Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
So you're pretending one type of device is somehow more secure than another? The CIA has pre-hacked them all, in the supply chain, notwithstanding your brand genuflections.

The Kabuki theater of the iPhone being 'uncrackable' last year was hilarious, especially in light of the Wikileaks Vault 7 release revealing that there is no such security in any sort of personal electronics.

When they inject at the pre-OS level no encryption scheme helps. Even if there's a cute piece of fruit on the cover.

15 posted on 03/29/2017 3:05:45 PM PDT by JOAT
[ Post Reply | Private Reply | To 1 | View Replies ]


To: JOAT
So you're pretending one type of device is somehow more secure than another? The CIA has pre-hacked them all, in the supply chain, notwithstanding your brand genuflections.

There is not pretending about it. There are millions of malware and exploits in the wild for the Android platform. There essentially zero for the iOS platform. That alone make the iPhone more secure.

The iPhone COMES with built-in 256 bit AES encryption that is essentially unbreakable. The passcode is not stored on the device. Even Samsung's vaunted Knox attempt to do the same was found to keep its passcode in an unencrypted text file in an external library that could be easily found by any hacker. Again, the iPhone is proved more secure.

Apple's iPhones are easily updated in total to fix any vulnerabilities found. Better than 85% of the iOS users are already using the latest OS most secure version. For Android, the fragmentation and intransigence of the carriers and Android makers have resulted in a condition in the Android universe where the vast majority of Android users are NOT even using he latest, most secure versions of the OS, but more importantly some 70% of the installed base cannot even BE upgraded to close the most dire of the vulnerabilities. Again, the iPhone has been shown to be more secure and safer than the Android phones.

The "supply-chain" was not at manufacturing, or anything like you are implying. The devices were diverted just before they were DELIVERED to the person they were targeting and then adulterated. That is a far cry from modifying the devices during manufacturing you want people to infer from your "supply-chain" implication. They were pulling them out of the mailman's bag, the UPS or FedEx truck, or what ever other means they could. . . not getting at the device while it was being made.

The Kabuki theater of the iPhone being 'uncrackable' last year was hilarious, especially in light of the Wikileaks Vault 7 release revealing that there is no such security in any sort of personal electronics.

The Wikileaks #Vault7 was the low comedy routine from the Three Stooges of technology in terms of antiquity. The vulnerabilities and exploits revealed by the documents were from 2008, and applied to an old design of IPhones not used since the iPhone 3GS! The same exploit was revealed by the document dump from the NSA by Edward Snowden in 2013. There was NOT ONE THING DIFFERENT for iPhones in the Wikileaks from what Snowden released. Nothing in those documents would work on any iPhone released since the iPhone 4 came out in September of 2010. Nothing. It would require an entirely new theoretical and philosophical approach to breach the iPhones from the 4 to the 5C, and then another sea change in security was developed for the iPhones from the 5S onward that would require another order of magnitude in thinking in mobile phone cracking to get into them, none of which is even approached by what they were doing or even hinting at doing in the #Vault7 dump. I read it and laughed!

Apple has announced that ALL of the vulnerabilities revealed in those documents had been long ago closed. . . and the ones for the Mac had been closed at least by last year. Even then, they ALL required physical access to the target devices. Not one could be done remotely. Not one.

They cannot inject something into the pre-OS level that can effect the encryption. . . because it still will not effect the passcodes the USER enters that are part of the encryption key. Without the encryption key, they have bupkis. On the modern iPhones, the encryption engine is independent of the OS and is not accessible by the data processor.

Sorry, you don't know what you are talking about. I do.

16 posted on 03/29/2017 11:23:59 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 15 | View Replies ]

To: JOAT; Swordmaker
The CIA has pre-hacked them all, in the supply chain

Uh... ok... yeah.

21 posted on 03/30/2017 10:52:41 AM PDT by TheBattman (Gun control works - just ask Chicago...)
[ Post Reply | Private Reply | To 15 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson