Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Barr Asks Apple to Unlock Pensacola Killer’s Phones, Setting Up Clash
The New York Times ^ | 13 Jan 2020 | Katie Benner

Posted on 01/13/2020 7:23:50 PM PST by Theoria

Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.

Mr. Barr’s appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety.

“This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that Apple had provided no “substantive assistance.”

(Excerpt) Read more at nytimes.com ...


TOPICS: Crime/Corruption; Foreign Affairs; Government; US: Florida; War on Terror
KEYWORDS: alshamrani; apple; backdoor; barr; billbarr; doj; encryption; florida; implementofwar; iphone; loyaltyoath; mrsmith; pensacola; privacy; saudiarabia; terrorist; waronterror; williambarr; williampbarr
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 181-183 next last
To: mrsmith
"Until you know something about the subject you can only get a trite response. Years ago I was challenged here to learn about the Constitution and instead of being a fool... I learned. "

Please, educate us on how the Constitution provides the government the power to force a third party to produce something based on a search warrant.

81 posted on 01/13/2020 9:36:48 PM PST by precisionshootist
[ Post Reply | Private Reply | To 52 | View Replies]

To: precisionshootist

If you know the prime numbers divided in the encryption, you are not an outsider and the code is relatively easy to discern with powerful computers.

All encryption centers on the prime numbers.

And Apple knows what they are, and so does NSA. Otherwise the encryption could not be exported to ANYONE.


82 posted on 01/13/2020 9:41:08 PM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 79 | View Replies]

To: Mariner
Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.

No, unfortunately neither Apple nor the NSA has that ability, even with the fastest supercomputer extant to date, or even a quantum computer. You obviously do not grasp the nature of single key encryption which is what is used on Apple iOS devices.

256bit AES encryption with a complex key such as an iOS device constructs from the user’s passcode, an internal device ID, a device model ID, and a completely random number generated from environmental variables when the actual encryption key was first generated (also stored in an inaccessible internal Secure Enclave inside the encryption engine) results in a variable length key that can be made up of any of the 223 characters available in the Apple virtual keyboard, and can be as long as 256 characters in length. That’s a huge encryption key. . . and it is NOT stored anywhere on the device where it could be found and read.

That’s means it is possible to have 223256 number of possible keys and only one will decipher the data.

What’s more, Mariner, the system is designed so you must try each key on the device. You have only ten tries before the data is erased. . . completely. No shadow data left to recover.

Using a hypothetical supercomputer that could try and test 50,000 keys per second, checking for readable data with each test, it would require 6.25 X 10195 years to try all possible keys. Let’s multiply the speed of our hypothetical supercomputer by one trillion times. You’d think it would get done a lot faster and you’d be right. It would finish in only 6.25 X 10169 years! This is the problem of very large numbers.

So, maybe we attack the terrorist’s passcode, much simpler. If he’s stupid and has only a four digit numeric code, easy. Even with the built in delays, and we are careful, we can likely get in by defeating the delay system in under an hour. . . That’s the way the San Bernardino terrorist’s IPhone 5s was cracked.

But, I doubt newer iPhones are so easy. In fact, there’s no doubt. That system doesn’t work. Also, if he’s smarter, he’s using a six digit or more. Then, even if you could defeat the time outs and lockouts, you’re talking one million possible with six digits, 100 million with seven, and so on. The time to try grows literally exponentially. If you add in alphanumeric and symbols, it becomes impossible. Again, they have to be tried on the device.

At some point the value of the data becomes not worth the effort.

83 posted on 01/13/2020 9:41:33 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker

See my #82.


84 posted on 01/13/2020 9:42:29 PM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 83 | View Replies]

To: precisionshootist

Such silly arguments I’m getting tonight.

Apple, or any company, can produce a product amenable to Common Law.
But they make more money by not doing so.

Of course a warrant can demand info from a third=party, if they can provide it.
Only an idiot wouldn’t see that.
Apple, and some pother companies, have deliberately produced products they can’t open for a court.
They make more money that way. It’s a marketing tool.

There are alternatives ‘tech’ firms can offer.


85 posted on 01/13/2020 9:46:37 PM PST by mrsmith (Dumb sluts (M / F) : Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 81 | View Replies]

To: HereInTheHeartland
Pay a 17 year old kid $100. It would be unlocked in 10 minutes.

Sorry, no smart 17 year old that could unlock a modern iPhone would settle for a mere $100. The last time the FBI needed an iPhone unlocked they paid over $1 million.

86 posted on 01/13/2020 9:47:39 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 35 | View Replies]

To: mrsmith; DesertRhino
Years ago I was challenged here to learn about the Constitution and instead of being a fool... I learned.

Just not much apparently.

87 posted on 01/13/2020 9:49:33 PM PST by itsahoot (Welcome to the New USA where Islam is a religion of peace and Christianity is a mental disorder.)
[ Post Reply | Private Reply | To 52 | View Replies]

To: itsahoot

Much better to learn instead of being a snarky fool.
Of course it’s easier to be a snarky fool. Lots less work and other fools appreciate you- if you’re desperate for that kind of appreciation.

Anyway, I’m off. Had enough stupidity.
(And more’s coming from people who won’t think no matter what.)


88 posted on 01/13/2020 9:54:10 PM PST by mrsmith (Dumb sluts (M / F) : Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 87 | View Replies]

To: itsahoot

Much better to learn instead of being a snarky fool.
Of course it’s easier to be a snarky fool. Lots less work and other fools appreciate you- if you’re desperate for that kind of appreciation.

Anyway, I’m off. Had enough stupidity.
(And more’s coming from people who won’t think no matter what.)


89 posted on 01/13/2020 9:54:10 PM PST by mrsmith (Dumb sluts (M / F) : Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 87 | View Replies]

To: mrsmith
(And more’s coming from people who won’t think no matter what.)

The problem for you is we do think, you bluster your feelings.

90 posted on 01/13/2020 9:56:06 PM PST by itsahoot (Welcome to the New USA where Islam is a religion of peace and Christianity is a mental disorder.)
[ Post Reply | Private Reply | To 89 | View Replies]

To: itsahoot

More snark. Feels so good you can’t resist?
LOL!
Seriously, good night.


91 posted on 01/13/2020 10:01:18 PM PST by mrsmith (Dumb sluts (M / F) : Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 90 | View Replies]

To: Mariner
"I know everything about encryption, and endeavor to understand the constitution every day."

lol, you are funny. Do you think high level encryption can easily be brushed aside when the government issues a warrant?

If that's the case why doesn't the Government unlock the phones themselves?

92 posted on 01/13/2020 10:04:09 PM PST by precisionshootist
[ Post Reply | Private Reply | To 80 | View Replies]

To: SpaceBar
Barr is shaping up to be Jeff Sessions II. Apple has made its position clear in the past. Public grovelling won’t change that.

Different issue then, in the past. Then, the FBI presented Apple with an All Writs Court Order requiring Apple to do something that was 1) not in Apple’s normal line of business which is what an All Writs order is normally used for; 2) required Apple to create a special custom FBiOS that could be installed on the target iPhone (read any iOS device with minor tweaking) and defeat the built in security; 3) give it to the FBI as a tool for their use; 4) and, by Federal Law, the 1993 Communications Assistance for Law Enforcement Act (CALEA) was clearly an order that was PROHIBITED BY THE CLEAR LANGUAGE OF THE STATUTE! In fact, the SCOTUS had twice ruled on the use of All Writs orders prohibiting using them as Magistrate Judge Pym was attempting to use her order to require of Apple, ruling it was a form of involuntary servitude. You cannot use an All Writs order to force a third-party business to perform an act against its own business interest if it is not in the ordinary course of doing that business. In this case, Apple does not build and sell custom operating systems which compromise its security model, nor do they provide custom software.

93 posted on 01/13/2020 10:05:33 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Swordmaker
"The last time the FBI needed an iPhone unlocked they paid over $1 million. "

Yes, and I don't believe a word of it. I do not believe that phone was ever cracked. I think they made the story up to convince apple they might as well just provide the back door they believe exists. If they paid a million dollars, which is nothing for the FBI, why is Barr publicly going after apple again? Why not have the same group unlock the phone and then have them explain how to do it? The answer is obviously because the Israeli phone crack story was total BS. They never got into that phone.

94 posted on 01/13/2020 10:09:57 PM PST by precisionshootist
[ Post Reply | Private Reply | To 86 | View Replies]

To: SpaceBar; House Atreides
li>That is simply not true. There are encryption algorithms that with well chosen keys are essentially unbreakable, requiring supercomputer time exceeding the age of the universe by orders of magnitude by brute force attack, and if Apple didn’t cache the key, then it’s quite secure, even from William Barr and his band of techno monkeys at the NSA. Otherwise he wouldn’t be grovelling on tv like a little girl.

You’re barking at the wrong squirrel . . . House knows that. He was sarcastically responding to the quoted comment.

95 posted on 01/13/2020 10:10:10 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 48 | View Replies]

To: Mariner
"If you know the prime numbers divided in the encryption, you are not an outsider and the code is relatively easy to discern with powerful computers. All encryption centers on the prime numbers. And Apple knows what they are, and so does NSA. Otherwise the encryption could not be exported to ANYONE."

This illustrates you actually don't know everything about encryption by a long shot. Some levels of encryption would take thousands of years for current computer technology to crack.

96 posted on 01/13/2020 10:13:41 PM PST by precisionshootist
[ Post Reply | Private Reply | To 82 | View Replies]

To: ameribbean expat
Key point. Other legal privileges expire at death, this one should also.

This isn’t about "privileges" it’s about the immutable laws of encryption math. AES encryption has but one key. . . and it’s binary, either yes, or no, on or off. It’s either encrypted and safe because no one else has the key, or unsafe because anyone might have your key. You provide a backdoor, then it’s not safe.

You provide me an absolute, guaranteed secure repository of passcodes, and I might be willing to register my passcodes in it. But as the Roman Juvenal famously, wisely, and perspicaciously asked, "Quis custodiet ipsos custodes?" — "Who watches the watchmen?" And, like gun controls, only honest law-abiding citizens would register their encryption passcodes; crooks would ignore any such requirement.

97 posted on 01/13/2020 10:25:01 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 49 | View Replies]

To: precisionshootist

I think the current phone security, is better than it was back then.

Just saying.

Always changing.


98 posted on 01/13/2020 10:30:00 PM PST by cba123 ( Toi la nguoi My. Toi bay gio o Viet Nam.)
[ Post Reply | Private Reply | To 92 | View Replies]

To: mrsmith; House Atreides
This “security” scam of theirs is a marketing tool and I realize that.

If it’s a "scam," mrsmith, why is even the FBI and DOJ having to plead to get into their secure devices? That seems to demonstrate Apple isn’t scamming anybody about the security of the data on their devices.

99 posted on 01/13/2020 10:30:04 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 60 | View Replies]

To: precisionshootist

NSA can. Easily.


100 posted on 01/13/2020 10:40:09 PM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 92 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 181-183 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson