Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker

Only the user. . .

Prove it.

Prove to me that the NSA has not colluded with apple, which, after all, is the BIG question.


6 posted on 03/30/2017 12:08:37 AM PDT by 867V309 (Lock Her Up)
[ Post Reply | Private Reply | To 5 | View Replies ]


To: 867V309

What would you take as proof?

Listen, my FRiend, we are now in 1984. Privacy is antiquated and young people accept that everything is going to be saved forever. The good news is there is always paper and pen, which I use for taking confidential data from clients. I’m an old-timer though. Could just as easily use laptop and type. But letting the backdoor snoopers in is against the “do no harm” mantra.


9 posted on 03/30/2017 12:17:44 AM PDT by The Westerner (Protect the most vulnerable: get the government out of medicine and education!)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: 867V309
Prove it.

Prove to me that the NSA has not colluded with apple, which, after all, is the BIG question.

I could go into the theoretical impossibility of a 256bit AES encryption standard having a backdoor built in under the certified standards, simply because the AES encryption does NOT work like that, but that's too complicated. Suffice it to say there can be only ONE key in this encryption and ONLY the user has it. The key itself is not even kept on the device, just a one way hash result for comparison is stored inside a secure encryption engine. The user's passcode must be manually entered and the algorithm recreates the one way hash anew for comparison every time with the stored hash. If, and only if, it matches, the encryption engine then proceeds to use that passcode by entangling it with three other unique data sets to construct actual encryption key. Those are a random 128 character UUID randomly assigned to the iPhone's or iPad's main SoC when the encryption engine was burned to silicon and of which no external record is kept, the model ID of the device, and a truly random number created from environmental sensors such as the two cameras, the microphone, the GPS, and the accelerometer, sampled when the user's passcode was first entered and stored. An algorithm takes thes various inputs and constructs a very large encryption key, known only to the engine and uses it for encrypting and decrypting the data as needed and sending it to the data processor. Depending on the complexity of the user's passcode, which Apple allows to be up to 256 characters in length and use all of the 223 characters accessible from the kayboard, the key can be huge!

But ask yourself "Why would Apple collude with the NSA to destroy their business model, which is built on the trust of their one billion customers around the world?" What could the NSA possible give Apple that would inspire their management to risk $20 million personal fines and 20 years in prison for lying to stockholders about this topic, a crime under the 2002 Sarbanes-Oxley Act—which would destroy the value of the stock—triggering such penalties? Look it up. That's what would happen to the members of the board and upper management if it were found there were backdoor in Apple products after management made public statements there weren't. . . Or if it turned out they were working to spy on their customers after publishing statements that customer privacy was primary to Apple. . . and made contracts with major businesses assuring that principle? Think of the lawsuits!

No, I think that proves it well enough.

20 posted on 03/30/2017 1:28:10 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: 867V309
Prove to me that the NSA has not colluded with apple, which, after all, is the BIG question.

It's not open source software, so there's no way for you (or anybody) to audit it properly, is there?

24 posted on 03/30/2017 1:47:34 AM PDT by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: 867V309

Indeed! Apple, Microsoft, and other OS coders are all in collusion with NSA. And just possibly your neighbors as well! Best to use your black market connections to buy your supplies of tinfoil so they don’t find out you are on to them.


29 posted on 03/30/2017 2:33:16 AM PDT by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 6 | View Replies ]

To: 867V309

can not prove a negative

but we do know the Apple culture under Jobs


33 posted on 03/30/2017 2:39:29 AM PDT by vooch
[ Post Reply | Private Reply | To 6 | View Replies ]

To: 867V309

“Prove it”
******************
After reading your series of ramblings in this thread, I’ve reached the conclusion that you are a VERY strange bird. I’d uggest that you leave Apple products to those of us who want them in the free market. And you are free to use Google’s Android based phones and do your searches using Google. Then, IN YOUR STRANGE MIND, you can be secure in your privacy.

By the way, prove that you are sane!


54 posted on 03/30/2017 6:07:33 AM PDT by House Atreides (Send BOTH Hillary & Bill to prison.)
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson