The 70 times were prior to iOS 8 and 9. The security in them was strengthened so there is no “precedent”.
To: All
Lots of shaky âfactsâ in this article...first off all 70 times were prior to iOS ver. 8...Apple improved customerâs security with ver. 8 & 9. All data is now encrypted with 256 bit AES and Apple has lost the ability to read the data. The FBI is now looking for a crack for the âanti-brute forceâ protections (10 password tries then phone erases itself & the âtimer functionsâ that require more & more time between password tries) so they can attempt to âbrute-force â the terroristâs password. Secondly, in the âNew York Caseâ that the article is based on, the government used the âAll Writs Actâ (not a search warrant as the article states), and the judge in that case clearly indicated that the All Writs Act probably doesnât compel Apple to attempt to crack itâs own security:
âIn October 2015, Magistrate Judge James Orenstein of the U.S. District Court for the Eastern District of New York, expressed strong doubts that he had legal authority to order Apple to unlock an iPhone in government possession.â
He said:
â[Apple] is a private-sector company that is free to choose to promote its customersâ interests in privacy over the competing interest of law enforcement,â wrote Orenstein in his memorandum and court order.â
http://www.cnbc.com/2016/02/17/the-esoteric-law-being-used-to-fight-apple.html
So the current judge is on shaky ground when using the âAll Writs Actâ.
New York Case:
https://ia801501.us.archive.org/27/items/gov.uscourts.nyed.376325/gov.uscourts.nyed.376325.2.0.pdf
San Bernardino case judge order:
https://www.documentcloud.org/documents/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html
40 posted on â2â/â17â/â2016â â21â:â48â:â32 by Drago
[ Post Reply | Private Reply | To 25 | View Replies | Report Abuse]
And this whole exercise is predicated on the supposition that:
The 10 try’s and wipe is turned on (it probably is, but there’s no way to know)
The data is still there. Supposedly the Feds know that right before the attack, a backup to the cloud was done, and then backups were turned off. Who’s to say the guy didn’t wipe his phone. Reset it to factory condition and then re key it. The old data would still be on the flash (encrypted with the old key) but the act of rekeying would prep the drive for new encryption. And the data, even if you could get at it before it’s overwritten, would still be encrypted, but the keys are gone.
I don’t think this is about the data anymore. This is about creating a wedge issue. This is about using well meaning people by giving them a reasonable argument that it’s just about this one phone.
It’s not. The endgame is a backdoor.