Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple unlocked at least 70 iPhones before refusing to hack into terrorist's device
Daily News ^ | Feb. 18, 2016 | Meg Wagner

Posted on 02/18/2016 12:55:35 PM PST by Innovative

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-76 next last
To: mad_as_he$$

“Best guess is the phone has already been wiped.”

Maybe Hillary wiped it with, like you know, a cloth.


41 posted on 02/18/2016 3:53:04 PM PST by RedWhiteBlue (Mama tried)
[ Post Reply | Private Reply | To 30 | View Replies]

To: kingu

I don’t understand how anyone could think it’s a good idea for the government to be able to crack all iPhones, without a warrant, without due process, and without anyone even knowing. I guess because it’s Apple.


42 posted on 02/18/2016 3:53:48 PM PST by BykrBayb (Lung cancer free since 11/9/07. Colon cancer free since 7/7/15. ~ Þ)
[ Post Reply | Private Reply | To 36 | View Replies]

To: zeugma

If the feds want the code then hell no should they, however why cant an agent take the phone over to Apple and let Apple get the info and then give it to the agent?

I will agree that how the Feds went ot a judge without Apple being there is wrong and unlawful. Not that he law really stands anymore under fairy boy.


43 posted on 02/18/2016 4:09:30 PM PST by manc (Marriage =1 man + 1 woman,when they say marriage equality then they should support polygamy)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Ken H

The FBI is Team Zero? That’s still under debate. I guess we’ll find out when we learn of Comey’s position on Emailgate.


44 posted on 02/18/2016 4:28:10 PM PST by Obama_Is_Sabotaging_America
[ Post Reply | Private Reply | To 39 | View Replies]

To: Swordmaker

Apple ping.


45 posted on 02/18/2016 4:42:17 PM PST by upchuck (Killary is the poster girl for everything wrong with our government. h/t Mister Da)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Innovative

The Feds a pissed that Apple has come up with a consumer encryption technology that the Feds can’t crack.

The Feds are using this terrorist’s phone and the courts as a desperate ploy to bypass this encryption.


46 posted on 02/18/2016 4:59:05 PM PST by upchuck (Killary is the poster girl for everything wrong with our government. h/t Mister Da)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Innovative; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; ...
Another thread on Apple and the Magistrate Judge's order to "write software to break into and write a software that will bypass the self-destruct feature" of the iPhone 5C used by the San Bernardino terrorists. Google has now come out in support of Apple's position of not writing a backdoor into iOS to let the FBI in as it would not be controllable. -- PING!


Apple Security and Privacy
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

47 posted on 02/18/2016 5:08:01 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: babygene
Now the new phones that look at your finger print, they could just cut the perp’s finger off and unlock it.

Nope, won't work. It requires a LIVING finger to work. in addition, once the iPhone has not been activated in 48 hours, you have to use the passcode to start it before the TouchID will work. Sorry, good idea, but Apple thought of the possibility that thieves might mutilate victims to access their iPhones to use ApplePay and made it impossible.

48 posted on 02/18/2016 5:13:22 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Swordmaker

4th Amendment or 2nd Amendment .... never trade liberty for security....

My opinion.


49 posted on 02/18/2016 5:23:51 PM PST by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 47 | View Replies]

To: kingu

BINGO!!!


50 posted on 02/18/2016 5:25:50 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 36 | View Replies]

To: babygene

Version I heard (via Rush) was that after 10 tries you have to wait one hour between subsequent tries.


51 posted on 02/18/2016 5:29:04 PM PST by Churchillspirit (9/11/2001 and 9/11/2012: NEVER FORGET.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Innovative
So why doesn't Apple offer to decrypt this particular phone? You seem to suggest that Apple offered to do this.

I thought that they just wanted to get into this particular phone exactly this — but everything I read in the news says otherwise.

Because even Apple cannot decipher the data.

This is encrypted to a 256 bit AES standard using the passcode, which Apple does not have, entangled with a hidden Device UUID, joined with a Group ID, which gives HALF of the key. The other half is created by reading random sensor data during the original boot from the camera, microphone, accelerometer, etc. All of these are combined to make a truly unique KEY used to encrypt the data on the phone with a very large number of characters in the key. It is at least 132 characters in length and could be much larger, using every single one of the 233 characters reachable from the virtual keyboard of an iOS device. So the encryption number of possible keys could be 132233.

The fact is that it would literally take 5.62 undecillion (5.62 X 10195) years to try every single possible key to decrypt the data on that one iPhone.

The only way to get at these data would be to try brute forcing the passcode. . . a much simpler proposition. But that is what Apple is unwilling to do because that puts the security of every one of over 800,000,000 iPhone users on the planet at risk of having their data stolen, their credit cards hijacked, passwords stolen, ApplePay defrauded, banks dropping ApplePay entirely, etc..

52 posted on 02/18/2016 5:29:43 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 25 | View Replies]

To: manc
Apple the compay7 who supports terrorism and those who want to buy an Apple should understand that their money will go to helping Apple to do this , as well as helping liberal causes, such as the homosexual, cross dressing agenda.

Over-the-top much???? Manic and delusional.

53 posted on 02/18/2016 5:31:04 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Swordmaker

They did unlock phones under the old IOS....


54 posted on 02/18/2016 5:37:10 PM PST by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 47 | View Replies]

To: GOPJ
Someone needs tell the Apple lawyer the 'customer' (terrorist) is DEAD.

Someone should tell the FBI and the prosecutors that the suspect and their defendant is DEAD. There is no case to prosecute and therefore the evidence has become moot. Search warrants are quashed in such events. There IS no investigation for any prosecution. The FBI is on a fishing expedition. There is no search warrant outstanding because they don't know what they are looking for. They admit it themselves and a search warrant must SPECIFY what they intend to find and what they intend to seize from their search. They don't know what is going to be on the iPhone. Ergo, they are fishing.

Apple has already responded to the actual search warrants for the terrorist's iCloud account contents. They complied because they were the custodians of the those data.

Apple is NOT the custodian of those data on the iPhone.

Just tonight as I was typing this, it was announced on NBC that Google, Microsoft, Twitter, and Facebook are all backing Apple on its stance.

Ironically, although they did not point out the irony, NBC followed with an example of WHY this is important with a hospital in Hollywood having to pay thousands of dollars because their computers were locked by hackers. . . and it was cheaper to pay the RANSOM to the criminals to unlock them than it was to have computer experts remove the ransomware that was keeping them from running for twelve days! It is this very scenario that is why Apple is loath to write backdoor software for this iPhone!

55 posted on 02/18/2016 5:45:02 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 35 | View Replies]

To: B212
tell me if I have correct.....the legals want Apple to open the phone to see the phone logs, outgoing and incoming, there isn't a digital log of the conversations....and so it seems to me, that scan of cell tower logs recorded data should tell the story....and if there are overseas calls, then international gateways should have logs of the called numbers....

I think they want more than that. They want his contact list, emails, iMessages (which would have been sent encrypted), Notes, regular messages, phone call records through WIFI or FaceTime, Photos, videos, etc.

56 posted on 02/18/2016 5:52:41 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 37 | View Replies]

To: Swordmaker

LOL I was waiting for you.


57 posted on 02/18/2016 5:53:52 PM PST by manc (Marriage =1 man + 1 woman,when they say marriage equality then they should support polygamy)
[ Post Reply | Private Reply | To 53 | View Replies]

To: Churchillspirit
Version I heard (via Rush) was that after 10 tries you have to wait one hour between subsequent tries.

No. Not quite the full answer. The user may have turned on auto-erase and lock.


58 posted on 02/18/2016 6:07:20 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Vendome
They did unlock phones under the old IOS....

Not all, and only after Apple legal vetted the requests/search warrants for legitimacy and validity. Their tests required that there was an actual defendant, prosecution, on going situation with requirements dependent on the information in the iPhone to the case. From what I've read in the past, there were other cases where Apple's legal department filed a demurrer and said no, as well.

It was also an almost trivial thing to do with iOS 7 and earlier. The data on those devices was not encrypted. The lock was not a protection of the data, but rather a more casual thing to prevent unauthorized users.

59 posted on 02/18/2016 6:14:08 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 54 | View Replies]

To: Churchillspirit
Version I heard (via Rush) was that after 10 tries you have to wait one hour between subsequent tries.

Nope after 10 tries the phone is wiped, well actually the encryption token is wiped and the data is useless. There is a graduating time delay after each attempt, after 9th try wait an hour, 10th try oops!

60 posted on 02/18/2016 6:25:09 PM PST by itsahoot (1st impression. Trump is a fumble mouthed blowhard that can't speak in complete sentences. VoteTrump)
[ Post Reply | Private Reply | To 51 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-76 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson