Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Justice Department Seeks to Force Apple to Extract Data From About 12 Other
NASDAQ ^ | February 22, 2016, 11:48:00 PM EDT

Posted on 02/23/2016 11:34:59 AM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220 ... 241-259 next last
To: Swordmaker

Did not realize my link is a shortened version. This one has 415 pages.

https://cryptome.org/2016/02/usg-apple-016.pdf

Just wow.


181 posted on 02/25/2016 3:25:16 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 178 | View Replies]

To: Ray76

That illustration requires IMHO a bit of creative suspension of disbelief to interpret correctly. But whatever.

So we are supposed to note that the keys are stored in what... EEPROM? (umm, that seems OK, I imagine...)


182 posted on 02/25/2016 3:50:35 PM PST by SteveH
[ Post Reply | Private Reply | To 125 | View Replies]

To: Ray76
How about: “The iPhone 5C in question is running iOS 9.2”

Because, Ray, this is inclusive of ALL versions of iOS 9, including iOS 9.0, iOS 9.0.1, iOS 9.0.2, iOS 9.1 and iOS 9.2, all of which did nothing to change the security portions. That will not change until Apple changes to iOS 10. Are you THAT DENSE?

183 posted on 02/25/2016 3:52:02 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIinue....)
[ Post Reply | Private Reply | To 180 | View Replies]

To: Swordmaker

Make statements of fact and hold the insults.


184 posted on 02/25/2016 4:04:10 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 183 | View Replies]

To: Swordmaker

I meant that one could emulate the entire iphone CPU and system in a powerful enough software emulator. All the Apple stuff would run on the emulator. Anything in hardware would be reverse engineered from examining the device and emulating it, and/or monitoring the signals in a non destructive manner. It’s a physical device, not a magic black box.

What would happen if someone in China, or NK, or ISIS had invented cell phones now in common use in the USA? How would we ever begin to enforce such an order on such a presumably antagonistic party in a foreign jurisdiction? I think we would put some geeks on it to reverse engineer it and build a replica, and then run the code on it. But if we could not do it in the USA, then I imagine that we would outsource it to Moscow or somewhere with inexpensive but very well educated labor. Whatever it takes. If we still could not do it, then own up to it as being too difficult. and live with it. I am probably missing a lot.


185 posted on 02/25/2016 4:04:40 PM PST by SteveH
[ Post Reply | Private Reply | To 140 | View Replies]

To: Protect the Bill of Rights

OK, fair enough.

And so... ?

We can presume that it is over-vague and will be regarded so upon higher review and/or appeal?

(Not that I would mind that, at all, but just seeking informational clarification...)


186 posted on 02/25/2016 4:09:35 PM PST by SteveH
[ Post Reply | Private Reply | To 148 | View Replies]

To: DiogenesLamp

Since you have no clue as to what would actually be involved in creating a modified OS that would bypass the security, it is pointless to discuss the issue with you.


187 posted on 02/25/2016 4:15:43 PM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 179 | View Replies]

To: Swordmaker

OK that is really confusing to come into and try to understand from the outside. I suggest employing precision in discussion. If we mention Secure Enclave, perhaps it would be best if we adhere to the formal technical definition of it in the sense that it runs in its own little processor component on the A7 and possibly beyond, but not the A6 which the iphone 5C in question uses. It sounds to me as if the iphone 5c from the snippets of definition I have seen floating around, by contrast, use some kind of EEPROM boot rom library security related routines that provide conceptually similar (though less secure in the absolute sense) security at some higher functional level. Does that make any sense? If not, I wonder where I might have strayed. If something like this is spelled out in each response (I know it is somewhat more lengthy) then perhaps folks will be less likely to go down semantic rabbit holes in discussions. Then someone can come in during the discussion and still understand it without having to learn thread specific shorthand that does not apply outside the thread (eg in the so called real world, for example). All standard disclaimers remain applicable. If I am babbling on, apologies to all.


188 posted on 02/25/2016 4:19:54 PM PST by SteveH
[ Post Reply | Private Reply | To 175 | View Replies]

To: Ray76

Right, or at least seemingly so. (And that initially confused me very much, parachuting in from nowhere. I figured there was some kind of terminology rift somewhere.) FWIW, thanks.


189 posted on 02/25/2016 4:24:18 PM PST by SteveH
[ Post Reply | Private Reply | To 143 | View Replies]

To: CA Conservative
Since you have no clue as to what would actually be involved in creating a modified OS that would bypass the security, it is pointless to discuss the issue with you.

Do you write code? I do. Till you tell me how much code you write, I'd rather not hear your opinion regarding how much I know about the subject.

190 posted on 02/25/2016 4:29:32 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 187 | View Replies]

To: DiogenesLamp

Yes, I wrote code, though not in the past few years. I have also been an information security officer for 10 years, so I know a little about encryption and the like. Your comments about a 15 minute fix are ignorant and unsupportable. We are not talking about changing one procedure call - there are multiple systems involved, and without thorough testing, a quick fix like you suggest would most likely result in bricking the phone anyway. If you write code, you should know that any time you make a change in any part of the code, you risk introducing bugs that may affect parts of the code you hadn’t even considered.


191 posted on 02/25/2016 4:40:31 PM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 190 | View Replies]

To: SteveH
I am reading it from a non-legal point of view and as someone who has no grasp of the technology. I am lost after 10 tries the phone is wiped, :)

Keeping that in mind, the claim of the DOJ that Apple refused to offer any help is simply not true. To infer the password was reset by someone in San Bernadino without mentioning the password was changed at the request of the FBI is a lie by omission.

On those 2 points alone, I would deny the motion because if the Dept of Justice is going into Court to force anyone to compel, they do not change or hide the facts. If I found out the FBI and the DOJ colluded in writing the Motion to Compel, there would be no need to discuss the technical issues of how any new program would be written,because I would throw the order out. But that's just me and my legal ignorance. Good thing I am not the magistrate. :)

192 posted on 02/25/2016 4:44:11 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 186 | View Replies]

To: DiogenesLamp

Ah, first I dunno exactly what it takes to make any so called simple change. It all depends where in the system the change is made and what address space it shares with other routines, other threads, other processes, other kernels, yadayada, yes? And that might not still account for what could happen with interrupts... and yes, timer interrupts in particular...
I am a bit rusty but the timer that the user experiences could theoretically be implemented in several different ways depending on such things as the level and data space in which it (the timer code) operates. There could be unintended consequences. We prefer to think that there will not be any such consequences, but if we are wrong, then the consequences can come back and bite us in the butt. That is what system testing and reliability testing are all about. And even they don’t catch all the tiny but ultimately significant things that can bring down a system in a bad way at the wrong time and/or place. When was the last time you heard of a complex software project being delivered on time and on or under budget (and being 100% bug free)?

Beyond that I share concerns of many about bringing into life a software method of defeating a software mechanism whose sole stated, marketed, delivered and supported intention is to resist being defeated. That totally voids all the design, marketing, sales, and can open up a nightmare for support once the horse has left the barn. This simple code modification will already likely be the McGuffin of the next Mission Impossible sequel movie plot. It will be more valuable than plutonium and potentially just as dangerous (in the wrong hands).

I think we all need to take a deep breath, pause and step back a while to ponder whenever the government invokes some obscure law and uses it to demand unconditional compliance in a new venue. I’m probably not going to have time to read a 355 page Apple response tome filing. But by all accounts that I have seen, the government request seems overly broad. It should be more narrowly constrained at the very least to protect proprietary value, if granted at all. The government does not seem to feel obligated to balance Apple’s interests with its own at all. Should that not concern everyone? It is saying the equivalent of “you deal with the unintended consequences” to Apple. Well, Apple has lots of engineers and lots of lawyers and there seem as if there can be many unintended consequences. Why not hear Apple out? Why not reason with them? The government already admits it is an exceptional circumstance. Why such an openended order?

And is it true that the order was not signed by anyone? Maybe the actual order is a seperate document that is actually signed by the magistrate judge. It would then have a date of signing, signature, and date of implementation (yes?). Anyone see such a beast yet? (Just wondering.)


193 posted on 02/25/2016 4:46:49 PM PST by SteveH
[ Post Reply | Private Reply | To 166 | View Replies]

To: CA Conservative

exactly. thanks.


194 posted on 02/25/2016 4:49:03 PM PST by SteveH
[ Post Reply | Private Reply | To 191 | View Replies]

To: SteveH

And do I apologize. I was talking about the DOJ Motion and the link to which I referred was to the Court Order.

This is what happens when surrounded by talk of code- it is just like anything above basic algebra—my brain tends to get confused. Too abstract :)


195 posted on 02/25/2016 4:52:18 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 186 | View Replies]

To: Swordmaker; Ray76
Apple Fanboy Alert System
Alert Level: SEVERE
196 posted on 02/25/2016 4:59:51 PM PST by Scutter
[ Post Reply | Private Reply | To 183 | View Replies]

To: Protect the Bill of Rights

My brain was permanently fried decades ago after working on a never-released and now forgotten processor and starting to dream in processor-specific object code binary. Ugh. Where is the mathematical elegance in that?


197 posted on 02/25/2016 5:04:32 PM PST by SteveH
[ Post Reply | Private Reply | To 195 | View Replies]

To: CA Conservative

The retry counter could be incremented by 0 instead of by 1.

The retry delay code could be removed or branched around.


198 posted on 02/25/2016 5:05:11 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 191 | View Replies]

To: CA Conservative

Read your PM.

Could... not... resist... sending... funny... sendup...

:-)


199 posted on 02/25/2016 5:17:13 PM PST by SteveH
[ Post Reply | Private Reply | To 191 | View Replies]

To: SteveH; DiogenesLamp; Swordmaker
You see? This is what I mean. It really is a waste of time trying to reason with this sort of person.

Steve, you may be wondering why this poster has grappled onto you like a drowning man. I don't expect you to care, but in the interest of truth and my own reputation (on this site and its predecessors for more than 20 years) I want to point out that this dispute and this posters' attacks have gone on across numerous threads.

His venom has no basis in fact, or in the validity of an argument; he's been caught in several lies, and has run from and refuses to acknowledge his real motivation in all of this.

By his own words, he is obsessed with Tim Cook's sex life, to the point of being completely unhinged. An armchair psychologist might speculate what it is inside a man that drives him to want to destroy another whose behavior he finds so offensive-- perhaps he fears it in himself? I'll leave it to others to speculate on that.

This poster has a vehement desire to ruin Apple, and is willing to take the rest their customers' privacy and liberty down with it, just to satisfy his own lust for... what? Revenge?

Don't believe for a minute that he sees this as a fight for the liberty of citizens, or the right of legitimate government. That's a new dress he put on for this thread. He, by his own admission, thinks this is about destroying (his words) "a faggot CEO".

His words are (among many examples) here and here.

Of course, he doesn't want you to know this.

It's worth considering this when making a judgement about his veracity.

I've been telling him he's on the wrong website. He belongs at DU with this authoritarian tripe-- they live it over there.

200 posted on 02/25/2016 5:23:39 PM PST by IncPen (There is not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 167 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220 ... 241-259 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson