Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Kaslin

It’s not as if they can’t crack any commercially available encryption, they just want easy access.


2 posted on 10/19/2014 12:45:42 PM PDT by JOAT
[ Post Reply | Private Reply | To 1 | View Replies ]


To: JOAT

They won’t be happy until they can root through everything on every device from their office chairs. Period.


14 posted on 10/19/2014 1:05:10 PM PDT by W. (The 0bama Administration in a baseball metaphor: No runs, all drips and many errors!)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: JOAT
It’s not as if they can’t crack any commercially available encryption, they just want easy access.

To an extent. The sort of encryption used by commercial entities such as Apple and Google, sure. Fact is that configuring a phone to run 4096 encryption all the time would drain the batter faster than running it with geolocation, wifi, and Bluetooth all at the same time. However, with 4096+ encryption and AES256 hashes, it becomes a matter of effort for the Feds to decrypt.

If you're an international spy with espionage ties, crack away. Low-level drug dealer on the street, not worth the time, effort, and expense for the Feds to do what it would take to decrypt their phone.

Remember, the CIA and NSA have come out and said that a bulk of their data collection comes from unencrypted connections like this one to FR and anything not using SSL. If you're shopping for doilies for your grandmother on Amazon, the Feds aren't going to take the time to sniff your traffic. Besides, they can just subpoena your purchase records and get it right away.

Same sort of thing goes for TOR. A bulk of TOR is porn or zero-day warez crap. The Feds have more important nuts to crack. Until quantum computing is viable, the Feds are going to have to be discrete with what they crack.

25 posted on 10/19/2014 1:31:19 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: JOAT
Perhaps this buffoon Comey should take a refresher course in law 101 and review probable cause.
32 posted on 10/19/2014 1:46:00 PM PDT by dearolddad (/i>)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: JOAT
I’s not as if they can’t crack any commercially available encryption, they just want easy access.

Actually, there is encryption they can't crack.

So, they do what all smart hackers do. They go around it somehow. E.g., by tricking the user into making a mistake. Or hacking his computer by installing hardware secretly, e.g., while its being shipped. Or getting him to install tainted software. Or exploiting a security hole in the software he's using.

42 posted on 10/19/2014 2:12:37 PM PDT by cynwoody
[ Post Reply | Private Reply | To 2 | View Replies ]

To: JOAT
It’s not as if they can’t crack any commercially available encryption, they just want easy access.

It actually IS that they cannot crack Apple's 256 bit encryption. Apple allows you to use any of the 227 characters available on your keyboard and your pass code can be up to 256 characters in size. That is a ridiculously large passcode, I know, but it is possible. That passcode is entangled with the UUID of your device to provide the key to encrypt your data. This means that they would have to brute force their way through 227 256 possible combinations of passcodes (actually a bit smaller as Apple's passcode creation routine will not allow more than two consecutive identical characters) to test all of them to find your particular passcode to decrypt your data. Apple also has set it up that because it is hardware entangled with the UUID of the device, the attempts must be done on the device. . . and there is a increasing wait period between attempts, so your data cannot be downloaded to a supercomputer for crunching. It really wouldn't matter anyway, even making thousands of attempts per second, it would take multiple quadrillions of years to try every possible combination. The Universe would have died from heat death before you got anywhere near done.

Add that when your data is uploaded as a 256 bit encrypted stream to iCloud, it is further anonymized, broken into bits, and then AGAIN additionally 256 bit encrypted on top of your encryption. Apple does not have your key. . . and even if the government got Apple's key, all they would have would be anonymous encrypted data in blocks, associated with no particular person, without keys. Lots of luck in doing anything with the gobbledegook they would be handed.

The ONLY way they could get your data is the old fashioned way. . . get a court order, serve it on you, requiring you to turn over what they are SPECIFICALLY seeking, by description, naming exactly what they want. No fishing allowed. Just exactly what the Fourth Amendment requires.

62 posted on 10/20/2014 1:03:24 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: JOAT

I’ve got my tinfoil hat firmly in place. I have some suspicion that the goobermint can decrypt all this and that the complaints are merely for show in order to make the people complacent.


71 posted on 10/20/2014 4:12:27 AM PDT by generally (Don't be stupid. We have politicians for that.)
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson