Posted on 03/10/2016 10:42:30 AM PST by MeganC
In the interests of brevity here's the dangerous part of this bill that's being discussed in California today:
b) A smartphone that is manufactured on or after January 1, 2017, and sold or leased in California, shall be capable of being decrypted and unlocked by its manufacturer or its operating system provider.
(Excerpt) Read more at leginfo.ca.gov ...
One could also have the user enter a portion of the key, which might be saved to the manufacturer’s website.
So even if a Communist lackey gave the PLA every key code detailed entered in Apple’s factory in China, the phone would still be secure against criminals.
Apple could also enter codes in the USA.
Always count on California to legislate in the manner that most effectively removes freedom from its citizens.
“Yeah, I used to buy a lot of code in an image (commercial purposes). We didnt have anything evil behind it, but there was a lot there.”
First it was barcodes, then QRtags, then nfc tags ...
No iPhones. No Barrett .50 cal rifles. Now, a long list of firearms made by multiple manufacturers that are for sale in other states, but not CA. The CA marketplace no longer dictates how business operates. They have become obtuse and obstructive. There is plenty of market outside of CA that can be served with products that CA prohibits.
Do you think the Chinese government allows phones with unbreakable encryption to be sold in China, the world’s largest market?
Anything. It’s a smartphone, they’re basically mid-90s computers you can stick in your pocket, except they have more storage. They can make documents, they can transmit documents. Data could be anywhere on them.
Can you buy a safe in California?
Do cars have locks on them in California?
Does the State us encryption on its official website? I think THATS illegal.
Well, fortunately, we’ll be able to still shop and relax at the grocery store. My pastor already went through these overseas, years ago. Probably in Singapore but he goes many places.
Walmart (and others) are now installing (this info is over 2 years old) systems to tie video to each individual receipt so they can look at your check-out video on demand. I even told this to a manager at a local convenience store (major chain I won’t identify). More than 3 years ago, he told me (weeks later) he just went to a class on it.
Meanwhile, back to grocery shopping - this is from many years ago. It’s coming; most likely RFID. I used to work with (and program) the printers that now have the this type of capability (notice he picks up packages of meat, which are always unique). No problem for the RFID printers.
https://www.youtube.com/watch?v=eob532iEpqk
Yep. Apparently so.
At least they should already know who his contacts are, when he called them, how long they spoke, etc.
If he ever calls anybody. I know plenty of people that never actually phone anybody on their smartphones, it’s just not that useful a feature for them. And they aren’t even paranoid types, if you’re paranoid (like the level of understandable paranoia a terrorist might have) you can use apps like skype to make “phone calls” that completely bypass your providers switchboard and therefore records. Same with texting, there’s lots of texting website out there for legitimate use that have other uses for those obfuscating their trail.
Shoot, even gaming-software support software allows you to record conversations. Individuals, of course. I know guys who pour through the logs each day. I always suspected they did.
A couple weeks ago, somebody confirmed to me, without being prompted, that they were doing it. It was already obvious to me by observing their actions. One of them, a persistent problem, had been discussed just a day or two before.
I am getting into NFC tags. Have one to log visitors into my WIFI. Don with the installed Android software on my phone.
Visitors never see the password.
If you honestly think that those two and three factor keys wouldn’t be compromised, I’ve got a bridge I’d like to sell you.
Matter of fact, look up what happened when Sony under the Lenovo division were caught with a rootkit in their software and the damage done to Lenovo-based laptops as a result. You’re operating under the assumption that manufacturers (AND THE GOVERNMENT?!) are doing everything by the book and according to industry standards. Having worked for the government, and can tell you first hand that nothing could be further from the truth. Government workers are some of the laziest, most incompetent IT people I’ve ever had the displeasure of working with.
As soon as a “backdoor” is put into something, ANYONE can use it if they find it. I’ve done white hat stuff for several years now, and it would make you shit yourself if you knew how easy it is to break into most modern clients.
That’s a new one on me. I’m not keeping up too much at the current moment.
Now that I have a couple of Android phone, is there a decent free (ouch) software to protect them from run-of-mill viruses?
Note, one, recently discounted from $59.82 to $9.82 failed to let me know you have to sign up for Google to get all the info. My cheap phone used to make it easy (Tracfone).
So, I bought it and Surprise!
[some of the laziest, most incompetent IT people Ive ever had the displeasure of working with]
Oh, the stories I could tell.
“Now that I have a couple of Android phone, is there a decent free (ouch) software to protect them from run-of-mill viruses?”
Don’t use one. Very selective about apps I install and sites I visit.
Yeah, I’m mostly concerned about adware from something I might see on Drudge, YouTube.
Generally, I avoid a whole lot of stuff. No FakeBook either, lol.
“Yeah, Im mostly concerned about adware from something I might see on Drudge, YouTube.”
NEVER click on youtube ads!
Oh I agree. I don’t. But I get sent videos. Touch screen isn’t perfect but so far, haven’t opened an ad. Other than the ones you’re stuck with on the front end of videos.
Ban Muslims.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.