Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: minnesota_bound

The 70 times were prior to iOS 8 and 9. The security in them was strengthened so there is no “precedent”.
To: All

Lots of shaky “facts” in this article...first off all 70 times were prior to iOS ver. 8...Apple improved customer’s security with ver. 8 & 9. All data is now encrypted with 256 bit AES and Apple has lost the ability to read the data. The FBI is now looking for a crack for the “anti-brute force” protections (10 password tries then phone erases itself & the “timer functions” that require more & more time between password tries) so they can attempt to “brute-force “ the terrorist’s password. Secondly, in the “New York Case” that the article is based on, the government used the “All Writs Act” (not a search warrant as the article states), and the judge in that case clearly indicated that the All Writs Act probably doesn’t compel Apple to attempt to crack it’s own security:

“In October 2015, Magistrate Judge James Orenstein of the U.S. District Court for the Eastern District of New York, expressed strong doubts that he had legal authority to order Apple to unlock an iPhone in government possession.”

He said:

“[Apple] is a private-sector company that is free to choose to promote its customers’ interests in privacy over the competing interest of law enforcement,” wrote Orenstein in his memorandum and court order.”

http://www.cnbc.com/2016/02/17/the-esoteric-law-being-used-to-fight-apple.html

So the current judge is on shaky ground when using the “All Writs Act”.

New York Case:
https://ia801501.us.archive.org/27/items/gov.uscourts.nyed.376325/gov.uscourts.nyed.376325.2.0.pdf

San Bernardino case judge order:
https://www.documentcloud.org/documents/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html

40 posted on ‎2‎/‎17‎/‎2016‎ ‎21‎:‎48‎:‎32 by Drago

[ Post Reply | Private Reply | To 25 | View Replies | Report Abuse]


143 posted on 02/18/2016 3:54:27 AM PST by mad_as_he$$
[ Post Reply | Private Reply | To 17 | View Replies ]


To: mad_as_he$$

And this whole exercise is predicated on the supposition that:

The 10 try’s and wipe is turned on (it probably is, but there’s no way to know)

The data is still there. Supposedly the Feds know that right before the attack, a backup to the cloud was done, and then backups were turned off. Who’s to say the guy didn’t wipe his phone. Reset it to factory condition and then re key it. The old data would still be on the flash (encrypted with the old key) but the act of rekeying would prep the drive for new encryption. And the data, even if you could get at it before it’s overwritten, would still be encrypted, but the keys are gone.

I don’t think this is about the data anymore. This is about creating a wedge issue. This is about using well meaning people by giving them a reasonable argument that it’s just about this one phone.

It’s not. The endgame is a backdoor.


149 posted on 02/18/2016 4:53:30 AM PST by AFreeBird
[ Post Reply | Private Reply | To 143 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson