Started By
Message

re: Apple acts all high and mighty.. Won't turn over password to terrorists iPhone

Posted on 2/17/16 at 8:48 am to
Posted by CAD703X
Liberty Island
Member since Jul 2008
78086 posts
Posted on 2/17/16 at 8:48 am to
quote:

Because the encryption key used is unique and generated for that device by that device. The iPhone won't let a computer
does the phone boot up? If it does I guarantee you with 100% certainty Apple can unlock access or change the password using the right software no matter how much you want to believe your phone is magic.
This post was edited on 2/17/16 at 8:50 am
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 2/17/16 at 8:48 am to
quote:

jeff5891


It sounded right in my head. I'll leave it for posterity.
Posted by jeff5891
Member since Aug 2011
15761 posts
Posted on 2/17/16 at 8:50 am to
quote:

because... They said so?
well the government can file a suit if they think apple does, and then search their documents in discovery.

But would a judge allow that without some proof that apple might have access already, probably not.
This post was edited on 2/17/16 at 8:53 am
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 2/17/16 at 8:51 am to
From @SwiftonSecuirty:

quote:

It's believed, based on our understanding of iPhone 5s+ hardware, the FBI's request is not possible on them. Only iPhone 5c.


I trust him/her knowledge on infosec way more than i trust yours.
Posted by MrSmith
Member since Sep 2009
8311 posts
Posted on 2/17/16 at 8:53 am to
quote:

If it does I guarantee you with 100% certainty Apple can unlock access or change the password using the right software
Do you know what 100% certainty means? READ THIS. Please
Encryption key is created on the fly. You can load up xCode and view it for yourself. That part is 100% fact.
This post was edited on 2/17/16 at 8:55 am
Posted by usc6158
Member since Feb 2008
35351 posts
Posted on 2/17/16 at 8:54 am to
quote:

because... They said so?



It's stored in the Secure Enclave on the phone, which is part of the hardware walled off from the rest of hardware and software. All the OS ever sees is whether the key has been accepted or rejected. Apple never sees the key for the phone.

Posted by jeff5891
Member since Aug 2011
15761 posts
Posted on 2/17/16 at 8:54 am to
This post was edited on 2/17/16 at 8:57 am
Posted by crimsonsaint
Member since Nov 2009
37250 posts
Posted on 2/17/16 at 8:57 am to
quote:

frick you Tim Cook


frick you.

I hope Apple stands their ground.
Posted by AndyCBR
Baton Rouge, LA
Member since Nov 2012
7547 posts
Posted on 2/17/16 at 8:58 am to
Guys, save your time. This is the same guy who started a thread extolling the virtues of buying recapped tires.

Now, he claims to have expertise in encryption but doesn't even understand how the lock screen works.

This is either one of the better trolls on this site or a shocking rebuke of the intelligence of IT professionals.

BTW, Apple can do anything they want by building a custom OS. They don't want to build one that can be hacked easier. That is the point.

What doesn't the FBI know about these people? They know where the guns came from. They know where the money trail leads. They know where they lived and where they were born and where they traveled. I thought the NSA was hovering up all of this metadata? What is on the guys old work phone that they need to know? He crushed and burned his personal phone.
Posted by TigerBait1127
Houston
Member since Jun 2005
47336 posts
Posted on 2/17/16 at 9:01 am to
quote:

So let me get this straight:

Apple is publicly announcing today that terrorists and other criminals can step up their game if they go ios instead of Windows?


You are so dumb
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 2/17/16 at 9:04 am to
apple cant crack the encryption. it doesnt work that way. what they are asking of them is to disable the self destruct feature so the FBI can attempt to guess the passcode via brute force.

while terrorist suck, i can promise you the last thing all of you want is this precedent to be set.
Posted by lsu480
Downtown Scottsdale
Member since Oct 2007
92876 posts
Posted on 2/17/16 at 9:09 am to
Why don't they just use the dead talibans thumbprint?
Posted by TigerBait1127
Houston
Member since Jun 2005
47336 posts
Posted on 2/17/16 at 9:10 am to
quote:

So, the FBI can ransack their home or hideout for any information hidden there, but they aren't allowed to search the phone?

Seems like the search warrant theory would apply to this also.

This is dumb.


Yes, your post is very dumb.
Posted by MrSmith
Member since Sep 2009
8311 posts
Posted on 2/17/16 at 9:11 am to
quote:

Yes, your post is very dumb.
There's no way he even read the article
Posted by Old Hellen Yeller
New Orleans
Member since Jan 2014
9417 posts
Posted on 2/17/16 at 9:12 am to
quote:

Why don't they just use the dead talibans thumbprint?


Because they'd rather have a backdoor to open all iPhones.
Posted by TigerBait1127
Houston
Member since Jun 2005
47336 posts
Posted on 2/17/16 at 9:19 am to
For those posting from a work computer

Check out Spector 360 software
Posted by TigerRob20
Baton Rouge
Member since Nov 2008
3732 posts
Posted on 2/17/16 at 9:20 am to
quote:

Because they'd rather have a backdoor to open all iPhones.




Even if Apple did agree to create an iOS version with a backdoor, it would do no good in this case. How the eff is the FBI going to install an update without the passcode or erasing the phone?



CAD has to be trolling at this point. This thread did not go as he planned (or did it?)
This post was edited on 2/17/16 at 9:21 am
Posted by MrSmith
Member since Sep 2009
8311 posts
Posted on 2/17/16 at 9:21 am to
quote:

CAD has to be trolling at this point.
I think so as well
Posted by StrongBackWeakMind
Member since May 2014
22650 posts
Posted on 2/17/16 at 9:24 am to
The ole "I got my arse kicked in the debate so I'll play it off like I was trolling" strategy.
Posted by gmrkr5
NC
Member since Jul 2009
14891 posts
Posted on 2/17/16 at 9:26 am to
quote:

For those posting from a work computer

Check out Spector 360 software


how is this relevant?
first pageprev pagePage 7 of 9Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram