Posted on 01/14/2020 8:46:59 PM PST by House Atreides
Why did Barr take so long to consider it a terrorist attack? It was obvious from the get go.
No, because these scumbag critters were calculating the benefits of it, which was to get the iphone back door open in the name of the war on terror.
This is just FISA v 2.0 they are pushing on us while pretending doing reviews on the current FISA abuses.
They only consider a muslim attack as terrorism or hate crime if it helps them puts the screws on us in return.
It has nothing to do with it. They are not serious about countering islamic terror, let a lone left wing democrat terrorism and seeking of arms monopoly the way the Nazi party did it.
The only problem with the NY POST article is its fake news based on wrong assumptions by their "expert," Matthew Green, who assumed that both GreyKey and Cellebrite could off-load the contents of the iPhone to a computer, then run software that would run through the permutations of possible passcodes, checking to see if it would unlock the device in essentially 0.078 seconds per passcode. Heres Mathew Greens tweeted chart they used as the basis for this article:
Matthew Green
@matthew_d_green Guide to iOS estimated passcode cracking times (assumes random decimal passcode + an exploit that breaks SEP throttling):
- 4 digits: ~13min worst (~6.5avg)
- 6 digits: ~22.2hrs worst (~11.1avg)
- 8 digits: ~92.5days worst (~46avg)
- 10 digits: ~9259days worst (~4629avg)
Unfortunately for the NY POST, Matthew Green, and his Tweet, assumptions dont lead to truth. Mr. Green was ignorant of the very basic fact that Apple designed the system such that the encryption/decryption MUST be done on the device through the hardware ON THE DEVICE and cannot be offloaded to a computer. Further, to prevent the very machine inputting of passcode attempts by computerit is a human interface, you knowApple built in a hardware delay between passcode attempts of 1.3 seconds.
It is not possible for the system to accept another passcode before that delay is finished. Ergo, there is no possible way that a GreyKey or Cellebrite device can break into an iPhone by trying passcodes at the rate of one every eight hundredths of a second to equal Matthew Greens cute little Chart. No, in actual fact, reality reared its head, debunking Mr. Green When Police officers who had seen both Cellebrite and GreyKey in operation reported that the average time to break a four digit passcode was more like two hours! Thats much more in line with 3,600 seconds per hour. . . And needing to go about 60% through the 10,000 possible passcodes four numeric digits allow before hitting the right one a 1.3 seconds per test.
The actual chart is this:
These figures (except for the last two, which they dont bother to try) actually comport to the real experiences of authorities who have used the devices. Sorry to burst your fake news bubble.
By the way, a passcode made of a random five alphanumeric with symbol characters, even assuming Mr. Greens 0.08 per second testing speed, would require over 600 years to try all possible passcodes.
To the first, no. To the second TouchID doesnt use fingerprints. Unlike other phone fingerprint sensors Apples TouchID uses the pattern of the valleys and ridges of the subcutaneous fat pad underneath the surface. Thats why an image of a fingerprint wont work no matter how they fake them up. Its got to be the real living finger. Dead dont cut it either.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.