Posted on 02/17/2016 9:04:36 PM PST by TigerClaws
That is exactly my position. This phone was involved in a crime. Apple has the capability to unlock it and provide potentially life saving information as well as evidence in a criminal investigation, and they are refusing to do so because they think it will hurt their marketing of their products.
These socialist Bastards were probably out there screaming "No Blood for Oil!", and so I say to them, how about "No Blood for Profits!"
They are not the primary guardians of Privacy. The Courts are supposed to perform that role. This is the methodology which was agreed upon in 1787, and Apple inc does not get a veto.
Fruit of the poison tree. As sensitive as our courts are to muslims, I can imagine any case involving evidence picked from the poison tree will not not be admitted to trial.
Think of what we, as private citizens, of what we would have given up to get to that point. And all for naught.
No, they can unlock it, copy the data and give it to the FBI. No harm to precious Apple and their product security. They could actually perform the operation with an FBI representative present but with no knowledge of how the data access is performed.
The same government that swears it can vet 10’s of thousands of Syrian refugees (terrorists) allowed an assassin, that they knew about in the country with no follow up. Now they want a private company that has taken care to protect its customers privacy, (something the libs used to justify killing millions of babies in the womb) just because they failed at their own job. Screw them, I’m more proud of my Apple phone than ever.
Defense lawyer's dream: some shmuck runs unknown SW to gather evidence about a suspect with a completely clueless LEO watching. Judge: the evidence is inadmissable, the conviction is vacated.
If you are suggesting the phone contents could aid further investigations that is different. But that data can be gathered other ways. Start with all the people who ever went to his mosque.
Do you actually read the stuff you post? You yourself have made a mockery of objectivity and it seems that hatred of all things Apple is the reason. Do you question why these same demands are not made of Google or Microsoft or any other keeper of your data?
Don’t terrorists cell phones reach further than the nearest mosque?
In reality, they just want to connect any dots, which may be gone by now but a clue is a clue.
In actuality, the FBI would need/want what info that could be left on that phone? The provider has already, I am sure, turned over all incoming/outgoing calls as well as texts. So a call/contact listing?
They are obviously just fishing like you are. The point is not whether there is anything of value on the phone but where to draw the line. This is not the last phone from a dead terrorist. Nor the last phone acquired somewhere somehow that might have something interesting on it. Stop it here or it will never stop.
Well Mr. Bubba, I am not fishing. I fish with hand grenades.
Do you belong to the communist party of America or do you have connections with Bernie and his socialists?
I just had to wade through the venom and hate on my forum page to get to you. It is vile.
Rush just talked about the phone. I thought, and everyone probably does also, that the Feds wanted to hand the phone over to Apple and let them undo it. Rush says, no, the Feds want Apple to give them the key to unlock ALL phones.
I hope Apple unlocks the perp’s phone and tells the Feds to take a hike.
Bingo. Best post of the day. It's just like having open borders, and then requiring employers to verify legality.
The question here is that the iPhone 5C doesn't have the protections the iPhone 5S, 6, 6plus, 6S, and 6S plus have built into their processors. Those devices are far more secure than the iPhone in question. However, it should not matter which iPhone an Apple customer owns under the equal protection of the law. Apple has not been handed a Search Warrant for this iPhone because there is NO pending criminal case. That died with the perpetrators of the San Bernardino terrorist attack. There is no one left to prosecute.
This is an investigation, a fishing expedition. Apple has been ordered by a Federal Magistrate to create the means to unlock an iOS device which has been designed to be secure from the get-go to prevent unlocking. Doing so will compromise Apple's entire ecosystem of almost 800 million iOS users who use over one BILLION iOS devices around the world who rely on the security of those devices to protect their privacy, the passwords, and their credit card information. That unbreakable security is one of the primary differentiators that makes Apple's products superior.
If Apple creates a tool that unlocks an iPhone that even hints that it can be broken, if that's possible, or if one that is created winds up getting out into the wild, it would be a disaster for all of those 800 million users, and for Apple's ecosystem. Every tool that opens the other mobile operating systems HAS been allowed to get into the wild in exactly that way, despite promises they would never be allowed beyond law enforcement. All it takes mere existence and the payment of a bribe.
Currently, on iPhones newer than the iPhone 5C, the protections are built into the hardware of the A7 and later processors which have the Secure Enclave co-processor built onto the SoC which handles the Secure Boot System which assures that the iOS device is properly validated with proper credentials. It uses a hard-coded UUID which is burnt into the silicon at manufacture that no-one knows and cannot be read from outside the Secure Enclave processor to create the encryption which will be entangled with the user's input passcode, as well as randomized data from GPS, barometric pressure, etc., to create a truly unique KEY for the 256 bit AES encryption of the data.
Also hard coded at manufacture on Secure Enclave is an variable algorithm which creates a one-way HASH of the user's input passcode which will then be stored in the Secure Enclave. The encryption KEY will also be converted to a one-way HASH and stored in the Secure Enclave. Every time the user logs into his or her iOS device, the passcode is re-converted to the HASH and compared to the one stored in the Secure Enclave. If they match, the iOS device is unlocked. If they do not, the Secure Boot allows four chances without a delay, then five more with extended delays of from one minute up to fifteen minutes between tries. The tenth try the wait is one hour after the ninth. IF it fails, the Secure Boot erases all data on the device and permanently locks the device until the owner unlocks it using his AppleID and then restores the data from an iTunes backup.
THAT is security, but THAT is what the judge has ordered Apple to disable for all iPhones so they can open one. . . or is it the only reason?
If the government succeeds, we will no longer have a reasonable expectation of privacy. The precedent will be set. We can no longer lock our doors without leaving the master key. Our privacy rights will end when the government says it does.
Of course, if I have nothing to hide..../s
The battle is not about access to a particular phone. It is about the principles on which our nation was founded.
LOL!
Nice idea, except for two problems.
1: The TouchID requires a living finger to work. It will not work with a dead finger. For example, you cannot cut of the finger of someone and have it unlock their iPhone.
2: The iPhone 5C doesn't have TouchID at all. It was the iPhone 5S's poorer cousin, which was sold without the features of it's fancier cousin.
It doesn’t matter if it would take 15 minutes or 15 years. You are supporting a completely unprecedented use of a warrant: to compel someone to create a new work in order to facilitate entry of someone else’s property (as Apple does not own the phone, even though they do retain the rights to the OS). It’s called principle. You cannpt be against Obamacare and for this, as they are the same basic principle... that they government can compel you to labor for them involuntarily.
The world will not collapse if Apple is forced to open up this terrorist's phone. (Which actually belongs to San Bernidino County) It was accomplished through a writ issued by a Federal Judge, and unless the appeals court has a good legal argument as to why it should not be complied with, I am going to side with the Judge in this matter.
Apple is not above the law.
While I'm far more cynical than you about what a corporation wants, I do agree that mere back-installation of the backdoor OS would negate any separate usage of the systems, and such a strategy would multiply at light speed around the world once such an OS was created. So yeah, it wouldn't work.
Hey Sword,
There’s a guy on another thread (driftdiver) on this subject who claims he “an IT Security company which does computer forensics.”
And getting the iPhone data is easy because he does “Things like pulling data off phones and hard drives.” And “I donât need the password to copy the data. I can copy the device or copy the file system or the file. I donât even need to go through the Operating system.”
So he can get the iPhone data no sweat. I think he’s another magic thinker. Older Phones, older OSs he might be right but not this phone, not this OS. I say not password, no access, else this whole thing would be a non-issue.
How is it a histrionic assertion to point out that Apple is being ordered to create something that doesn't yet exist? Do you even grasp the problem here? THERE IS NO KEY. It's one thing to have to produce a key, it's another thing to have to create an entirely new safe with a back door to be installed in place of the locked one. Who pays for that work? What happens to it afterwards?
Apple should sure the crap out of the government and demand, at the very least, a billion dollars in development costs. You think software grows on trees? People MAKE it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.