Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Swordmaker
and, Cold Heat, forensic data examiners in examining the data streams being sent from iOS devices have proved that IOS does not transmit location data with any ID signifiers to any servers. Apple told the truth.

A total canard with the inference being that the user is protected!

It's just not true.

The part about the IOS not transmitting ID signifiers is true, but the idea that the user is protected is false.

While I do not use smart phones today, that does not mean that I did not in the recent past. Even though I explained this once, I will do it again just for the benefit of you.

Any one missing data point, like a identifier does not make you secure. That information can be gleaned in other ways, and over a period of time. Once that is done, it does not have to be done again. For apple or it's millions of sycophants to claim that it is secure is the same sort of mental gymnastics Apple users employ to say that Apple is the most innovative.

Apparently you believe that encryption cannot be broken and the Chinese are too stupid to do it or cannot divine a "key".

I think I'll just leave that with you as it is a ludicrous assumption. That is exactly what the Germans thought in regard to their 4 wheel Enigma machine. The British broke it through data collection and then used what they had collected to assist the programming a rudimentary WWII era computer and crunched the numbers subsequently breaking the codes in spite of the fact that no one actually knew the key or what was in the key on either end. Like all coded messages, there has to be some sort of data located within the messages to identify what key is needed to decrypt. It does not matter where you store the other piece of the data. Eventually it will be found, seized, or in this case given to you. One would of course need to be able to recreate the algorithms needed to recreate the encryption sequence. Every bit of information you collect in this regard shortens the time needed to decrypt. (and computers are now blazing fast compared to what they successfully used in WWII)

The facts are that you are of the opinion that the Apple I-phone is secure and can be safely used by corporations who are highly sensitive to security issues. Apple has been trying to overcome these fears to expand their retail base, and have had some successes. But they still have a long way to go in convincing them and that is because it is not secure and everyone but you apparently knows it.

I would get your head out of the Apple techie blogs where you are immersed in a echo chamber and do a little independent thinking.

I did not originally come here to bash Apple, but that does not mean that they don't deserve bashing...they certainly do.

I only wanted to point out that Apple did something that even google would not do, and they did it because China threatened them and it worked. It did not work with Google as google is not a vertically integrated company like Apple is.

That is Apple's weakness internationally and after this, they will be sharing data or kowtowing to every State Actor on the planet.

There is no secure consumer smart phone. not Apple, not any of them.

Cloud????LOL!.....The cloud is just a server. In the case of China, that server farm is now under Chinese control and access. It's just a matter of time before they use it to add to their data collection base. As they add to to it. All things become exposed. The smart phone is now playing a part in that data collection. A pretty big part, I might add.

42 posted on 08/18/2014 8:40:37 AM PDT by Cold Heat (Have you reached your breaking point yet? If not now....then when?)
[ Post Reply | Private Reply | To 41 | View Replies ]


To: Cold Heat
Cold Heat, decrypting the Enigma device was child's play compared to what you're talking about in this instance. The user files are either 256 or 512 bit encrypted, are then transmitted, then those are further encrypted with a more complex encryption. Multiply times millions of users. There IS no repeated pattern to attempt to find common patterns. You really don't know what you are talking about.

Gleaning location data of any singular individual from aggregated data of millions of data streams, again without identifiers, is NOT POSSIBLE.

. Just because YOU want to believe in magic does not mean I have to. My head is NOT "buried in Apple blogs" as you so quaintly seem to think. Yours is buried in paranoid fear.

256, 512, and 1024 bit random hexadecimal string passwords are nowhere as easy to "divine" or break, as you seem to think. There is nothing out there that can do. . . and neither the Chinese, nor even our vaunted NSA has that capability to do that in any reasonable time for any data to be useful.

The ludicrous one on this thread is you.

43 posted on 08/18/2014 2:47:42 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 42 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson