ROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEXROLEX
20 February 2016, 04:56 AM | #151 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
I do not know what the hold up is, if it is Apple saying they won't give them the info for this particular phone, or if they are agreeing to that, if the FBI is saying that's not good enough, they want the whole skeleton key. But in either case it's wrong. Give them the info from this phone and this phone only, and if a court orders another phone, give them that one too, but that's it. A Case by case basis. Why does this seem such a simple resolution to me but people who get paid millions of dollars and control incredible resources and strategic responsibilities can't come to a solution like this? |
|
20 February 2016, 05:12 AM | #152 | |
"TRF" Member
Join Date: Jan 2011
Real Name: gus
Location: East Coast
Watch: APK & sometimes Y
Posts: 26,601
|
Quote:
The objective is to have unfettered access to all personal data. The conflict is that the data is by it's nature is personal And it has been proven time and again that technology gets hacked every time which will expose that personal data to those that would use it for profit or other self serving functions without an individual's permission. Of course sometimes it may thwart some wrongdoing but the cost to privacy is too great.
__________________
|
|
20 February 2016, 05:12 AM | #153 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
It isn't as easy as you're making it sound. Apple doesn't have a solution sitting in a closet; They would have to create it. And by creating it, it won't be specific for one iPhone but it can be used on all iPhones. Second, and more importantly, is that you're looking at this from a one-off situation. This has ramifications for not only apple but every software company on the planet and everyone that uses it. What's the point of having your data encrypted if it's not safe? Once the precedent has been established that the government can compel a back door, all software companies will be forced to do the same. And that's only one aspect of it. And then there is the criminal element. If it's been created, it can be duplicated Sent from my iPhone using Tapatalk |
|
20 February 2016, 05:35 AM | #154 |
"TRF" Member
Join Date: Apr 2007
Location: USA
Posts: 573
|
Ownership brings up a good point. They don't need the phone to get email, they should be able to get texts and call data from carrier, what exactly is it they are after? Files on the device?
Sent from my Nexus 6P using Tapatalk |
20 February 2016, 05:45 AM | #155 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
Apple has also provided all of the iCloud data for this phone leaving only iMessages Sent from my iPhone using Tapatalk |
|
20 February 2016, 05:46 AM | #156 |
"TRF" Member
Join Date: Dec 2013
Location: FL
Watch: platinum sub
Posts: 15,884
|
the fbi is seeking what they always seek, control.
__________________
If you wind it, they will run. 25 or 6 to 4. |
20 February 2016, 06:07 AM | #157 |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
|
20 February 2016, 06:31 AM | #158 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
And the order is kind of interesting. They could have sitpulated a number of reasons to want the data, most compelling would be to find out of any plans for future attacks but instead it says:
Quote:
|
|
20 February 2016, 06:45 AM | #159 |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Yeah... And what if it were personal, what if (GOD forbid) there is another attack that claims innocent victims, perhaps a (GOD forbid) member of your family? Would you feel as strongly against the sinister and power hungry FBI wanting this information? I highly doubt it. How about some compassion for those family members of the innocents that were slaughtered, how about allowing the authorities the information they may (agreed, we don't know if the info is pertinent at all) need to stop a future attack. I wonder if the senior management of Apple lost any friends or family in that horrible attack they would have the same opinion. I doubt it. Innocent people were slaughtered worse then cattle destined for the steak restaurant. Does that mean nothing to you?
|
20 February 2016, 06:59 AM | #160 |
"TRF" Member
Join Date: Mar 2007
Real Name: Mik
Location: USA
Posts: 13,724
|
Forget it.....I deleted.
__________________
member#3242 |
20 February 2016, 07:05 AM | #161 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
Your "what if's" can be the basis to eliminate all freedoms and liberties. Would you support torturing innocent people in order to find a few bad ones? Before you attempt to answer on my behalf, I wouldn't give any credit to anyone if they thwarted a terrorist attack by impinging on the freedoms of innocent people. That answer doesn't change just because it involves a family member. The reason for that is called principle. Sent from my iPhone using Tapatalk |
|
20 February 2016, 07:10 AM | #162 | |
2024 Pledge Member
Join Date: Oct 2011
Location: Sweden
Watch: 1680
Posts: 1,874
|
Quote:
This is what is needed to get into this model of iPhone: 1. Write custom OS stripped of delay and auto-erase after 10 tries and with some way of entering pass codes electronically(not known how to do the last item). 2. Sign OS with Apples root certificate. 3. Hand over to FBI. 4. Somehow load OS onto the iPhone(most likely possible via the USB port if it is signed). 5. Lots of time waiting while the FBI tries every possible combination to unlock it. This is why the possibility to enter the pass codes electronically is crucial. Note that while it is possible to "sign" the custom OS to only work on that specific phone, you can modify it afterwards to make it work on any iPhone. Newer iPhones has the delay between attempts in hardware so it is not feasible on them. A simple 4 digit pass code would take about a year. Note that it has been possible for quite some time to use an alphanumeric pass code of any length in iOS which makes it tremendously harder. |
|
20 February 2016, 07:22 AM | #163 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
Frederick, you are probably 100% correct, my knowledge of encryption is .. Well... Close to zero. I understand AES 128 bit as I use it everyday in my work, but that's about it. I can barely operate my IPhone much less any kind of debugging it. I just believe there must be some way... |
|
20 February 2016, 07:33 AM | #164 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
|
|
20 February 2016, 07:42 AM | #165 | |
"TRF" Member
Join Date: Dec 2013
Location: FL
Watch: platinum sub
Posts: 15,884
|
Quote:
__________________
If you wind it, they will run. 25 or 6 to 4. |
|
20 February 2016, 07:49 AM | #166 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
Benjamin Franklin once said "They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety" IMO for Apple to give in, we as a country would be giving up a whole lot for a shot in the dark. |
|
20 February 2016, 07:54 AM | #167 |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
|
20 February 2016, 08:45 AM | #168 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
Yeah, OK... Leaving families out of this you make sense. My two points: 1. What I have been trying to say, (obviously not very well) is that I DO NOT support the concept of the Feds having access to every IPhone or other device anywhere anytime, and that there must be some way, of granting them access to THIS phone without giving them the over-all skeleton key for any IPhone they desire. The technology is over my head, even though I am an Engineer in communications, but there has GOT to be some way to do it. Will it cost a lot of time and money? Probably, and Apple should charge accordingly. 2. Our elected Democracy has put in to place checks, balances and restrictions and requirements for tapping a phone or unlocking it or whatever. These are where a judge must be shown probable cause etc. (I am hardly a legal expert so will not embarrass myself but I DO know there are procedures and judges, sometimes panels of judges have to agree the cause is just to invade someone's privacy). Isn't this case, where innocent victims were slaughtered, a good cause to breach someone's privacy!?!?!? As long as the other requirements have been met, court order etc. If THIS is not a good enough reason to (after following the proper checks and balances and procedures) then what is!?!?! As to what they will find? I have no idea, but this was a terrorist attack where people were killed, it is worth every effort to ensure it was not part of a plan for future attacks. |
|
20 February 2016, 08:51 AM | #169 |
"TRF" Member
Join Date: Apr 2007
Location: Earth
Watch: 116610
Posts: 3,455
|
I am asking this as someone with no programming background. Hypothetically, if Apple were to devote a small group to modifying iOS for this phone under the close watch of the FBI or an outside law enforcement agency and once the software is modified and the information is obtained from the phone, all hardware and software related to this project is securely destroyed except for the phone.
I'm guessing I have over-simplified it but would that be feasible? Be gentle.
__________________
NEVER ARGUE WITH AN IDIOT. FIRST THEY WILL DRAG YOU DOWN TO THEIR LEVEL. THEN, THEY WILL BEAT YOU WITH EXPERIENCE. |
20 February 2016, 10:20 AM | #170 |
TRF Moderator & SubLV41 2024 Patron
Join Date: Oct 2005
Location: .
Watch: 126610LN
Posts: 35,510
|
Let's say it's possible for Apple to do it for just one phone.
What's to stop the government from hiring those who did it away from Apple. Then the Feds literally can run away with this info.
__________________
JJ |
20 February 2016, 11:09 AM | #171 | |
Banned
Join Date: Aug 2014
Location: Calumet Harbor
Watch: ing da Bears
Posts: 13,568
|
Quote:
The simple fact of the matter is that no US Government agency can be trusted to limit themselves to a one off. Someone within the organization will abuse the capability, innocent people will be irreparably harmed. And the USG will do a shoulder shrug and tell us the guilty federal employees will be reprimanded. This is a classic slippery slope. Once Apple is forced to provide the government this capability, it will cascade into tools that look deep into your personal life and assign you to risk groups based on key words and your relationship with others. Once in a high risk group, you will never get out. You won't have recourse to defend your good name and your life, work, and destiny will be shaped by a federal bureaucrat's opinion of stored data, without ever having been interviewed. |
|
20 February 2016, 11:38 AM | #172 |
"TRF" Member
Join Date: Nov 2015
Real Name: Milo
Location: Mojave Desert
Posts: 922
|
Did anyone else see that New York prosecuter who couldn't wait for the the back door. Said he had a whole box of apple phones he "needed" unlocked in case they held information he could use in criminal prosecutions?
U.S. agencies are already lining up to use the new toy they hope the court gives them. They already realize anything that what will open one will open them all. |
20 February 2016, 12:02 PM | #173 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
As for your second point, I don't want to cross that line of making this a political post but will say that the check and balances don't work 100% and There are abuses in just about every department. The Patriot Act has allowed certain agencies to forego the warrant typically needed for surveillance so I have very little faith that this would not be abused as well. |
|
20 February 2016, 12:14 PM | #174 |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
I'm not intelligent enough to give a definitive answer, but couldn't Apple change the security protocol so that whatever the Feds are given is useless after this change? I agree, it might be a major evolution, and cost lots, and also that Apple should charge the government lots for performing this procedure; I think they are entitled to it.
|
20 February 2016, 12:29 PM | #175 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
As for two, completely agree the checks and balances are not 100% and there are abuses, I am not Naieve enough to believe it is perfect. However, this is a terrorist attack where innocent people were gunned down and massacred worse then animals in a slaughter house, and POSSIBLY (granted, I have no idea nor probably does anyone else) there are plans for further attacks that will also kill innocent human beings. So, if EVER there was a time to use our system, WHAT MORE could you possibly want to justify a legalized investigation in to someone's IPhone!? Do more people need to die? We are not talking about a traffic ticket for speeding, people's lives MAY (I agree the phone could lead to nothing) save future innocent lives. Use our system for this massacre, fight the lesser battles where innocent people will not be brutally murdered. |
|
20 February 2016, 01:25 PM | #176 | |
Banned
Join Date: Aug 2014
Location: Calumet Harbor
Watch: ing da Bears
Posts: 13,568
|
Quote:
There will always be something to fear that the Government will use as an exploit to gain control over the people. These trying times are precisely the moment to be wary of government action. |
|
20 February 2016, 01:31 PM | #177 | |
Liar & Ratbag
Join Date: Nov 2009
Real Name: Renato
Location: NYC / Miami Beach
Watch: Rolex Daytona
Posts: 5,344
|
Quote:
Did you think about the possibility of another case popping up where the FBI again wants access to the phone the day after this new update is released? Did you you think about the time and cost of developing such a thing? This would fall under the unreasonably burdensome category of the court order not to mention the reasonable cost. I'm not in the industry but in the one I work in, if we had to fix something on the current model, that would be a delay in years |
|
20 February 2016, 02:45 PM | #178 | |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
Quote:
There is another attack and humans are slaughtered, and it could have been prevented by the information in this phone. GOD forbid it is any of your family or friends but even complete strangers, they are innocent people. What, will you tell the loved ones of those victims? "Well, we might have been able to thwart this terrible tragedy but it would have been costly and difficult and MIGHT have invaded someone's privacy so we didn't bother" ? I don't care if it was 2 1/2 months ago or 2 1/2 decades, this might contain information that will save innocent people, perhaps your friends or mine, from being murdered. That in itself dictates it must be attempted. Apple has held off granting the request until a court order (our system) compelled them to, I don't fault them for that, and I don't claim our system is perfect, but it is pretty darn good and until we democratically vote a change the best we have. For Apple to resist further is shameful, and tomorrow I am buying an android phone and tablet and throwing away my IPhone and IPad as my method of protest, just my Perogative. Oh, and I failed to answer a question you posed to me earlier... Can't even find it now but you asked if I would support the torturing of innocent people.... Something along those lines. My answer is of course not, and I submit that your saying the breaking of this phone will result in the torturing of innocent people is about as far fetched as my scenario that it will thwart a future attack, but the possibility is there and must be investigated. Possibly some of the contacts in the phone that are completely innocent will be inconvenienced, to the point of being interviewed by the FBI. I have personally experienced this. The hour or so of time and being placed in an uncomfortable situation is far from torture, and a small price to pay for safety and security in this great country of ours. |
|
20 February 2016, 02:50 PM | #179 |
Banned
Join Date: Jul 2008
Real Name: Paul
Location: San Diego
Watch: 126619LB
Posts: 21,540
|
And although I am passionate about this topic, (pretty obvious huh?) I want to take a moment here and thank the mods and all the participants of this thread for keeping it open. Everyone is entitled to an opinion, keeping it respectful and the mods understanding has made it quite an interesting one!
Thanks |
20 February 2016, 03:07 PM | #180 |
2024 SubLV41 Pledge Member
Join Date: Dec 2010
Real Name: PaulG
Location: Georgia
Posts: 42,024
|
I take no sides until the process has played out.
But I think the question hinges on a simpler premise by removing the technical aspects. If, instead of owning an iPhone, this guy had written all his contacts in some esoteric encrypted code. And he did it with a pen on plain paper. And you supplied that pen and paper. Would you be comfortable being ordered to stop and immediately crack the code because that guy had used a pen and paper that you supplied? Sent from my iPhone using Tapatalk
__________________
Does anyone really know what time it is? |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Display Modes | |
|
|
*Banners
Of The Month*
This space is provided to horological resources.