Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Barr Asks Apple to Unlock Pensacola Killer’s Phones, Setting Up Clash
The New York Times ^ | 13 Jan 2020 | Katie Benner

Posted on 01/13/2020 7:23:50 PM PST by Theoria

Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.

Mr. Barr’s appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety.

“This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that Apple had provided no “substantive assistance.”

(Excerpt) Read more at nytimes.com ...


TOPICS: Crime/Corruption; Foreign Affairs; Government; US: Florida; War on Terror
KEYWORDS: alshamrani; apple; backdoor; barr; billbarr; doj; encryption; florida; implementofwar; iphone; loyaltyoath; mrsmith; pensacola; privacy; saudiarabia; terrorist; waronterror; williambarr; williampbarr
Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-183 next last
To: Swordmaker
What’s more, Mariner, the system is designed so you must try each key on the device. You have only ten tries before the data is erased. . . completely. No shadow data left to recover.

My biggest feature request on iPhones is a wipe password. You would essentially have 2 passwords. One to unlock, one to wipe. Enter the wrong one and the game is over. You can guess which one I'd be freely willing to give to FedGov.

141 posted on 01/14/2020 9:14:30 AM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 83 | View Replies]

To: Swordmaker

So are you are saying that you cant unlock an apple phone if it’s not connected?


142 posted on 01/14/2020 9:35:46 AM PST by CJ Wolf ( #wwg1wga)
[ Post Reply | Private Reply | To 102 | View Replies]

To: Mariner
And if you know the base algorithm, a supercomputer can find the key.

Uh, that's not true. They are using a publicly known algorithm. AES256 is well known, and well researched. As Swordmaker has commented upthread, the 'key' itself is not actually stored on the device. A hash of it is. That hash is a one-way mathematical function. It cannot be reversed. No supercomputer extant today can crack it in anything less than the heat death of the universe. If they could, that would mean that the cryptographic algorithm had been fundamentally compromised. That's why we use these algorithms and functions. They are, to the best of our knowledge, absolutely secure short of brute-force cracking, which iPhones attempt to defeat through hardware. (i.e., you only get 10 tries before the hash is wiped.) Even if Fedgov can get around that limitation, I'm perfectly willing to let them churn away on it with all available computational resources until the sun expands into a gas giant and swallows the Earth.

I've had an interest in cryptography since Phil Zimmerman released PGP a couple of decades ago. None of the math of this is rocket science. Implementation of it sometimes can be, which is why Apple goes to as much trouble as it does to isolate the crypto from the phone itself. Personally, I think they do a pretty good job of it. Better than Google has with Android, mainly because Apple has total control over both hardware and software, which is something Google does not have.

As I said, the implementation of the cryptographic protocols, can be pretty difficult, especially against a determined adversary like FedGov. There are known hacks against older iPhones. Each time a work-around is found, Apple attempts to mitigate on their next models, as they should.

143 posted on 01/14/2020 9:36:22 AM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 104 | View Replies]

To: Swordmaker
Another encryption specialist did a calculation on the energy to do the entire key set. . . It exceeded the energy available in the universe. ROTFLMAO! His conclusion was that any computer that could do the job would need to be made out of something other than matter, run on something other than energy, and extend into another universe.

Uh, I'd like one of those computers that are made of something other than matter, run on something other than energy, and extend into other universes.

144 posted on 01/14/2020 9:51:01 AM PST by zeugma (I sure wish I lived in a country where the rule of law actually applied to those in power.)
[ Post Reply | Private Reply | To 121 | View Replies]

To: mrsmith
More snark.

Always accuse the other person of what you are doing, like all democrats do.

If you read what Cook actually provided instead of what Barr said they did, you might be more informed. Barr is the guy who believed every word of the jail crew that killed Epstein but lies about Cook/Apple. Go figure.

145 posted on 01/14/2020 9:51:11 AM PST by itsahoot (Welcome to the New USA where Islam is a religion of peace and Christianity is a mental disorder.)
[ Post Reply | Private Reply | To 91 | View Replies]

To: PIF
The hash code is stored in the cloud I believe - the device knows nothing

No, the hash code is on the device in the Secure Enclave. It cannot be accessed from outside the device because even the iOS device’s own system processor has no connection to that memory area at all. Only the dedicated Encryption Engine processor can access it for specific purposes.

The Encryption Engine’s processor in the Secure Enclave can request specific inputs from the System processor, such as the necessary environmental sensor data for creating part of the encryption key, and receive input from the virtual keyboard when the system is locked or in change passcode mode. Otherwise, the input and output is hardware limited to what it can do. There is no connection on the logic board at all where the data in the Secure Enclave can be accessed at all.

146 posted on 01/14/2020 10:01:35 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 129 | View Replies]

To: a fool in paradise
My brother’s contact was only provided well after this final step. With no verification that it was the phone owner making the request.

It sounds as if you got connected to the department of dirty tricks rather than the Fairy Godmother department. It doesn’t sound like Apple’s usual approach to service to me.

147 posted on 01/14/2020 10:03:31 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 120 | View Replies]

To: Theoria

Comey can get FISA warrant using a political corrupt lie filed dossier, but we cannot get apple to open a phone of a known terrorist.

What’s wrong with this picture when terrorists have more rights than innocent civilians?


148 posted on 01/14/2020 10:05:00 AM PST by 1Old Pro
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Have you ever gone through the process?

It didnt make me feel safer or secure. Only inconvenienced for two weeks.


149 posted on 01/14/2020 10:13:26 AM PST by a fool in paradise (Decade of decision for America)
[ Post Reply | Private Reply | To 147 | View Replies]

To: Gene Eric; DesertRhino
Prolly not admissible since such tech “doesn’t constitutionally exist”...

You’ve actually got a point there. When you use a technique to gain access to a technological device, the defense is entitled to access to that technique, in all details, including the technology, so they can challenge how it was done. Some things must remain a secret. That is one of the reasons why Apple will not unlock individual phones.

A couple decades ago, a pedophile murderer was thought to keep his files on a Blackberry phone. The prosecutors convinced RIMM, because of the heinous nature of the crime, to break with their previous policy to unlock the previously inviolate Blackberry security and allow the evidence to be used against the defendant. The judge in the case, in response to a defense pleading, ordered Blackberry to reveal to the defense’s IT specialist under court seal, how the Blackberry was protected and how it was unlocked, so they could consider if it was in someway useful for the defense.

The defense’s teenage IT specialist, against the court ordered seal, made copies of the unlocking technique (Gee, who could have guessed), and shared it with some of his buddies!

If that was not bad enough with the techniques now out in the hacker and scammer communities, after the trial and conviction, the idiot judge, in response to petitions from the media, citing Freedom of the press. open trials, and the right of the people to know, unsealed everything in the case, including the RIMM proprietary data! So much for RIMM’s vaunted security that was what made it special enough that governments were buying and using their Blackberry products. RIMM had to go back and completely re-invent its security and privacy using a completely different paradigm.

150 posted on 01/14/2020 10:29:25 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 138 | View Replies]

To: Concentrate
"Could you please copy and paste that section here so that we can all see it? I’d like to see it. It’s like the Bible: I’ve read and heard pieces of it, but have never actually sat and read the whole thing. Thank you."

I don't think I have what you are after as I'm not the OP. Maybe try the OP to see if he can help. Sorry!

151 posted on 01/14/2020 10:45:28 AM PST by precisionshootist
[ Post Reply | Private Reply | To 125 | View Replies]

To: zeugma
"Uh, I'd like one of those computers that are made of something other than matter, run on something other than energy, and extend into other universes. "

Probably on Amazon now!

152 posted on 01/14/2020 10:48:15 AM PST by precisionshootist
[ Post Reply | Private Reply | To 144 | View Replies]

To: CJ Wolf
So are you are saying that you cant unlock an apple phone if it’s not connected?

Where did I say that? I specifically stated that the one-way hash is kept in a Secure Enclave on the device. Nowhere did I say anything about requiring a connection to unlock the device. There is nothing about Apple security that is ever sent to the cloud unless the user decided to use iCloud. Even then nothing about the device security is ever sent to iCloud. ZIP, nada, nothing.

The Secure Enclave is part of the A13 Bionic SoC (System on a Chip) which includes the System Processor, the Encryption Engine which includes the Secure Enclave, Graphics Processing Units, Neural Engine, and other ICs, all incorporated into a single 8.5 billion transistor Integrated Chip. The passcode one-way comparison hash is kept somewhere in a randomized EPROM memory location inside a Secure Enclave inside the Encryption Engine in the A13 Bionic SoC, not on the cloud.

Incidentally, that specific A13 Bionic SoC is hardware registered to other components inside that specific iOS device. It cannot be pulled out and just stuck in another iOS device and work without being registered to those other components, and vice verse. This is more of the security iOS devices offer to keep the user’s data safe.

153 posted on 01/14/2020 10:52:30 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 142 | View Replies]

To: Swordmaker

Looks like that should have been directed to PIF. Apologies


154 posted on 01/14/2020 11:01:01 AM PST by CJ Wolf ( #wwg1wga)
[ Post Reply | Private Reply | To 153 | View Replies]

To: zeugma
My biggest feature request on iPhones is a wipe password. You would essentially have 2 passwords. One to unlock, one to wipe. Enter the wrong one and the game is over. You can guess which one I'd be freely willing to give to FedGov.

I’ve often thought that would be a great idea. . . But then they’d likely charge you with obstruction of justice. You can’t win. LOL!

Now what might be good would be a way is that if you looked at the iPhone with a certain expression, say you just dud a quick double blink while unlocking it THAT would erase it or just a specific data area you want protected. Then you can look at them with a blank stare and say, “gee, I don’t know what happened, it just went blank! Talk to Apple.” Or, in the latter case, just relax, you’re protected.

155 posted on 01/14/2020 11:06:35 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 141 | View Replies]

To: Mariner
Encryption was my job.
For Uncle Sam.

When. Since you linked to a computer from 1966, I suspect that might be when you were doing it.

156 posted on 01/14/2020 11:08:56 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 101 | View Replies]

To: a fool in paradise
Have you ever gone through the process?

It didnt make me feel safer or secure. Only inconvenienced for two weeks.

Yes, I actually have with a client I helped who tried to put in a complex passcode and promptly forgot exactly what he entered. It took about two hours with an up scaling of tech support at Apple on 1-800-MY-APPLE. We got connected with the Fairy Godmother Department who used his AppleID to unlock it. . . But he had activated that feature. It then took some time for the encryption to be redone using the new passcode.

157 posted on 01/14/2020 11:35:58 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 149 | View Replies]

To: Swordmaker

I’m sorry. I’ve said too much already that I cannot defend.


158 posted on 01/14/2020 11:43:02 AM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 156 | View Replies]

To: Mariner
I’m sorry. I’ve said too much already that I cannot defend.

That’s OK, all of us have at one time or another gotten ourselves into that position. It’s all good.

159 posted on 01/14/2020 12:30:01 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 158 | View Replies]

To: Swordmaker

So you have never gone the waiting period route but dispute my account


160 posted on 01/14/2020 12:49:07 PM PST by a fool in paradise (Decade of decision for America)
[ Post Reply | Private Reply | To 157 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-183 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson