Posted on 02/18/2016 12:55:35 PM PST by Innovative
“Best guess is the phone has already been wiped.”
Maybe Hillary wiped it with, like you know, a cloth.
I don’t understand how anyone could think it’s a good idea for the government to be able to crack all iPhones, without a warrant, without due process, and without anyone even knowing. I guess because it’s Apple.
If the feds want the code then hell no should they, however why cant an agent take the phone over to Apple and let Apple get the info and then give it to the agent?
I will agree that how the Feds went ot a judge without Apple being there is wrong and unlawful. Not that he law really stands anymore under fairy boy.
The FBI is Team Zero? That’s still under debate. I guess we’ll find out when we learn of Comey’s position on Emailgate.
Apple ping.
The Feds a pissed that Apple has come up with a consumer encryption technology that the Feds can’t crack.
The Feds are using this terrorist’s phone and the courts as a desperate ploy to bypass this encryption.
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
Nope, won't work. It requires a LIVING finger to work. in addition, once the iPhone has not been activated in 48 hours, you have to use the passcode to start it before the TouchID will work. Sorry, good idea, but Apple thought of the possibility that thieves might mutilate victims to access their iPhones to use ApplePay and made it impossible.
4th Amendment or 2nd Amendment .... never trade liberty for security....
My opinion.
BINGO!!!
Version I heard (via Rush) was that after 10 tries you have to wait one hour between subsequent tries.
Because even Apple cannot decipher the data.
This is encrypted to a 256 bit AES standard using the passcode, which Apple does not have, entangled with a hidden Device UUID, joined with a Group ID, which gives HALF of the key. The other half is created by reading random sensor data during the original boot from the camera, microphone, accelerometer, etc. All of these are combined to make a truly unique KEY used to encrypt the data on the phone with a very large number of characters in the key. It is at least 132 characters in length and could be much larger, using every single one of the 233 characters reachable from the virtual keyboard of an iOS device. So the encryption number of possible keys could be 132233.
The fact is that it would literally take 5.62 undecillion (5.62 X 10195) years to try every single possible key to decrypt the data on that one iPhone.
The only way to get at these data would be to try brute forcing the passcode. . . a much simpler proposition. But that is what Apple is unwilling to do because that puts the security of every one of over 800,000,000 iPhone users on the planet at risk of having their data stolen, their credit cards hijacked, passwords stolen, ApplePay defrauded, banks dropping ApplePay entirely, etc..
Over-the-top much???? Manic and delusional.
They did unlock phones under the old IOS....
Someone should tell the FBI and the prosecutors that the suspect and their defendant is DEAD. There is no case to prosecute and therefore the evidence has become moot. Search warrants are quashed in such events. There IS no investigation for any prosecution. The FBI is on a fishing expedition. There is no search warrant outstanding because they don't know what they are looking for. They admit it themselves and a search warrant must SPECIFY what they intend to find and what they intend to seize from their search. They don't know what is going to be on the iPhone. Ergo, they are fishing.
Apple has already responded to the actual search warrants for the terrorist's iCloud account contents. They complied because they were the custodians of the those data.
Apple is NOT the custodian of those data on the iPhone.
Just tonight as I was typing this, it was announced on NBC that Google, Microsoft, Twitter, and Facebook are all backing Apple on its stance.
Ironically, although they did not point out the irony, NBC followed with an example of WHY this is important with a hospital in Hollywood having to pay thousands of dollars because their computers were locked by hackers. . . and it was cheaper to pay the RANSOM to the criminals to unlock them than it was to have computer experts remove the ransomware that was keeping them from running for twelve days! It is this very scenario that is why Apple is loath to write backdoor software for this iPhone!
I think they want more than that. They want his contact list, emails, iMessages (which would have been sent encrypted), Notes, regular messages, phone call records through WIFI or FaceTime, Photos, videos, etc.
LOL I was waiting for you.
No. Not quite the full answer. The user may have turned on auto-erase and lock.
Not all, and only after Apple legal vetted the requests/search warrants for legitimacy and validity. Their tests required that there was an actual defendant, prosecution, on going situation with requirements dependent on the information in the iPhone to the case. From what I've read in the past, there were other cases where Apple's legal department filed a demurrer and said no, as well.
It was also an almost trivial thing to do with iOS 7 and earlier. The data on those devices was not encrypted. The lock was not a protection of the data, but rather a more casual thing to prevent unauthorized users.
Nope after 10 tries the phone is wiped, well actually the encryption token is wiped and the data is useless. There is a graduating time delay after each attempt, after 9th try wait an hour, 10th try oops!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.