Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rarestia

“If they give the keys to government, they’re giving them to criminals too”

Not so.

One can have a device-based key, so you would need the device itself.

Or you could have a two-part key, one part with the manufacturer and another part with the NSA.

Or you could have a three-part key, one part with the manufacturer and another part with the FBI and a third part with the NSA.


50 posted on 03/10/2016 11:58:27 AM PST by Brian Griffin
[ Post Reply | Private Reply | To 5 | View Replies ]


To: Brian Griffin

One could also have the user enter a portion of the key, which might be saved to the manufacturer’s website.

So even if a Communist lackey gave the PLA every key code detailed entered in Apple’s factory in China, the phone would still be secure against criminals.

Apple could also enter codes in the USA.


61 posted on 03/10/2016 12:18:36 PM PST by Brian Griffin
[ Post Reply | Private Reply | To 50 | View Replies ]

To: Brian Griffin

If you honestly think that those two and three factor keys wouldn’t be compromised, I’ve got a bridge I’d like to sell you.

Matter of fact, look up what happened when Sony under the Lenovo division were caught with a rootkit in their software and the damage done to Lenovo-based laptops as a result. You’re operating under the assumption that manufacturers (AND THE GOVERNMENT?!) are doing everything by the book and according to industry standards. Having worked for the government, and can tell you first hand that nothing could be further from the truth. Government workers are some of the laziest, most incompetent IT people I’ve ever had the displeasure of working with.

As soon as a “backdoor” is put into something, ANYONE can use it if they find it. I’ve done white hat stuff for several years now, and it would make you shit yourself if you knew how easy it is to break into most modern clients.


73 posted on 03/10/2016 1:27:40 PM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 50 | View Replies ]

To: Brian Griffin

How about the old fashioned way? Serve a warrant to the owner of an encrypted device, seize said phone & if owner refuses to make data on phone accessible, sort it out in the courtroom with a judge.

It is all about sneak & peek. The agencies who are against encryption want the ability to access smart phones without any prior notification. Delayed notification will be routine and would be extended indefinitely.


94 posted on 03/12/2016 5:36:10 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 50 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson