Posted on 03/29/2017 11:56:48 PM PDT by Swordmaker
“Apple just pulled off one of the great engineering feats of all time by upgrading a few hundred million devices to a new file system,” Dave Farrington writes for NoodleMac. “Folks, thats no mean feat.”
“At the heart of all the cosmetic changes and app updates in iOS 10 this week, came a big one. APFS. Thats Apples new file system, now standard on iPhone, iPad, and Watch; and coming soon to macOS,” Farrington writes. “Think 20th century vs. 21st century. Also, think Apple against the rest of the world especially criminals and governments which does not seem to appreciate privacy and security the way you and I do.”
“On the Mac, you can use FileVault to encrypt the entire disk drive. Secure, right? Unless someone gets in, then everything is open and available, and FileVault is an all or nothing security option,” Farrington writes. “On the Mac, you can use FileVault to encrypt the entire disk drive. Secure, right? Unless someone gets in, then everything is open and available, and FileVault is an all or nothing security option. APFS can do full disk encryption, too, but it can also encrypt specific files, so expect to see that option built into the Mac in the future. With both single or multi-key support.”
Read more in the full article here.
MacDailyNews Take: Our myriad iOS devices have been updates to the momentous iOS 10.3 and all are working just fine so far (better than ever, in fact)!
every encryption has a key. question is, who all has this key.
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
...
Only the user. . . to change the file system required the user to o it! They had to log in, accept the update. Once they did that, their encryption was unlocked. They do that every time the device is updated.
Good news. Now something else to learn and another password to make up. BTW, traded in the old 4S for the “new” 5SE today. Last Friday, Apple somehow gave the old 5SE phone the O.S. of the 6 phone. Apparently, customers like the smaller iphone because it fits in pockets and in their hands. For the first time the transition of data was almost perfect thanks to daily backups to iCloud. Lost texts for the hours previous to changeover. No big deal. Will be fooling around with their Sleep Cycle app. Best new feature so far: the new emoticons. Lots of fun. And space....64gb!! Just wow!
Russia, of course.
What would you take as proof?
Listen, my FRiend, we are now in 1984. Privacy is antiquated and young people accept that everything is going to be saved forever. The good news is there is always paper and pen, which I use for taking confidential data from clients. I’m an old-timer though. Could just as easily use laptop and type. But letting the backdoor snoopers in is against the “do no harm” mantra.
And whores for the Chinese, too.
It will be secure for a while. Afterwards people get compromised, palms get greased and threats are made. Then it will be no safer than an English primer.
I have a hard time believing anything apple makes is secure considering the Chinese labor and the guy who runs apple. On the other hand I know android not secure, google been in bed with the CIA from the start.
Omigod did you stop reading after the first sentence?
I upgraded my iPhone 6 Plus and Apple Watch yesterday with no problems whatsoever.
No, it won't. The only tech company, software and hardware companies encompassed by that term, to ever buck the NSA, CIA, & FBI was Yahoo. With any other company you can name any fight they've had with the government has been for show and took place only after word got around in low places that the company was aiding the Intelligence thugs.
To keep that information from getting widespread circulation a public fight leads most people to dismissing out of hand anything they hear about the flaws built into various things and about a company cooperating with the government across the board. First way back during the first great wave of government demanding more power because of evil hackers back in the late eighties and again when they went to court to try and fight a FISA warrant not too many years ago.
Starting in the early eighties all three organizations and everything else the government could bring to bear set out to bankrupt them and keep key people from working for Yahoo.
For those who don't know about the first major overreach that all the rest of this has been built on, look up the fight against the Clipper chip as well as the issues with and battles over DES encryption. That's the initial nudge that started the snowball rolling so it could grow into the perfect fascist surveillance state.
They've been on the ground floor of all hardware and software companies ever since. Every "heroic" fight between some company and the government since that time has been nothing but a farce.
Since this BS “apple is the most secure thing since sliced bread” thread has been totally hijacked, what is your take on TrueCrypt?
I could go into the theoretical impossibility of a 256bit AES encryption standard having a backdoor built in under the certified standards, simply because the AES encryption does NOT work like that, but that's too complicated. Suffice it to say there can be only ONE key in this encryption and ONLY the user has it. The key itself is not even kept on the device, just a one way hash result for comparison is stored inside a secure encryption engine. The user's passcode must be manually entered and the algorithm recreates the one way hash anew for comparison every time with the stored hash. If, and only if, it matches, the encryption engine then proceeds to use that passcode by entangling it with three other unique data sets to construct actual encryption key. Those are a random 128 character UUID randomly assigned to the iPhone's or iPad's main SoC when the encryption engine was burned to silicon and of which no external record is kept, the model ID of the device, and a truly random number created from environmental sensors such as the two cameras, the microphone, the GPS, and the accelerometer, sampled when the user's passcode was first entered and stored. An algorithm takes thes various inputs and constructs a very large encryption key, known only to the engine and uses it for encrypting and decrypting the data as needed and sending it to the data processor. Depending on the complexity of the user's passcode, which Apple allows to be up to 256 characters in length and use all of the 223 characters accessible from the kayboard, the key can be huge!
But ask yourself "Why would Apple collude with the NSA to destroy their business model, which is built on the trust of their one billion customers around the world?" What could the NSA possible give Apple that would inspire their management to risk $20 million personal fines and 20 years in prison for lying to stockholders about this topic, a crime under the 2002 Sarbanes-Oxley Actwhich would destroy the value of the stocktriggering such penalties? Look it up. That's what would happen to the members of the board and upper management if it were found there were backdoor in Apple products after management made public statements there weren't. . . Or if it turned out they were working to spy on their customers after publishing statements that customer privacy was primary to Apple. . . and made contracts with major businesses assuring that principle? Think of the lawsuits!
No, I think that proves it well enough.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.