Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple Unlocked iPhones for the Feds 70 Times Before
http://www.thedailybeast.com/articles/2016/02/17/apple-unlocked-iphones-for-the-feds-70-times-before.html ^

Posted on 02/17/2016 9:04:36 PM PST by TigerClaws

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180 ... 201-205 next last
To: Sicon
Don't get me wrong, I am all for protecting privacy, and do not think Apple should just allow the government to randomly access people's phone data (they already gather everything you text, browse, email, say, etc. anyway though). But when someone is charged with a crime, and are the subject of an investigation, I think there are some legal grounds for getting a warrant to search the phone. Not sure how it's any different than getting a warrant to search someone's house or car...

That is exactly my position. This phone was involved in a crime. Apple has the capability to unlock it and provide potentially life saving information as well as evidence in a criminal investigation, and they are refusing to do so because they think it will hurt their marketing of their products.

These socialist Bastards were probably out there screaming "No Blood for Oil!", and so I say to them, how about "No Blood for Profits!"

They are not the primary guardians of Privacy. The Courts are supposed to perform that role. This is the methodology which was agreed upon in 1787, and Apple inc does not get a veto.

141 posted on 02/18/2016 7:25:28 AM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 105 | View Replies]

To: Swordmaker

Fruit of the poison tree. As sensitive as our courts are to muslims, I can imagine any case involving evidence picked from the poison tree will not not be admitted to trial.

Think of what we, as private citizens, of what we would have given up to get to that point. And all for naught.


142 posted on 02/18/2016 7:36:57 AM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 70 | View Replies]

To: palmer

No, they can unlock it, copy the data and give it to the FBI. No harm to precious Apple and their product security. They could actually perform the operation with an FBI representative present but with no knowledge of how the data access is performed.


143 posted on 02/18/2016 7:57:29 AM PST by biff
[ Post Reply | Private Reply | To 135 | View Replies]

To: Mark17

The same government that swears it can vet 10’s of thousands of Syrian refugees (terrorists) allowed an assassin, that they knew about in the country with no follow up. Now they want a private company that has taken care to protect its customers privacy, (something the libs used to justify killing millions of babies in the womb) just because they failed at their own job. Screw them, I’m more proud of my Apple phone than ever.


144 posted on 02/18/2016 8:03:18 AM PST by Ace the Biker (I wasn't born in Texas but I got here as fast as I could.)
[ Post Reply | Private Reply | To 41 | View Replies]

To: biff
Hypothetical......how many lives is it worth? 14? 100? 1,000? 100,000? Your own children?


If it only saves the life of
one child, isn't it worth it?
We must do something.

145 posted on 02/18/2016 8:34:59 AM PST by itsahoot (1st impression. Trump is a fumble mouthed blowhard that can't speak in complete sentences. VoteTrump)
[ Post Reply | Private Reply | To 127 | View Replies]

To: biff
They could actually perform the operation with an FBI representative present but with no knowledge of how the data access is performed.

Defense lawyer's dream: some shmuck runs unknown SW to gather evidence about a suspect with a completely clueless LEO watching. Judge: the evidence is inadmissable, the conviction is vacated.

If you are suggesting the phone contents could aid further investigations that is different. But that data can be gathered other ways. Start with all the people who ever went to his mosque.

146 posted on 02/18/2016 8:41:46 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 143 | View Replies]

To: DiogenesLamp; Swordmaker
I've argued with you before, and I remember how you attempted to credit Apple with all sorts of inventions that they didn't actually invent. You simply lack objectivity.

Do you actually read the stuff you post? You yourself have made a mockery of objectivity and it seems that hatred of all things Apple is the reason. Do you question why these same demands are not made of Google or Microsoft or any other keeper of your data?

147 posted on 02/18/2016 8:42:54 AM PST by itsahoot (1st impression. Trump is a fumble mouthed blowhard that can't speak in complete sentences. VoteTrump)
[ Post Reply | Private Reply | To 138 | View Replies]

To: palmer

Don’t terrorists cell phones reach further than the nearest mosque?

In reality, they just want to connect any dots, which may be gone by now but a clue is a clue.

In actuality, the FBI would need/want what info that could be left on that phone? The provider has already, I am sure, turned over all incoming/outgoing calls as well as texts. So a call/contact listing?


148 posted on 02/18/2016 8:47:36 AM PST by biff
[ Post Reply | Private Reply | To 146 | View Replies]

To: biff

They are obviously just fishing like you are. The point is not whether there is anything of value on the phone but where to draw the line. This is not the last phone from a dead terrorist. Nor the last phone acquired somewhere somehow that might have something interesting on it. Stop it here or it will never stop.


149 posted on 02/18/2016 9:04:17 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 148 | View Replies]

To: palmer

Well Mr. Bubba, I am not fishing. I fish with hand grenades.

Do you belong to the communist party of America or do you have connections with Bernie and his socialists?


150 posted on 02/18/2016 9:08:52 AM PST by biff
[ Post Reply | Private Reply | To 149 | View Replies]

To: palmer

I just had to wade through the venom and hate on my forum page to get to you. It is vile.

Rush just talked about the phone. I thought, and everyone probably does also, that the Feds wanted to hand the phone over to Apple and let them undo it. Rush says, no, the Feds want Apple to give them the key to unlock ALL phones.

I hope Apple unlocks the perp’s phone and tells the Feds to take a hike.


151 posted on 02/18/2016 9:40:14 AM PST by odawg
[ Post Reply | Private Reply | To 130 | View Replies]

To: dfwgator
If the government is so concerned with stopping terrorism....HOW ABOUT NOT LETTING THE TERRORISTS IN THE COUNTRY IN THE FIRST PLACE!!!! Don't make a private company do your dirty work for you.

Bingo. Best post of the day. It's just like having open borders, and then requiring employers to verify legality.

152 posted on 02/18/2016 9:42:20 AM PST by aimhigh (1 John 3:23)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Gaffer
A last comment on your iOS 8/9 and hackers. If Apple has said there isn't a way, and there IS, how safe does that make you feel about their claim? Is that what you call 'security?'

The question here is that the iPhone 5C doesn't have the protections the iPhone 5S, 6, 6plus, 6S, and 6S plus have built into their processors. Those devices are far more secure than the iPhone in question. However, it should not matter which iPhone an Apple customer owns under the equal protection of the law. Apple has not been handed a Search Warrant for this iPhone because there is NO pending criminal case. That died with the perpetrators of the San Bernardino terrorist attack. There is no one left to prosecute.

This is an investigation, a fishing expedition. Apple has been ordered by a Federal Magistrate to create the means to unlock an iOS device which has been designed to be secure from the get-go to prevent unlocking. Doing so will compromise Apple's entire ecosystem of almost 800 million iOS users who use over one BILLION iOS devices around the world who rely on the security of those devices to protect their privacy, the passwords, and their credit card information. That unbreakable security is one of the primary differentiators that makes Apple's products superior.

If Apple creates a tool that unlocks an iPhone that even hints that it can be broken, if that's possible, or if one that is created winds up getting out into the wild, it would be a disaster for all of those 800 million users, and for Apple's ecosystem. Every tool that opens the other mobile operating systems HAS been allowed to get into the wild in exactly that way, despite promises they would never be allowed beyond law enforcement. All it takes mere existence and the payment of a bribe.

Currently, on iPhones newer than the iPhone 5C, the protections are built into the hardware of the A7 and later processors which have the Secure Enclave co-processor built onto the SoC which handles the Secure Boot System which assures that the iOS device is properly validated with proper credentials. It uses a hard-coded UUID which is burnt into the silicon at manufacture that no-one knows and cannot be read from outside the Secure Enclave processor to create the encryption which will be entangled with the user's input passcode, as well as randomized data from GPS, barometric pressure, etc., to create a truly unique KEY for the 256 bit AES encryption of the data.

Also hard coded at manufacture on Secure Enclave is an variable algorithm which creates a one-way HASH of the user's input passcode which will then be stored in the Secure Enclave. The encryption KEY will also be converted to a one-way HASH and stored in the Secure Enclave. Every time the user logs into his or her iOS device, the passcode is re-converted to the HASH and compared to the one stored in the Secure Enclave. If they match, the iOS device is unlocked. If they do not, the Secure Boot allows four chances without a delay, then five more with extended delays of from one minute up to fifteen minutes between tries. The tenth try the wait is one hour after the ninth. IF it fails, the Secure Boot erases all data on the device and permanently locks the device until the owner unlocks it using his AppleID and then restores the data from an iTunes backup.

THAT is security, but THAT is what the judge has ordered Apple to disable for all iPhones so they can open one. . . or is it the only reason?

153 posted on 02/18/2016 11:01:13 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 79 | View Replies]

To: biff
Wow. I never thought I would see the day when someone wanting to stop the government from having access to every aspect of our private lives a communist.

If the government succeeds, we will no longer have a reasonable expectation of privacy. The precedent will be set. We can no longer lock our doors without leaving the master key. Our privacy rights will end when the government says it does.

Of course, if I have nothing to hide..../s

The battle is not about access to a particular phone. It is about the principles on which our nation was founded.

154 posted on 02/18/2016 11:02:05 AM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 150 | View Replies]

To: Read Write Repeat; TigerClaws
Simple solution: dig up the corpse and use Touch ID. :P

LOL!

Nice idea, except for two problems.

1: The TouchID requires a living finger to work. It will not work with a dead finger. For example, you cannot cut of the finger of someone and have it unlock their iPhone.

2: The iPhone 5C doesn't have TouchID at all. It was the iPhone 5S's poorer cousin, which was sold without the features of it's fancier cousin.

155 posted on 02/18/2016 11:07:30 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 80 | View Replies]

To: DiogenesLamp

It doesn’t matter if it would take 15 minutes or 15 years. You are supporting a completely unprecedented use of a warrant: to compel someone to create a new work in order to facilitate entry of someone else’s property (as Apple does not own the phone, even though they do retain the rights to the OS). It’s called principle. You cannpt be against Obamacare and for this, as they are the same basic principle... that they government can compel you to labor for them involuntarily.


156 posted on 02/18/2016 11:21:41 AM PST by Charles H. (The_r0nin) (Hwaet! Lar bith maest hord, sothlice!)
[ Post Reply | Private Reply | To 140 | View Replies]

To: Charles H. (The_r0nin)
I am not going to entertain histrionic assertions. It was fun earlier, now it's just annoying.

The world will not collapse if Apple is forced to open up this terrorist's phone. (Which actually belongs to San Bernidino County) It was accomplished through a writ issued by a Federal Judge, and unless the appeals court has a good legal argument as to why it should not be complied with, I am going to side with the Judge in this matter.

Apple is not above the law.

157 posted on 02/18/2016 11:34:53 AM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 156 | View Replies]

To: Swordmaker
There are no two levels of access. The enterprise, corporate edition WANTS the security of no backdoor. . . just as individuals do. Make one, then the crooks would steal individuals' iPhones and install corporate backdoored versions and access the private data of the individuals. Nope, wouldn't work.

While I'm far more cynical than you about what a corporation wants, I do agree that mere back-installation of the backdoor OS would negate any separate usage of the systems, and such a strategy would multiply at light speed around the world once such an OS was created. So yeah, it wouldn't work.

158 posted on 02/18/2016 11:37:09 AM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 64 | View Replies]

To: Swordmaker

Hey Sword,
There’s a guy on another thread (driftdiver) on this subject who claims he “an IT Security company which does computer forensics.”

And getting the iPhone data is easy because he does “Things like pulling data off phones and hard drives.” And “I don’t need the password to copy the data. I can copy the device or copy the file system or the file. I don’t even need to go through the Operating system.”

So he can get the iPhone data no sweat. I think he’s another magic thinker. Older Phones, older OSs he might be right but not this phone, not this OS. I say not password, no access, else this whole thing would be a non-issue.


159 posted on 02/18/2016 11:38:41 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 153 | View Replies]

To: DiogenesLamp
I am not going to entertain histrionic assertions.

How is it a histrionic assertion to point out that Apple is being ordered to create something that doesn't yet exist? Do you even grasp the problem here? THERE IS NO KEY. It's one thing to have to produce a key, it's another thing to have to create an entirely new safe with a back door to be installed in place of the locked one. Who pays for that work? What happens to it afterwards?

Apple should sure the crap out of the government and demand, at the very least, a billion dollars in development costs. You think software grows on trees? People MAKE it.

160 posted on 02/18/2016 11:42:54 AM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 157 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180 ... 201-205 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson