Feds reset the iCloud password before getting access to the cloud backup.
That was smart. And now they want the backdoor because of it.
That was smart. And now they want the backdoor because of it.
Feds reset the iCloud password before getting access to the cloud backup.
That was smart. And now they want the backdoor because of it.
Yup. It's that open and shut of a case.So the feds screw up and now want Apple to cover their ***, and families of the victims want to sue Apple over it?
"I'm from the government and I'm here to help." [eyeroll]
Yup. It's that open and shut of a case.
Yup. It's that open and shut of a case.
This cannot be that hard unless someone is withholding info as to what is actually happening.Feds reset the iCloud password before getting access to the cloud backup.
That was smart. And now they want the backdoor because of it.
That's been my thinking as well. Keys can be destroyed after one use. Somebody somewhere posited that the phone could be taken to the same kind of secure facility where devices captured in Iraq and Afghanistan were taken, and that Apple could open it up there -- a one-time only deal. Write code, open the phone, erase the code. Apple claims that they don't want to do it because it would confirm for hackers that it could be done. Please -- hackers are already convinced it can be done, even though as far as we know, none have been able to do it.If Apple doesn't have enough institutional control to prevent some "back door program" from leaking into the world and creating havoc, they are a pretty piss poor company. I call ******** on this one.
What you've described is pretty much what the FBI has asked for. Here's the full text of the brief filed by DOJ: http://www.justice.gov/usao-cdca/file/826836/downloadThis cannot be that hard unless someone is withholding info as to what is actually happening.
Give Apple THE PHONE. Tell Apple what FBI wants. FBI gets a list of contacts that went thru THE PHONE. Give the requested hard copy list extracted to the FBI and nothing more. There is only one unit involved and it should be kept secure by Apple.
Go back to courts for order if this is not what iss being requested.
If Apple doesn't have enough institutional control to prevent some "back door program" from leaking into the world and creating havoc, they are a pretty piss poor company. I call ******** on this one.
That's been my thinking as well. Keys can be destroyed after one use.
Somebody somewhere posited that the phone could be taken to the same kind of secure facility where devices captured in Iraq and Afghanistan were taken, and that Apple could open it up there -- a one-time only deal.
That's been my thinking as well. Keys can be destroyed after one use. Somebody somewhere posited that the phone could be taken to the same kind of secure facility where devices captured in Iraq and Afghanistan were taken, and that Apple could open it up there -- a one-time only deal. Write code, open the phone, erase the code. Apple claims that they don't want to do it because it would confirm for hackers that it could be done. Please -- hackers are already convinced it can be done, even though as far as we know, none have been able to do it.
What you've described is pretty much what the FBI has asked for. Here's the full text of the brief filed by DOJ: http://www.justice.gov/usao-cdca/file/826836/download
Says you. The DoJ brief says differently. And Hillary didn't try to destroy her email server, she just deleted a bunch of emails. If she had wanted to destroy it there were plenty of ways she could have done that.Really? Go destroy your post I replied to. Hill tried to destroy her email server, and it didn't work too well. That's not the way computers work.
That's not what the case is about, and not what the government wants.
Ah, the old slippery slope argument. Yes, law enforcement and intelligence agencies have been trying for years to force mobile phone manufacturers to build in remote access for their use, but the companies have successfully resisted ... and have you never wondered why it's never been taken to court? Because of the Fourth Amendment, and that pesky factor called probable cause.It starts with one phone, it becomes a requirement for all new phones.
Easy fix: Change court order that reads "Apple to Assist FBI" to "Apple to deliver hard copy of(list target) to FBI". I can see Apple's ***** when they are directed to "assist" FBI to crack into the phone. FBI should ask for nothing but the information between the terrorist and other parties.Says you. The DoJ brief says differently. And Hillary didn't try to destroy her email server, she just deleted a bunch of emails. If she had wanted to destroy it there were plenty of ways she could have done that.
Ah, the old slippery slope argument. Yes, law enforcement and intelligence agencies have been trying for years to force mobile phone manufacturers to build in remote access for their use, but the companies have successfully resisted ... and have you never wondered why it's never been taken to court? Because of the Fourth Amendment, and that pesky factor called probable cause.
Sounds reasonable to me too. But Apple is resisting doing anything that would let anybody into that phone.Easy fix: Change court order that reads "Apple to Assist FBI" to "Apple to deliver hard copy of(list target) to FBI". I can see Apple's ***** when they are directed to "assist" FBI to crack into the phone. FBI should ask for nothing but the information between the terrorist and other parties.
As far as the questioning the FBI to introduce their security code onto the phone, I would think that would be SOP to secure the evidence and be able to testify that it was totally under their security and no chance to alter the info contained.
Who would be more competent to access?Sounds reasonable to me too. But Apple is resisting doing anything that would let anybody into that phone.
In this case, probably the NSA. It's really exactly what they do. Regardless, Apple doesn't have any special way to get into the phone. They have to develop a tool that has the potential to make every iPhone less secure. If the FBI wants this info, they could seek assistance from within their own division that works on communications or enlist the assistance of the NSA.Who would be more competent to access?
Who would be more competent to access?
According to Tim Cook, Apple could have easily gotten into the phone if the FBI had come to them immediately instead of having the county employee reset the password. But Cook's assertion that they've given everything in their possession to the FBI is as much an obfuscation as Hillary saying she turned over all of her relevant e-mail or Bill saying he didn't have sex with Monica Lewinsky -- Cook knows as well as the rest of us that Farook had turned off the auto-backup feature 6 weeks before the attack, and that tells me that there's information on that phone that he didn't want on the cloud where law enforcement or intelligence agencies (or even his employer, it's their phone) could access it. And here we are.In this case, probably the NSA. It's really exactly what they do. Regardless, Apple doesn't have any special way to get into the phone. They have to develop a tool that has the potential to make every iPhone less secure. If the FBI wants this info, they could seek assistance from within their own division that works on communications or enlist the assistance of the NSA.
Can't use the agency. This is domestic and they were citizens.So.. The CIA doesn't have any hackers/tech to get around it? Did anyone ask for their help?
I thought part of Homeland Security bridged that gap. Was that not the original purpose to consolidate the agencies involved to keep that gap from being an issue again. Someone on this venue said it was behind us just a few days ago.Can't use the agency. This is domestic and they were citizens.
They can share information and truth be told, they could probably assist with. It gets sticky quickI thought part of Homeland Security bridged that gap. Was that not the original purpose to consolidate the agencies involved to keep that gap from being an issue again. Someone on this venue said it was behind us just a few days ago.