Posted on 02/29/2016 3:48:54 PM PST by Drago
A federal judge in Brooklyn has ruled that the government can't force Apple to help break an iPhone's passcode security. No, it's not the San Bernardino shooting case, a similar situation where the FBI is seeking to compel Apple to provide custom software to help it access data on a criminal's iPhone...
(Excerpt) Read more at businessinsider.com ...
I don't think I said that. And you're mixing Apples and oranges. ;~)
Are you aware that the USPS photographs the front and back of every letter you send? That’s a step away from reading your mail. This means they are able to keep track of everyone you correspond with.
Hate to deal with a technicality, but a declaration of war today, short of being attacked by No. Korea or Red China, just isn’t going to happen.
We have fought the Korean War (a UN Police action), “Vietnam War” (major war in three countries), had forces in Lebanon, Grenada (a clean-out action), Iraq (a real war) and Afghanistan (a real guerrilla war).
Total casualties are roughly 100,000 KIA and over 1-2 million wounded. I call those figures “casualties of war”.
My son got his medals for Operation Iraqi Freedom, etc., not “police action OIF”).
We like to mess up the reality of the situation by trying to parse words that shouldn’t be parsed. With the international implications of “declaring war” on another nation, it is better to have the flexibility to wage a “war” without congressionally declaring it.
This is the 21st Century, not the 1940’s and things have changed, for the worst. We had better adapt or be destroyed.
Also there are the “shadow wars” which you only read about in books but which most people will never know about. There are also the “wars of subversion” (in which I participated) which you can find mainly in a few books and congressional hearings, but they are real psychological and undermining wars.
Many of the laws that applied during WW2 are still in effect regarding the treatment of armed, uniformed opponents, the treatment of civilians, off-limit targets (hospitals, international cities, etc). They have been supplemented by UN resolutions that most nations have signed, but not by all of our enemies. We still play by the rules (most of the time). At other times and situations, we “adapt” and succeed.
Life is complicated but wars are relatively simple things to delineate. An enemy says they are at war with you and act that way. You either ignore them, withdraw from the battlefield, fight them to a status quo as in Korea, or defeat the bastards. No matter what you do, it was still a war.
Not just Obama but Trump.
Can you imagine either of them with the power as POTUS to use all phones info against tho he disagrees with??
Trump's talk about changing libel laws to make it easier for him to sue those in media for publishing opinions he doesn't like is definitely problematic, except for those who worship him.
Hitler promised to get the trains running on time
The problem isnt too little federal power.
Check yourself for wrongness.
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
Got it. Thanks.
They've been trying for about 9 years and failing. So why do you think they'd be able to do it now?
It can, if you have enough time to brute force it. . . trying to brute force the data encryption with out the key would take a mere 5.62 Undecillion years. That's 5.62 X 10195 years to try every possible key. I think the dire need to get at the data might be moot by then, don't you?
Uh, what law in the United States permits that? I know of none. Do you?
There are quite a few "unbreakable codes."
The simplest is one where two people have agreed in advance between them on a code book. This book is a published book of over a thousand pages of prose and numbers. You and your partner agree in advance to a set of rules based on the calendar. Odd days, you go right and up, even left and down. Sundays. stay where you land . Use a three dice. You are the sender. Roll the dice and multiply the roll times the date then times 5. Thats your starting page. write that number down. If the day is even, using the first dice in your role, go that number of pages left. write that second number down. Second dice, starting at the top line of the page, go down that number of lines. Write that Third number down. Third dice, from the left of the page, count that number of words, write that Fourth number down. Starting at the beginning of that word, count letters until you find the letter you want, upper or lower case, write that count down as your Fifth number. Role the dice again, and do your second letter of your secret message, RINSE and REPEAT until your entire message is coded. Spaces, periods, numbers, all handled the same. Send it.
Perfect unbreakable code.
Never repeats, no pattern develops. Nothing ever decipherable because there is nothing but five sets of numbers that appear totally random, because the dice randomize every code set.
This actually can be done with a computer if both of you have the same base book in your computer. Just don't share the book with anybody.
To further randomize it, on a regular schedule, you and your receiver should change books on specific dates known only to the two of you.
To make it even more obtuse, make all the numbers five digits. Pad them out with random noise. Only you need to know that the real numbers are the inside three or two or one, depending on the order received.
Of course, this is a communications code. Not a storage code like the 256 bit AES used on the iPhone. But, as I said, there are quite a few unbreakable codes. It just depends on your purpose.
Yes, it does. A court of equal jurisdiction has just ruled on a similar case to the California Court Order, an order which used the same "All Writs Act," and in fact the California case was being used as precedent in the California case as a persuasive case to the Judge, even though undecided at the time of the issuance of the order, so it definitely will have a bearing and a precedential effect in the hearing.
Recall that time it would take to break a 256 bit AES encryption. 5.62 X 10195 years. That was assuming the fastest supercomputer we have time THREE. . . capable of trying 9.5 TRILLION possible keys per year. Google has a quantum computer currently working. it's 100,000,000 times faster than the fastest single core PC. Let's assume they can make a Supercomputer 100,000,000 faster using Quantum tech. How much faster could they try all the possible keys? They'd get it done in 5.62 X 10187 years. That's a bit shorter, but I don't think it's make a difference we'd much care about.
Consider this fact, it's estimated that there are 4.62 X 1084 ATOMS in the observable Universe. That means there aren't enough ATOMS in the Observable Universe to use as counters to count the years it would take to try even HALF of every possible key!
But that's OK, because they estimate that the protons, neutrons, and electrons that make up those atoms will have all decayed into quarks and neutrinos by 3.2 X 1082 years anyway. In other words, the Universe will have died a heat death before we got anywhere close to half-way done.
Quantum computing won't work on an iPhone because the trials have to occur on the iPhone. The potential passcodes have to be compared to a one-way hash that is stored in a read-only secure location in the processor. Remove it, and the system stops working, and the hash is erased. That forces you into actually trying to brute force a much harder key, the actual 256 bit AES key of the data itself which is made up of over 132 characters minimum, composed of the now deleted passcode, the UID of the processor, unreadable outside the processor, and stored random inputs from the first startup taken from the camera, accelerometer, and microphone, then ALSO stored in an unrecoverable one-way storage lockbox in side the encryption engine. That key can be any character from Apple's character set of 233 characters, and therefore be 233132 possible keys to try.
Of course, if you are going after the data itself, you could clone it and try it on multiple computers. But how many can you afford to dedicate to the project?
it was NOT Apple that made this public. It was the FBI who got the Court Order without Apple's presence in the Court Room and immediately issued a press release claiming Apple had refused to cooperate with a search warrant, when Apple had been cooperating all along, including providing all data that Apple was in custody of on the iCloud accounts of the terrorists. Apple VOLUNTEERED to assist in any way they could. The FBI demanded something that was NOT within their power to do. . . and then went the way of an illegal court order, in violation of the Communications Assistance for Law Enforcement Act which PROHIBITS what they are demanding Apple do. That is exactly what this New York judge has just ruled. The "All Writs Act" is an inappropriate law to apply and the government's attempt to compel Apple violates a long standing law that the FBI KNOWS ABOUT!
IIRC Byte Magazine in an article re secure encryption mentioned using a truly random generated set of bits shared via duplicate codebooks as in your example. Each segment of bits is used once for each messsage. Just exclusive OR the segment of random bits with the message’s bits then send. Receiver uses duplicate segment of bits to decrypt. Very fast since OR function is HW processed. Using low order bits from an ADC reading resistor thermal noise would probably give a random enough codebook set.
“REAL spies already have a plan... “
“REAL” spies would also use “REAL” encryption software - some of which is provably unbreakable.
The quest to unlock the iPhone is just more security theater, intended to extend the reach of government power.
"... nor shall private property be taken for public use, without just compensation."
I did mention this is my day job.
Freedom is not free.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.