"Apple, The FBI And iPhone Encryption: A Look At What's At Stake"

Message boards : Politics : "Apple, The FBI And iPhone Encryption: A Look At What's At Stake"
Message board moderation

To post messages, you must log in.

Previous · 1 . . . 3 · 4 · 5 · 6 · 7 · 8 · Next

AuthorMessage
Profile Lynn Special Project $75 donor
Volunteer tester
Avatar

Send message
Joined: 20 Nov 00
Posts: 14162
Credit: 79,603,650
RAC: 123
United States
Message 1781121 - Posted: 21 Apr 2016, 22:28:38 UTC - in response to Message 1780335.  

Paid to hackers, or paid an apple insider?

FBI paid at least $1.3M to hack terrorist iPhone

SAN FRANCISCO – The FBI paid at least $1.3 million dollars for the tool that allowed it to break into the iPhone 5 used by San Bernardino terrorist Syed Rizwan Farook, agency director James Comey said Thursday.

http://www.usatoday.com/story/tech/2016/04/21/fbi-paid-more-than-1-million-san-bernardino-terrorist-iphone5-apple-hack/83350598/
ID: 1781121 · Report as offensive
Darth Beaver Crowdfunding Project Donor*Special Project $75 donorSpecial Project $250 donor
Avatar

Send message
Joined: 20 Aug 99
Posts: 6728
Credit: 21,443,075
RAC: 3
Australia
Message 1781151 - Posted: 22 Apr 2016, 1:05:40 UTC - in response to Message 1781121.  

Paid to hackers, or paid an apple insider?

FBI paid at least $1.3M to hack terrorist iPhone

SAN FRANCISCO – The FBI paid at least $1.3 million dollars for the tool that allowed it to break into the iPhone 5 used by San Bernardino terrorist Syed Rizwan Farook, agency director James Comey said Thursday


Capitalism at it's best hehehe everyone can be bought if there's enough money offered .
ID: 1781151 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1781210 - Posted: 22 Apr 2016, 7:21:31 UTC

"Apple's cyber scrap

Mr Wozniak, who was speaking at the Business Rocks technology summit in Manchester, backed Apple over its recent tangle with US authorities over access to data: "Apple has been the good guy.

"There are politicians who do not have a clue as to what cyber security is all about trying to pass laws saying that Apple has to make a product less secure.

"Why? That's a crime. That is just so horrible. I just cry! Why would Apple do it for such a weak case where the government were not going to get any valuable information at all - it's impossible.""
ID: 1781210 · Report as offensive
Darth Beaver Crowdfunding Project Donor*Special Project $75 donorSpecial Project $250 donor
Avatar

Send message
Joined: 20 Aug 99
Posts: 6728
Credit: 21,443,075
RAC: 3
Australia
Message 1781220 - Posted: 22 Apr 2016, 8:10:50 UTC - in response to Message 1781210.  

"Apple's cyber scrap

Mr Wozniak, who was speaking at the Business Rocks technology summit in Manchester, backed Apple over its recent tangle with US authorities over access to data: "Apple has been the good guy.

"There are politicians who do not have a clue as to what cyber security is all about trying to pass laws saying that Apple has to make a product less secure.

"Why? That's a crime. That is just so horrible. I just cry! Why would Apple do it for such a weak case where the government were not going to get any valuable information at all - it's impossible.""


The polly's will have to learn what encryption is .

Crpto currency's aka: Bitcoin

they can't Apple that is be liable for loss in the future .

Apple take the high road but you watch there phones will be able to be looked at .

Why do you think Microsoft has gone the way it has ?

To maybe customise us to not having any security and have to do it our self's

Who needs laws to protect data when it's not protected and easly looked at.
ID: 1781220 · Report as offensive
musicplayer

Send message
Joined: 17 May 10
Posts: 2430
Credit: 926,046
RAC: 0
Message 1781956 - Posted: 24 Apr 2016, 7:31:20 UTC
Last modified: 24 Apr 2016, 7:38:54 UTC

While at the local School of Engineering, I was with two friends or colleagues viiting a local business related to security, which for the project being carried out on behalf of the School Administration was related to the subject of building security, including entrances through doors and also access times.

At that time we already had a card system in place in order to gain access to both study rooms and also computer rooms, also outside regular studying time.

We did not have access to the server room being used at the school, but I remember paying a visit there together with others quite early on in the studies.

I remember being visited by a security guard once when sitting in a computer room probably after 11 PM in the evening.

It was better when making the last bus for the night, but a couple of times it needed walking for a taxi instead, or calling this service using the mobile phone which was rather new at that time and purchased for the first time after carrying out Military Service.

You will need a key to unlock the door to your flat and next you should neither thow it away or let anyone else in without permission.

A code based on numbers should hide a key or secret, or at least give you a right to privacy, because such a secret or right to privacy is something that is more beneficial to yourself than the opposite thing.

I should not be able to break into my own flat unless I have the key for it and the same thing should go for certain numbers as well.

You are not supposed to be able to break any codes by means of their corresponding numbers, but the fact is that this may not always be true anymore, because of recent technological innovations and refinements which are being made.

The Police and Justice System is defining crime as being something that is against the Law.

Therefore we are having Justice in order to protect against crimes being carried out, including terrorism.

You should have the right to keep the only key to your flat or apartment, but terrorism is supposed to be hitting at both material values, including properties and buildings and also kill or hurt innicent people or civilians.

Therefore, always the excluding factors which makes up for specific or individual cases.

The Police may be heavy handed at times, but at least they should be your protection when it comes to both material values and sometimes a couple of things which are related to personal matters as well.

Here we go. First one right now.

The first ten tasks ran for 6 seconds or less. I have not checked any logs yet.
ID: 1781956 · Report as offensive
JLDun
Volunteer tester
Avatar

Send message
Joined: 21 Apr 06
Posts: 573
Credit: 196,101
RAC: 0
United States
Message 1781968 - Posted: 24 Apr 2016, 8:07:59 UTC - in response to Message 1781956.  

Umm, wow.
(Now, if I don't make sense, I apologize- it's very early morning for me.)

I should not be able to break into my own flat unless I have the key for it and the same thing should go for certain numbers as well.

"Break in"? I guess even having a key (otherwise known as "legitimate access") still counts as Breaking In to a building/Car/phone.
Also- if you "own" the flat/building/etc., the exact method of entry (key, garage door, window) is usually left up to you; the only limiting factor is how nosey you neighbors are, usually.

You should have the right to keep the only key to your flat or apartment,...

While you do have this 'right', there are times it can be 'waived'- a contract that says someone else gets a key (landlord, security company) or something that allows other people to make copies on their own (e.g. a key maker that knows you lose your keychain every two weeks after going to the pub in payday).
ID: 1781968 · Report as offensive
JLDun
Volunteer tester
Avatar

Send message
Joined: 21 Apr 06
Posts: 573
Credit: 196,101
RAC: 0
United States
Message 1783338 - Posted: 28 Apr 2016, 23:35:42 UTC

Something tied to the original... thingy... that lead to this:

"Authorities Arrest 3 People Connected To One Of The San Bernardino Killers"
ID: 1783338 · Report as offensive
KLiK
Volunteer tester

Send message
Joined: 31 Mar 14
Posts: 1304
Credit: 22,994,597
RAC: 60
Croatia
Message 1783404 - Posted: 29 Apr 2016, 5:51:00 UTC - in response to Message 1783338.  

Something tied to the original... thingy... that lead to this:

"Authorities Arrest 3 People Connected To One Of The San Bernardino Killers"

Picking up straws... :/


non-profit org. Play4Life in Zagreb, Croatia, EU
ID: 1783404 · Report as offensive
Profile Gary Charpentier Crowdfunding Project Donor*Special Project $75 donorSpecial Project $250 donor
Volunteer tester
Avatar

Send message
Joined: 25 Dec 00
Posts: 30647
Credit: 53,134,872
RAC: 32
United States
Message 1783894 - Posted: 1 May 2016, 5:09:05 UTC

http://www.post-gazette.com/news/nation/2016/05/01/The-government-wants-fingerprints-to-unlock-phones/stories/201605010200
LOS ANGELES — As the world watched the FBI spar with Apple this winter in an attempt to hack into a San Bernardino shooter’s iPhone, federal officials were waging a different encryption battle in a Los Angeles courtroom.

There, authorities obtained a search warrant compelling the girlfriend of an alleged Armenian gang member to press her finger against an iPhone that had been seized from a Glendale, Calif., home. The phone contained Apple’s fingerprint identification system for unlocking, and prosecutors wanted access to the data inside it.

ID: 1783894 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1783950 - Posted: 1 May 2016, 14:53:07 UTC - in response to Message 1783944.  

http://www.post-gazette.com/news/nation/2016/05/01/The-government-wants-fingerprints-to-unlock-phones/stories/201605010200
LOS ANGELES — As the world watched the FBI spar with Apple this winter in an attempt to hack into a San Bernardino shooter’s iPhone, federal officials were waging a different encryption battle in a Los Angeles courtroom.

There, authorities obtained a search warrant compelling the girlfriend of an alleged Armenian gang member to press her finger against an iPhone that had been seized from a Glendale, Calif., home. The phone contained Apple’s fingerprint identification system for unlocking, and prosecutors wanted access to the data inside it.

In this new Age.

Possibly the same as knowing a safe's combination.

If the FBI, or any other Law Enforcement Agency, get a Judge's Order to provide the Combination/Swipe Finger. And the person refuses:

Possible Contempt of Court Ruling. And the person stays is Jail, until the Combination/Swipe Finger is provided.

In real life: Jail Time would be for a period, of perhaps months. If a continuing refusal to comply with the Order: A Release, after the Judge's admonishment.

& if not her phone?
ID: 1783950 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1783974 - Posted: 1 May 2016, 16:28:10 UTC - in response to Message 1783969.  

A safe is one thing as many could have the combination, but a cellphone not belonging to an indivudual but someone else? How would her fingerprint unlock it?
ID: 1783974 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1783983 - Posted: 1 May 2016, 16:44:19 UTC - in response to Message 1783979.  

Are you sure you read the whole report?

"Why authorities wanted Bkhchadzhyan to unlock the phone is unclear."
ID: 1783983 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1783988 - Posted: 1 May 2016, 16:53:56 UTC - in response to Message 1783984.  

That may be the case, but wouldn't it be better to wait until more is known without having to resort to assumptions?
ID: 1783988 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1783998 - Posted: 1 May 2016, 17:03:32 UTC - in response to Message 1783992.  

Maybe, but just like what has recently been reported here in the UK, that's lazy policing.
ID: 1783998 · Report as offensive
Sirius B Project Donor
Volunteer tester
Avatar

Send message
Joined: 26 Dec 00
Posts: 24879
Credit: 3,081,182
RAC: 7
Ireland
Message 1784010 - Posted: 1 May 2016, 17:16:28 UTC - in response to Message 1784003.  

Maybe, but just like what has recently been reported here in the UK, that's lazy policing.

Mere speculation.

However... Speculation is interesting.

Not here though, it has been proven.
ID: 1784010 · Report as offensive
JLDun
Volunteer tester
Avatar

Send message
Joined: 21 Apr 06
Posts: 573
Credit: 196,101
RAC: 0
United States
Message 1784144 - Posted: 2 May 2016, 3:33:06 UTC - in response to Message 1783979.  

A safe is one thing as many could have the combination, but a cellphone not belonging to an indivudual but someone else? How would her fingerprint unlock it?

Apparently 'The Owner' gave permission/authority.

Should make it easier for the FBI to get a Court Order.


Assuming: 'Someone else' owned the phone (Paid for it, phone service in their name, so on):
They may have wanted her to use it for a bit. (Like several people all using the same landline, even though it's only in one person's name).

BUT, if the authorities know that one particular person can unlock a given phone (pin, fingerprint, ...), then it wouldn't matter. Just can they get that court order saying "open this up for us".
ID: 1784144 · Report as offensive
KLiK
Volunteer tester

Send message
Joined: 31 Mar 14
Posts: 1304
Credit: 22,994,597
RAC: 60
Croatia
Message 1784203 - Posted: 2 May 2016, 12:44:00 UTC - in response to Message 1783894.  

http://www.post-gazette.com/news/nation/2016/05/01/The-government-wants-fingerprints-to-unlock-phones/stories/201605010200
LOS ANGELES — As the world watched the FBI spar with Apple this winter in an attempt to hack into a San Bernardino shooter’s iPhone, federal officials were waging a different encryption battle in a Los Angeles courtroom.

There, authorities obtained a search warrant compelling the girlfriend of an alleged Armenian gang member to press her finger against an iPhone that had been seized from a Glendale, Calif., home. The phone contained Apple’s fingerprint identification system for unlocking, and prosecutors wanted access to the data inside it.

https://www.youtube.com/watch?v=fawPebE75xA
Thug Life! B)


non-profit org. Play4Life in Zagreb, Croatia, EU
ID: 1784203 · Report as offensive
KLiK
Volunteer tester

Send message
Joined: 31 Mar 14
Posts: 1304
Credit: 22,994,597
RAC: 60
Croatia
Message 1784476 - Posted: 3 May 2016, 10:09:31 UTC

ID: 1784476 · Report as offensive
JLDun
Volunteer tester
Avatar

Send message
Joined: 21 Apr 06
Posts: 573
Credit: 196,101
RAC: 0
United States
Message 1784829 - Posted: 4 May 2016, 23:55:37 UTC - in response to Message 1784476.  

For all we can argue about getting warrants against individual phones, at least there's the appearance of going against a single target (and for presumably a single reason), like with getting into the San B. phone.


But this is just.... ******* STUPID!


[Felt like letting that out.]
ID: 1784829 · Report as offensive
bluestar

Send message
Joined: 5 Sep 12
Posts: 7031
Credit: 2,084,789
RAC: 3
Message 1784927 - Posted: 5 May 2016, 10:28:33 UTC
Last modified: 5 May 2016, 10:31:07 UTC

If you do not mind.

If I chose to be using the web in order to carry out a possible crime, most likely any information being sent or received would be based on something like RSA-1024, or more likely RSA-2048.

Such numbers are logical when it comes to their format and should not have anything to do with passwords.

I will give you an example.

C72 = 275463308503357857770633847528828703673096133022978246606911055578970739

This number, if not becoming public, could be used for a password or code.

It should not be possible to factorize this number, unless you take some considerable time, or is having a specialized software for this purpose.

The point I wanted to make is that except for the serious crime being committed and the offense being made by means of such an act of terrorism, we may be having the tools and resources of the FBI in one end and next the inability of even such agencies to crack certain codes, because in the end they could be converted into pure numbers for which no simple solution may be available.

If an encryption or decryption software was available, next I would be asking myself what makes some text encrypted and in which way it is being so.

If "ABC" directly encrypts into "XYZ" and vice versa, it should be easy to find the conversion algorithm. If rather "XYZ" becomes something else all the time, but you still might be able to decrypt the text back into "ABC", then you most likely are not a genius, because the encryption could be able to making anything into something else, but still make it possible to get back to the original text.

This is the reason I am not fond of encryption techniques.
ID: 1784927 · Report as offensive
Previous · 1 . . . 3 · 4 · 5 · 6 · 7 · 8 · Next

Message boards : Politics : "Apple, The FBI And iPhone Encryption: A Look At What's At Stake"


 
©2024 University of California
 
SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.