Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple remains in dark on how FBI hacked iPhone without help
townhall.com ^ | 3/30/2016 | Tami Abdollah

Posted on 03/30/2016 5:56:43 AM PDT by rktman

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last
To: Synthesist

Er... Who built those highly sophisticated crypto devices?


101 posted on 03/31/2016 2:42:23 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 96 | View Replies]

To: ctdonath2

That is classified information that I would never reveal. :)


102 posted on 03/31/2016 2:46:04 AM PDT by Synthesist
[ Post Reply | Private Reply | To 101 | View Replies]

To: ctdonath2

“You are so missing the point...”


What point?

Do you want to ignore my point that Apple climbed on a stupid little hill for a stupid PR stunt only to lose in a spectacular fashion to the FBI?


103 posted on 03/31/2016 3:15:01 AM PDT by Synthesist
[ Post Reply | Private Reply | To 100 | View Replies]

To: Synthesist

Apple didn’t lose.
FBI lost.
Apple won.
Strong crypto won.
Your data won.


104 posted on 03/31/2016 5:07:39 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 103 | View Replies]

To: rktman

My money’s on Abby Schuito


105 posted on 03/31/2016 5:09:37 AM PDT by bert ((K.E.; N.P.; GOPc;+12, 73, ....carson is the kinder gentler trump.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Another way?

They cloned the phone and disabled the 10 failed attempts self destruction feature. Thus able to try all of the combinations?


106 posted on 03/31/2016 5:36:06 AM PDT by cornfedcowboy
[ Post Reply | Private Reply | To 79 | View Replies]

To: null and void
Unlike IBM to Hitler's Germany, Apple said no. Would history be better if IBM declined to build the means of tracking every Jew, Gypsy, communist, mental defective, and homosexual in Germany?

I was not aware of this. I have some reading to do.

107 posted on 03/31/2016 5:50:13 AM PDT by Protect the Bill of Rights
[ Post Reply | Private Reply | To 33 | View Replies]

To: Swordmaker

I don’t see why they would get in this fight with Apple, and ensure a public relation nightmare when it was possible for this other company to solve their problem before Apple could ever be forced to comply.

Freegards


108 posted on 03/31/2016 6:21:17 AM PDT by Ransomed
[ Post Reply | Private Reply | To 90 | View Replies]

To: Synthesist

Only Top Secret? Not very high on the pole ...


109 posted on 03/31/2016 6:57:26 AM PDT by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 96 | View Replies]

To: Protect the Bill of Rights

IBM sold Germany the same punch card system it sold the US gov to track Social Security recipients.


110 posted on 03/31/2016 7:00:54 AM PDT by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 107 | View Replies]

To: ctdonath2; Synthesist
You are so missing the point...

He does that, but my experience with him is he's an honest player who fights fair.

He will get the point, but still reserves the right to disagree with it.

111 posted on 03/31/2016 7:55:33 AM PDT by null and void ("when authority began inspiring contempt, it had stopped being authority" ~ H. Beam Piper)
[ Post Reply | Private Reply | To 100 | View Replies]

To: Protect the Bill of Rights

IBM doesn’t like to talk about it...


112 posted on 03/31/2016 7:57:23 AM PDT by null and void ("when authority began inspiring contempt, it had stopped being authority" ~ H. Beam Piper)
[ Post Reply | Private Reply | To 107 | View Replies]

To: Synthesist

To clarify (as if others haven’t):

Secrecy, both for their own operations and for their customers’ data, is axiomatic (paramount) to Apple. Since the iPhone 4, they’ve been taking serious steps to implement what hopefully & eventually will be unbreakable security (”rubber hose cryptanalysis” aside); some of the intervening implementations have had weaknesses, one of which the FBI just paid a world-class specialist a lot of money to exploit.

Evidence gathering, both thru proper warrants and thru “coerced cooperation”, is axiomatic to the FBI. They’ve long tried to bully people into complying with unenforceable demands (a la “may we search your vehicle?” requests with armed, armored, & intimidating agents); often people will cooperate to their own benefit or demise, but this time their target said “you don’t have a legal basis for your demand, so NO.”

Apple didn’t “climb on a stupid little hill for a stupid PR stunt”, they were demanded to do something they didn’t want to do and which the FBI had no legal basis for demanding. Had they complied, every legal jurisdiction with a criminal case involving an iPhone would have likewise demanded, with precedent - a costly and obnoxious scenario at best. Instead, Apple stuck to “NO”, told the FBI to pound sand, and after a long stare-down in the media the FBI indeed skulked off and found someone else to exploit the known (and now closed) weakness.

FBI didn’t win the case, they lost insofar as they had to resort to normal process: if they couldn’t decrypt the data, they had to find a willing & capable party and pay them to do the job (to wit: hire a locksmith, not compel the lock maker to reveal weaknesses they know). Yes they got the data, however useless it may have been, which is no worse than hiring a locksmith to open a safe.

Apple won the PR battle because customers know that Apple is working hard to increase security (AFAIK there is no exploitable weakness in the iPhone 6 and up), is extending that security throughout their data services, and WILL go to the wall to say “NO” to defend their customers’ data from so much as the US Government. It was a spectacular win.


113 posted on 03/31/2016 10:24:23 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 103 | View Replies]

To: null and void

Good to see someone vouch for another FReeper, even if the latter holds...different views.


114 posted on 03/31/2016 10:25:47 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 111 | View Replies]

To: rktman
a public setback for Apple Inc

Well, they could have opened it on their own and stop the political positioning/marketing OR let a hacker do it and lose cred, they decided the later.

115 posted on 03/31/2016 10:27:23 AM PDT by 1Old Pro
[ Post Reply | Private Reply | To 1 | View Replies]

To: cornfedcowboy

Pretty much. 10,000 possible passcodes. Clone the device, short out the hardware counter (very much a not-trivial task), then tediously enter all possible codes until one works. Trying one code per minute (assuming complications & documentation), 16 hours a day (two shifts), would take no more than 10 days and an average of 5 (right around how long it actually took). I expect the company already had a timeout-disabled device ready for cloning before the FBI actually hired on, so setup may have been just 1 day once the suspect’s phone was handed over.


116 posted on 03/31/2016 10:33:50 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 106 | View Replies]

To: 1Old Pro

Opening it on their own would have meant consenting to a legally baseless DEMAND to comply, setting precedent for many other jurisdictions to demand the same thing - an ongoing hostile scenario.

We know computer forensics companies exist precisely for the purpose of extracting data from such difficult circumstances. The exploit was well known/expected, so there’s no surprised that the OBSOLETE model involved was breached by a world-class expert in such matters (involving significant time, money, and likely destruction of the phone).

We don’t demean safe manufacturers for refusing to crack their own safes. We expect them to adhere to the premise that the product cannot be breached, and are not surprised when a master locksmith (or criminal genius) does, with great talent & tools, manage to do so.

Apple WON the PR battle: customers know that Apple will not sell out their data, standing up to the US government itself. I _WON’T_ use an Android device, and sparingly use other Google products, knowing full well that Google’s modus operandi is precisely to mine all the data they can get their hands on, and wouldn’t be surprised if it’s actually a CIA front company. I’ll stick with Apple, knowing they actively try to secure my data - even against Apple itself.


117 posted on 03/31/2016 10:39:55 AM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 115 | View Replies]

To: cgbg

You always have to consider that anything you say, write, type, record, email, or any other type of communication, whether electronic or verbal that there is somebody recording your conversations for future use against you.
The only things really safe are the things inside your head, and that may not last much longer.


118 posted on 04/01/2016 1:44:06 PM PDT by 5th MEB (Progressives in the open; --- FIRE FOR EFFECT!!)
[ Post Reply | Private Reply | To 9 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson