Posted on 03/11/2016 5:51:41 PM PST by Swordmaker
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
Hilarious. Gunga Din never carried this much water.
They should have had their people ask him a the Sea Island Fundraiser
I thinks it is the First Time Tim Cook has given Money to a Republican
YOU are a know nothing and proud of it. I posted this and you have not even bothered to read it before you post a negative comment. What a tool, and a fool.
I stopped after the string of probably’s, could’s, mights and possibly’s. Sorry, If I want fiction I’ll read Giles Goat Boy.
Is Obama really looking for a cash payoff for his retirement ?
Johnathan Zdziarski is an expert on cellular phone forensics and you dismiss his explanations as "fiction" just as you have anyone else you disagree with. You prefer ignorance.
Your lies are not believable. Let's examine your claim of a string of "probablys, coulds, mights and possiblys" you claim are strung together in this article which you say make it "fiction."
Your statement fails even the most cursory examination for truth. Therefore, you did not even read it before you condemned it as fiction. A lie.
You raise the claim of "fiction" that simply does NOT exist. Which again, as you have done before, makes you a liar. READ the article instead of making an assumption that makes only you look a fool.
You make this lying claim intending to denigrate the author and the article, to prevent OTHER people from reading it. YOU FAIL.
The REALLY funny thing is this author is saying Apple is either lying or stupid.
Apple says it can meet the writs’ demands very cheaply LOL!
Sounds like the Gov has someone on the inside that isnt bright enough to do it. He/she will steal it.
Sorry feds. You are not that bright.
To wit: TSA allows locking luggage IF they have the master key. Those are the master keys. Within hours of publication of that photo, uncontrolled unauthorized copies of those keys were produced - just from that picture. Now extrapolate that incident to cell phone security...
“You make this lying claim intending to denigrate the author and the article, to prevent OTHER people from reading it. YOU FAIL.”
Oh no. That one stung.
Huh? It’s not “very cheap”, and the greater point is that if done, iPhone security is rapidly & badly compromised. One surreptitious thumb drive and copy command (for which there will be INTENSE black-market pressure), and Apple’s secret “crown jewels” are practically public domain.
“You prefer ignorance.”
Well ya got me there, sport. I’m still talking to you.
Maybe if you demand they unlock it in a loud DI voice, everyone will do what you want! lol. Not everyone wants the childlike existence of a base for the entire nation, where everything falls under the control of a superior.
So how many devices have performed a forensic examination on? How many forensic tools have you developed and had to defend in court? Please, give us your qualifications to provide an educated opinion on the article.
While I have never developed a new forensic tool, I have been a certified forensic examiner for 8 years, and have examined hundreds of systems in both criminal and employment (HR) cases. And I can assure you that what the author stated is exactly right. Even though I did not develop the tools I use, I still have to be able to explain how they work, show how the results were achieved, prove that the tool does not change any data, prove that the results can be replicated, provide copies of the raw data and the results to the defense, etc., etc. And the tools I use have had to go through the validation tests described by the author in order to be accepted by the court.
So, the gov is requiring apple to create an “instrument” that will hold up in court via peer reviewed/tested forensic science methodologies, open the phone ( meaning extract all data, with a guarantee nonetheless of surety) and then give the gov the basic tool ( so it can be used at will by the gov) but later, Apple can detroy the tool if they wish etc.
In effect, apple, rather than simply imaging a phone under court order, now must in fact extract Evidence for the government and give them the means to so do later.
Will the gov give themselves warrants in order to use this tool later? So much for the 4th Amendment. If I were Apple, I would continue to refuse. I would offer to image the phone but nothing more. This is a blatant attempt at abuse and or usurpation of liberty.
All said, I support the leveraging of the data on th ephone for counter-terror purposes, just not by having a non gov entity be forced to do so and give the instrument to the government.
It’s about 150 grand- according to Apple: UP TO a ten man team with 6 to 8 programmers LESS THAN a month.
I agree there are great risks for the security of Apple’s Fourth Amendment destroying software’s security.
I’d like everyone to have ‘unbreakable’ encryption that can be opened by a valid Fourth Amendment warrant.
I like good security AND I like the Fourth Amendment.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.