Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rarestia
No. Sorry Dio, but you're wrong. A back door in security parlance means a way to circumvent the protections afforded by the security in a device or software, usually for the purposes of monitoring, debugging, or administrative access. There's nothing secret about a back door. It takes about 30 seconds for me to scan a server or a piece of software to find a listening port or receptive API. Once that door is found, I immediately assume that the protections on that door are not as strong as the cryptographic safeguards in place on the device or in the code, and most back doors don't have additional protections such as DDoS prevention or brute force detection. That means I can take my time whittling away at it until it opens.

I think you are using a "Liberal" or broad interpretation of the word, while I am using a "Conservative" or narrow interpretation of the word. The Dictionary mostly supports my view, but it allows enough wiggleroom to barely sneak yours in.

Back doors are anything but secret.

They are usually secret. Of what value is a "back door" when everyone knows about it? If everyone uses it, it becomes a "front door."

If you read even one of those articles, you'll learn that Apple does not have the keys to each individual iPhone. They develop a proprietary algorithm to use, a salt and hash for cryptographic operations, and they deploy their software using unique markers in the hardware of each device to generate a cryptographically unique key using what's known as elliptic curve cryptography. The chances of generating the same key on two devices is statistically impossible (1 in a nondecillion). Even on the same device, the chances of generating the same key twice would require a quantum computer and 5-10 YEARS of time to complete. Remember, the only thing that Apple retains privately is their intellectual property: an algorithm, which have, time and time again, been determined to be as much the property of the corporation as any trade secret.

Okay. I'm not sure you are aware you are doing it, but there is a fallacious method of argument whereby a person makes numerous factual statements, but none of the statements actually support the argument they are advancing. Apple's cryptography methodology has nothing to do with this issue. They aren't modifying their cryptography. The proposal was that they would modify existing operating system code to
1. Remove the 10 tries limitation.
2. Remove the incremental time delays per try.
3. Allow password entry electronically at maximum speed. (said to be 80 ms.)

None of that touches on Apple's cryptography. An effort to introduce cryptography into the conversation seems to me to be an effort to distract from the real issue.

Apple's made it very public that if you mess up and your phone is wiped, they can't help you. This isn't shirking any sort of responsibility to provide a service to the customer. You can very easily shut off the functionality that wipes your phone! If anything, this is very American of Apple: they're placing the responsibility on the end user for their own device. Personal responsibility! Can you imagine?

Again, nothing to do with the salient point.
1. This phone was used by a criminal.
2. This phone was not the property of the said criminal, but is instead the property of San Bernadino county.
3.This phone may contain important information that might save future lives.
4. The effort on the part of Apple would be trivial.
5.Apple was balking at a valid search writ.

Now, on to your request on the court filing... swordmaker has graciously provided you with numerous posts outlining the requests in the court filing.

Swordmaker only provides information from that filing which is deliberately misleading. Swordmaker has been shot down so many times on his propaganda attempt that everyone is sick of reading more of his propaganda attempts.

DID YOU READ THE COURT FILING YOURSELF? That's all I asked you to do. Did you do it?

In it you will find a section that gives Apple complete control over everything. The section Swordmaker keeps quoting is superseded by that later portion which grants Apple the power to accomplish this goal in any manner they see fit. It's an open ended blank check.

Apple can keep custody of the phone at an Apple facility. Apple can keep custody of the modified operating system and can keep it from ever falling into FBI, or any other hands.

Find that section in the FBI filing and get back to me. Till you've looked at what the actual filing says, you are merely regurgitating Apple inc Propaganda.

Here is a portion of some relevant sections:

Apple's reasonable technical assistance may include, but is not limited to:

The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility;

The Filing says Apple can control everything. Furthermore Apple could have requested clarification on this point if they had any doubts, but instead Apple chose to launch their Chicken Little, "The Sky is Falling!" act.

135 posted on 04/01/2016 9:04:20 AM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 126 | View Replies ]


To: DiogenesLamp

Holy shit, man. I... wow. You’ve spun yourself stupid.

The device was already locked/erased/bricked/scrambled/pick-your-word. The FBI admitted to attempting to unlock it, and it was erased. That’s what it does, it erases the contents of the phone by scrambling them and resetting the file table on the EEPROM. Do you understand basic abstraction in a computer system?

It didn’t matter if Apple did what you’re saying they were asked, the device was already bricked. Don’t you get that? Changing the number of tries or timing between tries wouldn’t have accomplished anything, the device was already useless. At that point, the ability to retrieve the data would require that they reproduce the cryptographic key required to unscramble the data on the user partition which would’ve required they use their IP to attempt to reverse the damage done. Since they’ve PUBLICLY stated, as per the articles I referenced, that they CANNOT HELP, this is all a moot point. There’s absolutely nothing they could’ve done to help, and being compelled to do so would’ve solved nothing.

Seriously man, read what we’re posting. You’re a braying jackass at this point who’s refusing to read the technical facts germane to this conversation. You’re just repeating “did you read the court filing?” The court filing is useless and a waste of time if you understand the basics of the device and software, which you have demonstrated you do not.


141 posted on 04/01/2016 9:57:46 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 135 | View Replies ]

To: DiogenesLamp; rarestia
Swordmaker only provides information from that filing which is deliberately misleading. Swordmaker has been shot down so many times on his propaganda attempt that everyone is sick of reading more of his propaganda attempts.

LIAR! I have posted both links to the Court Order and I have posted the Court Order in its entirety, as well as the pertinent sections. That makes you a liar. You have done neither.

147 posted on 04/01/2016 2:06:37 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 135 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson