Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Barr Asks Apple to Unlock Pensacola Killer’s Phones, Setting Up Clash
The New York Times ^ | 13 Jan 2020 | Katie Benner

Posted on 01/13/2020 7:23:50 PM PST by Theoria

Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.

Mr. Barr’s appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety.

“This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that Apple had provided no “substantive assistance.”

(Excerpt) Read more at nytimes.com ...


TOPICS: Crime/Corruption; Foreign Affairs; Government; US: Florida; War on Terror
KEYWORDS: alshamrani; apple; backdoor; barr; billbarr; doj; encryption; florida; implementofwar; iphone; loyaltyoath; mrsmith; pensacola; privacy; saudiarabia; terrorist; waronterror; williambarr; williampbarr
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 181-183 next last
To: Mariner
Heres what one other expert on 256bit AES cracking:

Time and energy required to brute-force a AES-256 encryption key.

I did a report on encryption a while ago, and I thought I'd post a bit of it here as it's quite mind-boggling.

AES-256 is the standardized encryption specification. It's used worldwide by everyone from corporations to the US government. It's largest key size is 256 bits. This means that the key, the thing that turns encrypted data into unencrypted data, is string of 256 1s or 0s.

With each character having two possibilities (1 or 0), there are 2256 possible combinations. Typically, only 50% of these need to be exhausted to yield the correct key, so only 2255 need to be guessed. How long would it take to flip through each of the possible keys?

When doing mundane, repetitive calculations (such as brute-forcing or bitcoin mining), the GPU is better suited than the CPU. A high-end GPU can typically do about 2 billion calculations per second (2 gigaflops). So, we'll use GPUs.

Say you had a billion of these, all hooked together in a massively parallel computer system. Together, they could perform at 218 flops, or

2,000,000,000,000,000,000 keys per second (2 quintillion)

1 billion gpus @ 2 gigaflops each (2 billion flops)

Since there are 31,556,952 seconds in a year, we can multiply by that to get the keys per year.

*31,556,952

=6.311390425 keys per year (~10 septillion, 10 yottaflops)

Now we divide 2255 combinations by 6.311390425 keys per year:

2255 / 6.311390425

=9.173263150 years

The universe itself only existed for 14 billion (1.410) years. It would take ~6.740 times longer than the age of the universe to exhaust just half of the keyspace of a AES-256 keys.

On top of this, there is an energy limitation. The Landauer limit is a theoretical limit of energy consumption of a computation. It holds that on a system that is logically irreversible (bits do not reset themselves back to 0 from 1), a change in the value of a bit requires an entropy increase according to kTln2, where k is the Boltzmann constant, T is the temperature of the circuit in kelvins and ln2 is the natural log(2).

Lets try our experiment while considering power.

Most high-end GPUs take around 150 watts of energy to power themselves at full load. This doesn't include cooling systems.

One billion GPUS will require: 1 billion gpus @ 150 watts
150,000,000,000 watts (150 gigawatts)
1.511 watts

This is enough power to power 50 million american households.

The largest nuclear power reactors (Kashiwazaki-Kariwa) generate about 1 gigawatt of energy.

1.511 watts / 1 gigawatt = 150

Therefore, 1 billion GPUs would require 150 nuclear power plant reactors to constantly power them, and it would still take longer than the age of the universe to exhaust half of aN AES-256 keyspace.

1 billion GPUs is kind of unrealistic. How about a supercomputer?

The Tianhe-2 Supercomputer is the world's fastest supercomputer located at Sun Yat-sen University, Guangzhou, China. It clocks in at around 34 petaflops.

Tianhe-2 Supercomputer @ 33.86 petaflops (quadrillion flops) =33,860,000,000,000,000 keys per second (33.86 quadrilion)

3.38616 * 31,556,952 seconds in a year
2255 possible keys 2255 / 1.068518424

=1.068518424 keys per year (~1 septillion, 1 yottaflop)

=5.418347952 years

That's just for 1 machine. Reducing the time by just one power would require 10 more basketball court-sized supercomputers. To reduce the time by x power, we would require 10x basketball court-sized supercomputers. It would take 1,038 Tianhe-2 Supercomputers running for the entirety of the existence of everything to exhaust half of the keyspace of a AES-256 key.

And, Mariner, these calculations are assuming that the key would be hit in the first half of the key set. The odds of that are only 50%.

Another encryption specialist did a calculation on the energy to do the entire key set. . . It exceeded the energy available in the universe. ROTFLMAO! His conclusion was that any computer that could do the job would need to be made out of something other than matter, run on something other than energy, and extend into another universe.

121 posted on 01/14/2020 2:18:06 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 101 | View Replies]

To: Mariner

Please inform us how apple can “break the code” in detail - if you will?


122 posted on 01/14/2020 2:24:24 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Mariner; Swordmaker

Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.


I believe if you ping Swordmaker, he will tell you in excruciating detail why and how you are completely wrong. As I recall, it would take the best “super computer” centuries to do as you believe - if it were even possible in the first place which it is not.


123 posted on 01/14/2020 2:29:01 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 15 | View Replies]

To: HereInTheHeartland

been tried and failed many times


124 posted on 01/14/2020 2:31:56 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 35 | View Replies]

To: precisionshootist

Could you please copy and paste that section here so that we can all see it? I’d like to see it.

It’s like the Bible: I’ve read and heard pieces of it, but have never actually sat and read the whole thing.

Thank you.


125 posted on 01/14/2020 2:34:33 AM PST by Concentrate (ex-texan was right and Always Right was wrong, which is why we lost the election.)
[ Post Reply | Private Reply | To 78 | View Replies]

To: ProtectOurFreedom

The FBI got rid of the rest of her gadgets


126 posted on 01/14/2020 2:35:41 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 50 | View Replies]

To: House Atreides

Wow, why the bitterness toward Apple


I think it extends from all the Samsung users who enjoy allowing Google and others to send them personalized ads while following and recording their every word move and action.

They were likely once ardent MS computer users and still feel the bitterness from MS losing to Apple on the phone front. Irrational reactions.


127 posted on 01/14/2020 2:41:46 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 58 | View Replies]

To: mrsmith

This “security” scam of theirs is a marketing tool and I realize that.


condemnation with faint praise


128 posted on 01/14/2020 2:42:41 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 60 | View Replies]

To: CJ Wolf

The hash code is stored in the cloud I believe - the device knows nothing


129 posted on 01/14/2020 2:45:11 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 69 | View Replies]

To: Mariner

I know everything about encryption


You and Swordmaker should get along famously then.


130 posted on 01/14/2020 2:57:03 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 80 | View Replies]

To: a fool in paradise

Note to self I’m alive but the user of the iphone is dead. There seems to be a conflict here


131 posted on 01/14/2020 3:10:42 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 110 | View Replies]

To: Swordmaker

all data a person could possibly need could be eventually compressed and encrypted down and stored in a single digit number.


Done - the answer is 43 which reduces to 7 :)


132 posted on 01/14/2020 3:12:51 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 111 | View Replies]

To: DesertRhino

Screw Apple. Nothing but MeToo.


133 posted on 01/14/2020 3:59:35 AM PST by ImJustAnotherOkie (All I know is The I read in the papers.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Theoria

Unlock the f-ing phone.
1) He was never an American Citizen
2) He was a foreign military saboteur and terrorist
3) The constitution does not protect the rights of enemy combatants
4) He’s dead so he won’t care


134 posted on 01/14/2020 4:19:04 AM PST by BuffaloJack ("Security does not exist in nature. Everything has risk." Henry Savage)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DesertRhino

What’s up with this? The adept of Justice has No access to a government Super computer that could probably crack the encryption in a half hour?who do they think their fooling?


135 posted on 01/14/2020 4:27:54 AM PST by puppypusher ( The world is going to the dogs.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: DesertRhino

So as our enemy, you support the terrorist


136 posted on 01/14/2020 4:30:06 AM PST by bert ( (KE. NP. N.C. +12) Progressives are existential American enemies)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Theoria

Here is a clue to the DOJ.
Everyone on his call list has already dumped their phones or changed their numbers.
Morons


137 posted on 01/14/2020 5:15:13 AM PST by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: DesertRhino

Prolly not admissible since such tech “doesn’t constitutionally exist”...


138 posted on 01/14/2020 8:51:47 AM PST by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: DesertRhino
Try taking a shot at how apple can crack his password. Try explaining how common law forbids an iphone the government cannot figure out how to unlock.

Indeed. Apple spends a lot of money to make their phones secure enough that not even they can hack them. It's a selling point, and one of the biggest reasons I use an iPhone rather than Android or something else. (is there anything else?) Fedgov has tried beating corps into adding back doors to their products since back in the 'clipper chip' days. I am not surprised at all that Barr supports that effort. Not one bit.

The NSA has, at the very least, the metadata associated with any calls that might have been made to/from these phones. If they weren't looking more closely at these foreign nationals, then perhaps they need to rethink spending so much time spying on honest Americans, and their work attempting to facilitate a coup against our sitting president.

139 posted on 01/14/2020 8:55:47 AM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 41 | View Replies]

To: mrsmith
Though customers don’t seem to care.

Uh, some of us do. The fact that Apple puts as much effort into making their phone unhackable (even with physical access, which is normally 'game over' in the computer security world), is one of the main reasons I use an iPhone rather than something else. I, like many others are willing to pay for that additional level of security.

140 posted on 01/14/2020 8:58:32 AM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 46 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 181-183 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson