Posted on 11/07/2017 2:05:20 PM PST by detective
At a press conference today, an FBI official investigating the man who killed 26 people in a Texas church on Sunday said the agency can't open the shooter's encrypted phone. The agent painted the issue as a growing concern among law enforcement at all levels who can't access data on devices without their owner's credentials. It's essentially the same argument the FBI made two years ago when it demanded Apple help break into the phone of the San Bernardino shooter, a conflict that escalated into the courtroom.
(Excerpt) Read more at yahoo.com ...
And how do you ensure that the technology never leaves that room? One corrupt tech, one successful hack into the system, and the genie is forever out of the bottle. Certainly there would be plenty of people offering vast sums of money and/or exerting tremendous pressure to get it.
“So you would be Okay with a company in 1941 selling shortwave radios to the general public with an extra ENIGMA feature during WWII and the company refusing to give the US the codes?”
Fine with it. And you do some normal cop work and arrest them if they are spies.
To carry your analogy forward. That 1941 FBI would be looking at a guy who moved here from Germany a year earlier in 1940, was an open member of the German-American Bund, always cleaning the latest model MP-40 submachinegun on his front porch under the light of a lamp made with human skin, flying a nazi flag, observed a little too close to the scene of the latest sabotage, who gets Christmas cards from Hitler..... and the FBI would whine that “we can’t solve this problem without breaking his enigma machine cypher!”
The encryption isn’t the problem there...nor is it the problem today.
Old lady here.
I have an iPod———are you saying that my little 4 digit password is not known by Apple?
.
None of them were at the church and he likely knew they wouldn't be there because he took his kids to the church for Halloween, and visited with Mother in law.
The tech already exists to unlock the phone by Apple so yeah, it could be hacked even today.
They can pass all the laws they want. It won't help them get into that phone. They can take the entire Constitution and just dump it into a shredder, and it won't help. The manufacturer can't even get into the phone. It would require a complete redesign of the processors, and still won't help them get into existing iPhones. Said iPhones would become much more valuable on the resale market if the government forced them to make all new phones crackable.
It's worse than that. The FBI wanted Apple to create a means to install a backdoor on all Apple iPhones, one that would allow them to gain access. They assumed that such a backdoor could be kept secret. That has NEVER happened in the past. Every time such an assurance has been made, it has never survived the first court case, as the defense demands access to the codes to be sure it actually exists, allow their "experts" to duplicate the unlock, and even though released to them defense under "court seal" someone in the process can't resist keeping a copy, and then in some instances, the press demands, under the open court rules, that THEY also get access. and bubble headed judges release copies to them as well in the interests of the "public's right to know." That's exactly what happened to the security of RIM and Blackberry phones when RIM agreed to allow a Blackberry to be unlocked to convict a child-molester.
As Tim Cook put it, security is binary; it's either secure or it's not. Same with encryption. You provide a backdoor, and the mere knowledge there is one is a guarantee it will be found.
There was something about a person’s property and papers (and even cell phones) without due process written a long time ago.
I cannot place it.... //sarc
There is nothing on his phone that will change anything. Not really sure I want the cops getting a back door to my phone.
You really believe the FBI? Masters of the cover up and evidence destruction?
“Universal back doorswhich is precisely what you’re demanding the government effectively be givenare simply not something you can grant to government”
As a thought exercise. Try to name one power the Government has been granted that it did not immediately abuse in spades. Anyone remember DHS? Created to protect us from another Islamic attack like 9/11... now intercepting fake rolexes, child porno, creating videos of how to safely deep fry a Turkey, etc etc. The only things they -refuse- to do is investigate islamists, and mosques and deport undesireables.
They abuse EVERY power they are granted, bar none.
Apple created the hardware and software so that they cannot access the encryption keys. You can choose not to believe it if you wish, but there is no evidence to support that.
That was the story then again Hillary didndonuffin.
Did they ever successfully get into the San Bernadino phone? What the straight info there? I’ve seen some here saying some Israeli company did it quickly and easily. Not sure if thats true at all.
Any info from where you sit?
The one they paid $1,000,000 for in the San Bernardino terrorist case works only on the older iPhone 5c and backwards. It cannot work on the iPhone 5s and later that have the Secure Enclave. . . those are entirely different devices that have far more secure approaches to encryption than those older iPhones which were pretty secure themselves.
The newer ones use four different ICs that are inter-registered so that any attempt to unlock them have to be attempted ON THE DEVICE. Removing any one of those four ICs will brick the device. Even re-installing the removed IC requires that all four of the ICs have to be re-registered with the others and only Apple has the proper equipment and algorithms to do that.
The Encryption Engine processor, with its Secure Enclave, is not even touchable by the A11 data processor. . . so nothing that can be loaded on to the iOS device can affect the data stored in the Secure Enclave or ever read it. There literally is no access. . . and even external test equipment cannot reach it to attempt to read it.
The Secure Enclave is where the Encryption Key is constructed anew each time the user inputs his passcode . . . which is only a small portion of the actual encryption key itself. That encryption key is extremely complex, made up of a hidden Universally Unique ID for the device, assigned at the time the IC is burned and not recorded anywhere, the Model ID, a truly random number generated by the device from environmental inputs from the device's cameras, microphones, movement sensors, and GPS, at the time the user first inputs his AppleID, and the user's passcode, and entangled according to a hidden algorithm also assigned at the time the IC was burned and stored in the Secure Enclave. . . and the user's passcode is not even stored in the device itself, but a one-way HASH is stored instead, and re-calculated each time it is entered according to another algorithm and compared. ONLY if the comparison matches is all the above done to re-create the encryption key and placed into a volatile storage location for use oto decrypt the data as necessary.
The ONLY way all of the above could be discovered is electron microscopic shaving which is destructive of data. . . and requires the removal of the target IC's memory to do. Oops. That won't work because of the destruction of the multilayer ICs just to get at the data locations.
This all has been extremely well engineered to keep hackers out.
Have you told the FBI? They apparently don't know about that.
Sorry, I left this </s>
off.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.