Posted on 01/13/2020 7:23:50 PM PST by Theoria
Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.
Mr. Barrs appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety.
This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence, Mr. Barr said, calling on technology companies to find a solution and complaining that Apple had provided no substantive assistance.
(Excerpt) Read more at nytimes.com ...
Please, educate us on how the Constitution provides the government the power to force a third party to produce something based on a search warrant.
If you know the prime numbers divided in the encryption, you are not an outsider and the code is relatively easy to discern with powerful computers.
All encryption centers on the prime numbers.
And Apple knows what they are, and so does NSA. Otherwise the encryption could not be exported to ANYONE.
No, unfortunately neither Apple nor the NSA has that ability, even with the fastest supercomputer extant to date, or even a quantum computer. You obviously do not grasp the nature of single key encryption which is what is used on Apple iOS devices.
256bit AES encryption with a complex key such as an iOS device constructs from the users passcode, an internal device ID, a device model ID, and a completely random number generated from environmental variables when the actual encryption key was first generated (also stored in an inaccessible internal Secure Enclave inside the encryption engine) results in a variable length key that can be made up of any of the 223 characters available in the Apple virtual keyboard, and can be as long as 256 characters in length. Thats a huge encryption key. . . and it is NOT stored anywhere on the device where it could be found and read.
Thats means it is possible to have 223256 number of possible keys and only one will decipher the data.
Whats more, Mariner, the system is designed so you must try each key on the device. You have only ten tries before the data is erased. . . completely. No shadow data left to recover.
Using a hypothetical supercomputer that could try and test 50,000 keys per second, checking for readable data with each test, it would require 6.25 X 10195 years to try all possible keys. Lets multiply the speed of our hypothetical supercomputer by one trillion times. Youd think it would get done a lot faster and youd be right. It would finish in only 6.25 X 10169 years! This is the problem of very large numbers.
So, maybe we attack the terrorists passcode, much simpler. If hes stupid and has only a four digit numeric code, easy. Even with the built in delays, and we are careful, we can likely get in by defeating the delay system in under an hour. . . Thats the way the San Bernardino terrorists IPhone 5s was cracked.
But, I doubt newer iPhones are so easy. In fact, theres no doubt. That system doesnt work. Also, if hes smarter, hes using a six digit or more. Then, even if you could defeat the time outs and lockouts, youre talking one million possible with six digits, 100 million with seven, and so on. The time to try grows literally exponentially. If you add in alphanumeric and symbols, it becomes impossible. Again, they have to be tried on the device.
At some point the value of the data becomes not worth the effort.
See my #82.
Such silly arguments I’m getting tonight.
Apple, or any company, can produce a product amenable to Common Law.
But they make more money by not doing so.
Of course a warrant can demand info from a third=party, if they can provide it.
Only an idiot wouldn’t see that.
Apple, and some pother companies, have deliberately produced products they can’t open for a court.
They make more money that way. It’s a marketing tool.
There are alternatives ‘tech’ firms can offer.
Sorry, no smart 17 year old that could unlock a modern iPhone would settle for a mere $100. The last time the FBI needed an iPhone unlocked they paid over $1 million.
Just not much apparently.
Much better to learn instead of being a snarky fool.
Of course it’s easier to be a snarky fool. Lots less work and other fools appreciate you- if you’re desperate for that kind of appreciation.
Anyway, I’m off. Had enough stupidity.
(And more’s coming from people who won’t think no matter what.)
Much better to learn instead of being a snarky fool.
Of course it’s easier to be a snarky fool. Lots less work and other fools appreciate you- if you’re desperate for that kind of appreciation.
Anyway, I’m off. Had enough stupidity.
(And more’s coming from people who won’t think no matter what.)
The problem for you is we do think, you bluster your feelings.
More snark. Feels so good you can’t resist?
LOL!
Seriously, good night.
lol, you are funny. Do you think high level encryption can easily be brushed aside when the government issues a warrant?
If that's the case why doesn't the Government unlock the phones themselves?
Different issue then, in the past. Then, the FBI presented Apple with an All Writs Court Order requiring Apple to do something that was 1) not in Apples normal line of business which is what an All Writs order is normally used for; 2) required Apple to create a special custom FBiOS that could be installed on the target iPhone (read any iOS device with minor tweaking) and defeat the built in security; 3) give it to the FBI as a tool for their use; 4) and, by Federal Law, the 1993 Communications Assistance for Law Enforcement Act (CALEA) was clearly an order that was PROHIBITED BY THE CLEAR LANGUAGE OF THE STATUTE! In fact, the SCOTUS had twice ruled on the use of All Writs orders prohibiting using them as Magistrate Judge Pym was attempting to use her order to require of Apple, ruling it was a form of involuntary servitude. You cannot use an All Writs order to force a third-party business to perform an act against its own business interest if it is not in the ordinary course of doing that business. In this case, Apple does not build and sell custom operating systems which compromise its security model, nor do they provide custom software.
Yes, and I don't believe a word of it. I do not believe that phone was ever cracked. I think they made the story up to convince apple they might as well just provide the back door they believe exists. If they paid a million dollars, which is nothing for the FBI, why is Barr publicly going after apple again? Why not have the same group unlock the phone and then have them explain how to do it? The answer is obviously because the Israeli phone crack story was total BS. They never got into that phone.
Youre barking at the wrong squirrel . . . House knows that. He was sarcastically responding to the quoted comment.
This illustrates you actually don't know everything about encryption by a long shot. Some levels of encryption would take thousands of years for current computer technology to crack.
This isnt about "privileges" its about the immutable laws of encryption math. AES encryption has but one key. . . and its binary, either yes, or no, on or off. Its either encrypted and safe because no one else has the key, or unsafe because anyone might have your key. You provide a backdoor, then its not safe.
You provide me an absolute, guaranteed secure repository of passcodes, and I might be willing to register my passcodes in it. But as the Roman Juvenal famously, wisely, and perspicaciously asked, "Quis custodiet ipsos custodes?" "Who watches the watchmen?" And, like gun controls, only honest law-abiding citizens would register their encryption passcodes; crooks would ignore any such requirement.
I think the current phone security, is better than it was back then.
Just saying.
Always changing.
If its a "scam," mrsmith, why is even the FBI and DOJ having to plead to get into their secure devices? That seems to demonstrate Apple isnt scamming anybody about the security of the data on their devices.
NSA can. Easily.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.