Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Scrambler Bob

It destroys the chain of evidence. The government can not document what is being done to the phone to get the data, therefore no court on the planet will allow that data to be used. Only if the government does the hacking and retrieves the data itself can they claim to have a clear chain of evidence. There is no “compromise” that involves the government not having possession of the phone.


21 posted on 02/17/2016 5:14:11 PM PST by Charles H. (The_r0nin) (Hwaet! Lar bith maest hord, sothlice!)
[ Post Reply | Private Reply | To 11 | View Replies ]


To: Charles H. (The_r0nin)

Maybe if the government actually kept the damned terrorists out of the country, they wouldn’t have to go begging for cellphones.


39 posted on 02/17/2016 5:30:54 PM PST by dfwgator
[ Post Reply | Private Reply | To 21 | View Replies ]

To: Charles H. (The_r0nin)

OK.

But let’s say Apple gives them a ‘key’, and they get data.

Then someone challenges the key, saying, “That key distorts the real data, making our client look guilty when he is not.”, or some such variant.

Just Slouching Towards Nauseam.


52 posted on 02/17/2016 5:46:06 PM PST by Scrambler Bob (As always, /s is implicitly assumed. Unless explicitly labled /not s. Saves keystrokes.)
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson