/2016 4:45:08 PM PDT by
Ben Mugged
(He who lacks the will does not need the ability.)
To: SeekAndFind
“It remains a priority for the government to ensure that law enforcement can obtain crucial digital information to protect national security and public safety...”
Something the Israeli’s know about and respect a little more than some of our liberal thick-skulled companies.
9 posted on
03/28/2016 4:46:40 PM PDT by
jessduntno
(The mind of a liberal...deceit, desire for control, greed, contradiction and fueled by hate.)
To: SeekAndFind
Eric Snowden said weeks ago, that they did not really need permission from Apple, and were fully capable of doing their own hacking. Maybe Eric can come home if the next president is republican. Or one never knows, they may have a high status job to offer him.
To: SeekAndFind
What if NSA cracked the code last year and identified terrorist targets for wet work and monitoring last year within days after the terrorist attack at San Bernardino. Then, let MI5, DGESEF and the CIA wet work experts handle those terrorists.
NSA
MI5
DGSE
CIA
12 posted on
03/28/2016 4:49:44 PM PDT by
Grampa Dave
(I 'm just another low info/stupid & evil/vile/crazy Trump supporter wanting to select my candidate!!)
To: SeekAndFind
So the encryption is worth nothing?
14 posted on
03/28/2016 4:54:23 PM PDT by
I want the USA back
(Islam mandates warfare against unbelievers and is absolutely incompatible with Western society.)
To: SeekAndFind
Uh,oh. Hillary just flushed her iphone down the toilet.
15 posted on
03/28/2016 4:56:48 PM PDT by
chuckee
To: SeekAndFind
They just discovered the password was written on the back of the phone
To: SeekAndFind
What they aren’t telling us is that they’d hacked into the phone within 24 hours of finding it. This whole months-long rhubarb we’ve watched between them and Apple was merely an attempt to strongarm Apple into making it easy to get into everyone’s iphone.
18 posted on
03/28/2016 5:01:45 PM PDT by
Tucker39
(Welcome to America! Now speak English; and keep to the right....In driving, in Faith, and politics.)
To: SeekAndFind
25 posted on
03/28/2016 5:51:35 PM PDT by
wardaddy
(Cruz path to nomination is a box canyon)
To: SeekAndFind
26 posted on
03/28/2016 5:58:56 PM PDT by
familyop
("Welcome to Costco. I love you." --Costco greeter in the movie, "Idiocracy")
To: SeekAndFind; Blueflag
Such encryption can be cracked with one of the few supercomputers or with a very large distributed computing effort. It’s a matter of whether or not the cracking needed has a high enough priority for the time and resources required for either kind of effort. And if so, likely a matter of weeks.
30 posted on
03/28/2016 6:10:13 PM PDT by
familyop
("Welcome to Costco. I love you." --Costco greeter in the movie, "Idiocracy")
To: SeekAndFind
..proof that there really is a Chloe O’Brien...
36 posted on
03/28/2016 6:20:04 PM PDT by
WalterSkinner
( In Memory of My Father--WWII Vet and Patriot 1926-2007)
To: SeekAndFind
Was it Apple + Israeli company + NSA that cracked the encryption?
Apple ceo given choice of cooperating or jail?
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson