Posted on 11/07/2017 2:05:20 PM PST by detective
At a press conference today, an FBI official investigating the man who killed 26 people in a Texas church on Sunday said the agency can't open the shooter's encrypted phone. The agent painted the issue as a growing concern among law enforcement at all levels who can't access data on devices without their owner's credentials. It's essentially the same argument the FBI made two years ago when it demanded Apple help break into the phone of the San Bernardino shooter, a conflict that escalated into the courtroom.
(Excerpt) Read more at yahoo.com ...
I don't quite agree. If the Feds have your key from Apple, then double encryption accomplishes something. That puts them back in the original situation, which they cry about. Even if NSA can crack it, the FBI has to call NSA (or Israel) to read it instead of just using their magic key.
“What kind of phone. I want one.”
Most likely an iPhone.
Yep, have one, want as many options as possible.
Rush gave two of them away yesterday. He wasn't excited about the X until he got his hands on one for a day.
He genuinely enjoys giving these phones away.
He said Facial recognition works so fast it only takes a fractional second to recognize you.
An aside point try the real time captions on YouTube, way better than those court recorders the news tries to use. We should not underestimate the impact AI is going to have on us.
No. they can't give it to you because they don't have it.
Pay attention. Did you not see that Apple does not ever get your key? It does not even exist on your iOS device and cannot be extrapolated from the one-way Hash. Nor is it possible for NSA or anyone to "crack it." This is a mathematical problem having to do with the laws of very large numbers. Even the most powerful and fastest of computers would be looking at more time than there is left in eternity to try every key even in a 16 character passcode when added to the things Apple pads into the key.
PGP, although robust, is not as good because of its implementation is primarily designed for smaller file use and communications purposes, and for the validation the key is usually stored in the clear somewhere on the disk. It is slow in execution.
AES, on the other hand, is designed to handle everything including up to large monolithic disk sized gulps of data.
So like the androids, you can chose the password?
Yes.
You mean the same Apple who said they wont hand over the Iphone to be unlocked then pretended to say “well it was unlocked by someone else” during the shooter fiasco 2 years? You do realize Tim Cook is an obama ass kisser? When obama says you unlock the iphone for the “feds” you think h e couldnt do it or didn’t do it? I am sure he said “yes master” Seriously, you I fags crack me up.
“Seriously, you I fags crack me up.”
—
Huh? Who are you addressing with that comment?
.
Real intelligent argument there, sounds like you came up with it at the beer garden.
Tim is a liberal skank but he is a piker compared to Bill & Melinda Gates. Or maybe Jeff Bezos, is more to your liking. I dislike him immensely but use his Amazon Service because it works and I need it. I would probably like it better if John Wayne owned it but he doesn't.
I don't own an iPhone anymore because I don't drive anymore so the wife is always with me, however I provide iPhones for all the rest of the family and have since day one of the first iPhone, because they work.
Yes you can and it remains on your phone, Apple does not have it.
Too bad the government security is not as good or we wouldn't be losing all the stuff you hear about.
If it could be done some hacker group would have done it well before now, and they would have told everyone from here to Neptune.
The Feds handed the Iphone to an Israeli firm who unlocked it during the last shooter fiasco 2 years ago. Nothing is unbreakable.
That was a 5C model, very different internal architecture. The current architecture is much more secure. Apple made them to be uncrackable by their company even if they want to do it.
Attacking all Apple users is really over-the-top, asshat. You really destroy any point you might have by attacking almost one BILLION Apple users and painting them as "fags." You really are an idiot, you know that?
You have a tenuous grasp of the actual events.
First of all, Apple never had possession of the San Bernardino Terrorists iPhone "hand over the Iphone to be unlocked" as you put it. Secondly, Apple never "pretended to say 'well it was unlocked by someone else'" because that was not what actually happened. It took multiple companies competing to come up with a means of unlocking an OBSOLETE Apple iPhone over SIX MONTHS to finally come up with a way to unlock that ONE SINGLE device and it was a one-off. It was not universally applicable to even all iPhones of that model. It required a major effort.
Thirdly, Apple was not ordered by the Courts to "unlock" that single iPhone 5c, but rather to create an entirely new version of iOS 8 which BYPASSED the security locks and then GIVE IT TO THE FBI. . . or alternately to create software or hardware tools to UNLOCK an iPhone and then to hand those tools over to the FBI.
The Federal Law called the Communications Assistance for Law Enforcement Act (CALEA), introduced in 1993 and passed by 103rd Congress in 1994, says the FBI could not ask them to do this, and the Federal Magistrate Judge could NOT ORDER Apple to do it. It was against Federal law to do it. Apple was following the law, the FBI and the Federal Judge were NOT. Here is section 103 of the CALEAct:
(Sec. 103) Provides that this Act does not authorize law enforcement agencies or officers to: (1) require any specific design of equipment, facilities, services, features, or system configurations to be adopted by providers of wire or electronic communication service, manufacturers of telecommunications equipment, or providers of telecommunications support services; or (2) prohibit the adoption of any equipment, facility, service, or feature by such entities.Prohibits a carrier from being responsible for decrypting or ensuring the Government's ability to decrypt any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information to decrypt the communications.
The courts have ruled that "carriers" in this instance include the manufacturers of the handsets and other hardware and/or software that may provide the encryption.
Finally, the Democrats had several times ATTACKED Apple during Obambi's administration, looking to get their hands on Apple's cash, accusing Apple of tax evasion, not paying any income taxes, and a host of other nefarious tax practices, which Apple categorically proved were not at all true in sworn testimony before a Democrat led Senate investigating Committee hearing that showed not only was Apple paying Income Taxes, but was in fact the single largest payer of US business Income taxes! . . . but you don't have a clue about those attacks from the Obama Administration, do you? You seem to think that Apple is a simpering sycophant for the Democrats, but that is not at all true. Microsoft, Amazon, and Facebook have done far more to push the Obama agenda than Apple. . . and put one hell of a lot more money toward it than Apple and gotten free rides
Seriously, you Anti-Apple Hate Brigade "fags" crack me up. . . you protest so much it must be to deflect attention from the fact you are hiding in the proverbial closet.
Thank you for foregoing the slurs and insults toward Apple users.
The Feds handed an OBSOLETE iPhone 5c, released two years before the terrorist attack, was the last of the older generation iPhones which debuted with the iPhone 4 in 2010, five years earlier, and which did not have the latest technology in security, the Secure Enclave and the Encryption Engine Processor, an entirely new concept in security as a separate unit from the Data processor, which was introduced in the iPhone 5S simultaneously as the iPhone 5c. The Feds gave that older model iPhone to the Israeli firm to break a four digit passcode which, if it did not have built-in time delays and finally a data erasure feature, could have taken them a little over 5 ½ hours trying each of the 10,000 possible combinations of four digits from 0000 to 9999, to unlock. Had that iPhone been a more modern, secure technology iPhone 5s or later, they'd still be trying and not succeeding.
Many hackers have been trying to break into a Secure Enclave iOS device since they came out in 2013 and not a one has succeeded yet. As Coronal has stated, had anyone succeeded, they would have been crowing to the heavens about their success. Just last month, one hacker claimed to have succeeded in finding just ONE item hidden in the Secure Enclave... the Secure Enclave Processor (SEP) firmware encryption KEY. . . and triumphantly published it on GitHub. Here it is:
a6ff60f2fcf3cdcaaf735e1683418ff56828540cd92ac15f3144ed4dc9d5bcb34c01cc8154bc22c3658d82b6c439340b
What he thought was the key, is not really THE key. . . it's just one of many keys in the Secure Enclave, and a very minor one. Moreover, its a portion of a key that happens to be unique to his iPhone. It is also the ONLY one that is allowed to be accessed from the outside because from time-to-time the SEP firmware has to be updated. . . and requires a key to permit updating of the Encrypted software. It provides NO access to any of the parts of the key that will unlock the iPhone to provide access to user data. The only reason he could even SEE this key was he had unlocked his iPhone in the first place. . . and was approaching it from the extremely limited software to update the firmware. It was doing what it was designed to do. Apple even provides a tool to access it and read it.
Just one of the pieces of the actual 256 bit Encryption key is constructed from is a 40 character Universally Unique ID (UUID) randomly assigned to the Secure Enclave Processor and burned to it when the processor is made. No record of this 40 character UUID is ever made, kept, or recorded outside of the Secure Enclave inside the SoC where it is buried deep in a multilevel integrated circuit, impossible to locate without destroying the IC and other hardwired algorithms required to manipulate it and other burned data required to build the actual AES key.
Another piece is another 40 character string which is the same for all devices in the model range. This is the Device ID (DID).
The next piece is a truly random number generated from the environmental sensors of the iOS device. Data is sensed from the cameras, GPS, microphones, positional sensors, etc. sampled when the user first enters the AppleID, and then combined to create this random number by an algorithm to create a 48 character random number.
All of these four elements are then entangled together by another algorithm to create the actual encryption/decryption key. . . which will be padded out to 144 characters but can be longer. . . the key WILL NOT BE STORED and will instead be re-created each time the passcode is re-entered after validation. If the passcode is not validated, the iPhone is not unlocked and nothing happens,
Thanks for the info and correction. Never knew that.
“Finally, the Democrats had several times ATTACKED Apple during Obambi’s administration,”
Really. Tim Cook is an obama ass kisser, a flaming libtard and hates Republicans more than losing money. Gimme a break here. If and when obama says you jump, liberals do. It’s law.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.