Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A New York judge just ruled that the FBI can't force Apple to unlock iPhones
Business Insider ^ | 02/29/2016 | Kif Leswing

Posted on 02/29/2016 3:48:54 PM PST by Drago

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-98 next last
To: cloudmountain

Has not been broken yet, that is why the Feds use it on their devices.

http://wiki.imacros.net/AES


21 posted on 02/29/2016 4:09:53 PM PST by Drago
[ Post Reply | Private Reply | To 15 | View Replies]

To: Drago
Has not been broken yet, that is why the Feds use it on their devices.

Well, you DID say "yet."
THANK YOU.

22 posted on 02/29/2016 4:11:10 PM PST by cloudmountain
[ Post Reply | Private Reply | To 21 | View Replies]

To: cloudmountain

Computers today are not powerful enough to break AES within human lifetimes.


23 posted on 02/29/2016 4:14:25 PM PST by dinodino
[ Post Reply | Private Reply | To 22 | View Replies]

To: Drago

Apple’s stance on this issue is the exact reason that I’m typing this on a MacBook Pro rather than my old Toshiba laptop. I support those that support the constitution.


24 posted on 02/29/2016 4:15:49 PM PST by meyer (There is no political solution to this troubling evolution...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cloudmountain

The only real threat to AES 256 is “Quantum Computing”, and apparently the NSA is working on it:

http://www.cnet.com/news/nsa-working-on-quantum-computer-to-break-any-encryption/#!


25 posted on 02/29/2016 4:16:36 PM PST by Drago
[ Post Reply | Private Reply | To 22 | View Replies]

To: dinodino
Computers today are not powerful enough to break AES within human lifetimes.

Well, a more powerful one may be "just around the corner." Heck, they may already exist and are delegated to the "top secret" category.

I do believe that our gubmin tells us ONLY what they want us to know. But, then, what do I know? [Rhetorical.]

26 posted on 02/29/2016 4:18:01 PM PST by cloudmountain
[ Post Reply | Private Reply | To 23 | View Replies]

To: cloudmountain
And to the best of my knowledge, you'd be wrong. Given the ability to try to brute force the passcode, they MIGHT be successful - depending upon whether a simple numeric passcode was used, or if they used an alphanumeric passcode of indeterminate length and complexity. For example, with a 9 character random passcode using upper and lower case letters, numbers and symbols, and a system capable of 1 billion guesses per second, can take up to 228 years to crack.

The problem is that Apple has designed the system be able to erase all of the encryption keys if too many bad password attempts occur, and it requires that the password actually be entered using the phone keys. That is what the FBI is trying to get Apple to bypass for them, along with the delay between password attempts imposed by the OS.

27 posted on 02/29/2016 4:18:44 PM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Drago
The only real threat to AES 256 is “Quantum Computing”, and apparently the NSA is working on it: http://www.cnet.com/news/nsa-working-on-quantum-computer-to-break-any-encryption/#!

!!!!!

28 posted on 02/29/2016 4:18:55 PM PST by cloudmountain
[ Post Reply | Private Reply | To 25 | View Replies]

To: CA Conservative

See post #25.


29 posted on 02/29/2016 4:19:33 PM PST by cloudmountain
[ Post Reply | Private Reply | To 27 | View Replies]

To: RightOnTheBorder

“The feds didn’t just want access, some key that Apple had created, they wanted to force Apple engineers to create a program to crack their own encryption. “

WRONG!


30 posted on 02/29/2016 4:21:47 PM PST by TexasGator
[ Post Reply | Private Reply | To 10 | View Replies]

To: cloudmountain
Go read the AES-256 link that Drago linked to at Wikipedia:

"The first key-recovery attacks on full AES were due to Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger, and were published in 2011. [...] the authors calculate the best attack using their technique on AES with a 128 bit key requires storing 288 bits of data [...] works out to about 38 trillion terabytes of data, which is more than all the data stored on all the computers on the planet. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data."

That's the older 128-bit encryption standard and it would take billions of years to brute force attack AES-128 encryption on current and foreseeable hardware. Just so you're aware AES-256 encryption is in the next galaxy over.

This would be the equivalent to imagining a ten-mile square block of stainless steel left out in the open in the middle of the Sahara Desert and waiting a sufficient length of time for it to naturally rust into a pile of powdered iron oxide. Don't hold your breath: Our sun will burn out first.

31 posted on 02/29/2016 4:26:49 PM PST by The KG9 Kid
[ Post Reply | Private Reply | To 19 | View Replies]

To: Drago

An intelligent order, I’ll have to wait on Volokh to fully explain it to me though.

I don’t think “unbreakable encryption” was considered by the congress when writing CALEA however...


32 posted on 02/29/2016 4:28:13 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The KG9 Kid

Wow.


33 posted on 02/29/2016 4:30:15 PM PST by cloudmountain
[ Post Reply | Private Reply | To 31 | View Replies]

To: Drago
I am on Apple's side with one exception.

The Apple phone in the San Bernadino case did not belong to the user. It was the property of the county government who issued it to him to use in his job for the county, conducting county business.

The county mismanaged their free gimmie stuff for county workers. The county IT staff should have issued passwords to county employees using county owned phones at the time they were issued.

County, state, and federal government have no business demanding anything of which they themselves cannot manage properly and legally. Right Mrs.Clinton?

34 posted on 02/29/2016 4:31:08 PM PST by blackdog (There is no such thing as healing, only a balance between destructive and constructive forces.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: meyer

So the government cannot require Apple to give them access to thir own phone?? There is not violation of privacy of the phone’s user here as that user was their employee with their phone issued for agency use, Apple is totally in the wrong. The phone in question was used by a government employee on and for the agency work and its thusly NOT the employees information, but belongs to the phones owner, the government agency that provided that phone for the employee. Just like the company computer on your desk, the computer, as well as its data and use are NOT the employee’s to keep private, its a company tool open to the company’s scrutiny regarding its use and its data content.


35 posted on 02/29/2016 4:41:47 PM PST by wubjo (For a free people who mean to remain so, a well-organized and armed militia is their best security.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Thud

THud: you are one of the few commentators here who knows a little about history. I wrote about the government’s ability to seize industries during a time of war (esp. WW2) for various reasons (usually inability to perform on a govt contract - see Montgomery Ward case; others because of default, criminal fraud, etc.)

The key here is “in a time of war” and since ISIS, Al Qaeda and their affiliates have declared “war” on the US and the Western, we “are at war” with them, like it or not.

Also, communism is perpetually “at war with imperialism”. Just read the No. Korean papers or listen to their radio broadcasts. The same for Red Chinese military leaders, and some of the Russian leaders are back to their old communist mentality.

Radical Islamic movements (Salafist, Moslem Brotherhood, Iranian Shiites, etc) are also at war with the US and western civilization.

Black extremist groups and white extremist groups are “at war with the government” right here in the US.

None of this is new to the informed.

As a former undercover operative, I can tell you that the threats are real, ongoing, and morphing. Apple is misrepresenting the government’s request.

It would be simple for a court to order Apple to help crack the terrorist’s cellphone “in Camera” which would protect any so-called “customer privacy rights” (talk about a RED HERRING by APPLE).

THe “Cyberwar” now being waged against the US by all of the above is way beyond the understanding of the average America and it is only going to get worst, if not down right deadly.

Let’s stop taking the Left’s positions and calling them “libertarian”, yada, yada.

In a war, there are three sides, the good guys, the enemy and those inbetween. Those “inbetween” often suffer more casualties then do the combatants. Just ask the citizens of Germany and Japan about something called “WW2”.

We need an united “America”, not a philosophically divided bunch of academics, under-educated voters, and near-hysterical internet posters.

We need for all of us to understand the real, existential/survival threats that surround us and bore from within. If those threats dominant, all our discussions will be mere words erased by a “DELETE” button and a nuke or two.


36 posted on 02/29/2016 4:42:18 PM PST by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 17 | View Replies]

To: Drago

It’s the equivalent of government asking a lock maker to develop a master key. Purely because their lock was “too good” for the jackboots to easily break in.

Let them break down the damn door on their own!


37 posted on 02/29/2016 4:44:37 PM PST by varyouga
[ Post Reply | Private Reply | To 1 | View Replies]

To: RightOnTheBorder

Unfortunately, there is precedent for govt coercing people to do their dirty work against their conscience. The Fugitive Slave Law of 1850 forced free states’ private citizens to assist in capturing slaves.

The current govt trying similar coercion would be a valid thing for BLM protesters to go after vs. the mostly nonsensical things they complain about.

From article re said federal law:

“this new law forcibly compelled citizens to assist in the capture of runaway slaves. It also denied slaves the right to a jury trial”


38 posted on 02/29/2016 4:44:40 PM PST by DuhYup (The Bill of Rights is a package deal!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: wubjo
So the government cannot require Apple to give them access to thir own phone??

Apple doesn't HAVE access to the phone. The government is demanding that Apple be forced to develop a new product that does not yet exist, a product whose sole purpose is to break another one of their products. And unless something has changed while I wasn't looking, you cannot force someone to create something new.

39 posted on 02/29/2016 4:46:20 PM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 35 | View Replies]

To: wubjo

Do you honestly believe the FBI does not have every piece of information on that phone. I for one do not believe for a second they don’t.


40 posted on 02/29/2016 4:47:46 PM PST by AmericanRobot
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-98 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson