REAL WORLD EVENT DISCUSSIONS

Snooping v encryption, Apple v the FBI: Pointless publicity stunt

POSTED BY: SIGNYM
UPDATED: Friday, March 18, 2016 13:10
SHORT URL:
VIEWED: 1553
PAGE 1 of 1

Saturday, March 12, 2016 10:23 AM

SIGNYM

I believe in solving problems, not sharing them.


Apple's iPhone encrypts everything, including the password that you need to get in. IIRC, if you try the wrong password three times, the phone gets locked. It's a security feature against your phone getting lost and then hacked.

The FBI has the iPhone used by the shooter in San Bernadino, Syed Farook but claim they're unable to break the encryption without Apples' help.

http://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-sa
n-bernardino.html


The reality is that the FBI could break the phone today - in fact, they've probably already broken the phone. The reason why they engage is this charade is because they want a LEGAL program to break encryption on ANYONE's phone, not just this one.

And the reason why Apple's Tim Cook is engaging in this charade is because it gives them publicity that their phone's security system is unbreakable.

And where does Obama stand???

Ever the snoop and ever the destroyer of the Fourth Amendment, he wants Apple to comply.

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Sunday, March 13, 2016 11:56 AM

ELVISCHRIST


Apple says it *DOES NOT* have the ability to break its own encryption, and that's the part that virtually everybody is chafing at, unable to believe in the even the remotest possibility that any software company anywhere, ever, could *possibly* deliberately design an encryption algorithm that they themselves would be unable to break. Everybody builds in a back door, we're told, and it's become entrenched tribal knowledge that there's no such thing as unbreakable security. But what if Apple did it? What if they figured it out and really fucking actually *DID IT*?

Is it breakable? Sure, at some point. Put all of the NSA's supercomputers on it at the same time and brute-force the fucker, and you could probably break it in a few billion tries. But Apple screwed them there, too - if you try and fail ten times, the phone wipes itself clean, and all the data is irrevocably lost.

Here are some pertinent questions:

1) Has Apple been guaranteed a blanket immunity if they put their hands on this phone and it gets wiped? In other words, if they try to break its encryption and fail, are they going to be held up on destruction of evidence or obstruction of justice charges? If that's even a possibility, I'd tell the DOJ to fuck off.

2) Is there a possibility to crack *THIS* phone, just this individual one, that doesn't also give the NSA/DOJ/CIA/FBI and every other alphabet-soup gang of goons access to every similar phone on the planet? If there isn't, then they can fuck off.

3) Why hasn't the FBI just called Anonymous or Edward Snowden? ;) After all, they were able to get "secure" information out of supposedly unhackable systems many, many times in the past.

This is once again government overreach, just like torture was, and they're trying to sell us on their line of bullshit by telling us that there's a metaphorical ticking time tomb in downtown Los Angeles, or some similar line of crap. Is there information on the phone that might be useful? Maybe. Will forcing Apple to hand over the key - if it even possesses such a thing or the ability to invent such a thing - put everybody else's private data at risk? Definitely.

I'll take the certainty over the possibility on this one, and err on the side of privacy.

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Sunday, March 13, 2016 5:03 PM

1KIKI

Goodbye, kind world (George Monbiot) - In common with all those generations which have contemplated catastrophe, we appear to be incapable of understanding what confronts us.


As an aside, McAfee (whose name should be familiar to everyone), recently made a number of statements about the government's requests. What he said was that the government doesn't need Apple's help to get the data at all. It can download everything there is. The problem is is that it's in an encrypted state. And what he said was that the government has enough decryption software and computers with enough horsepower that they will crack the data, given time.

So, as he claimed, the government isn't asking for - and being denied - something it must have. At most, Apple's cooperation will make getting the data a faster and easier process.

Unfortunately I didn't save the article, and those older statements have been overwhelmed in google by more recent statements where he offered the services of his company to decrypt the data.

But, if his statements are true - and based on my experience they are - then this big demand by the FBI about those particular files is simply a smokescreen to gain the power to spy on us all - even more than they already do, that is.




SAGAN: We are releasing vast quantities of carbon dioxide, increasing the greenhouse effect. It may not take much to destabilize the Earth's climate, to convert this heaven, our only home in the cosmos, into a kind of hell.

NOTIFY: N   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 14, 2016 1:26 AM

SHINYGOODGUY


So, his Obamaness is at it again. Why doesn't the president just go ahead and name himself King already. Now he's violating the Constitution's 4th Amendment..........

Remind me again what exactly are we talking about.

Sure, here you go: 4th Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

How dare he unreasonably search and seize my phone without probable cause. Hell all
I did was kill a bunch of innocent people, without provocation or uncouth behavior toward my person. How dare he try to violate my rights after I lawfully purchased a
bunch of guns and ammo to lawfully kill those innocent people. Hooray for Apple for protecting my criminal rights as a US citizen pursuing my happiness to shoot people
for no reason (other than to fulfill my lust for blood and destruction). After all, it is the American way. The dirty coppers have nothing on me.


SGG


Quote:

Originally posted by SIGNYM:
Apple's iPhone encrypts everything, including the password that you need to get in. IIRC, if you try the wrong password three times, the phone gets locked. It's a security feature against your phone getting lost and then hacked.

The FBI has the iPhone used by the shooter in San Bernadino, Syed Farook but claim they're unable to break the encryption without Apples' help.

http://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-sa
n-bernardino.html


The reality is that the FBI could break the phone today - in fact, they've probably already broken the phone. The reason why they engage is this charade is because they want a LEGAL program to break encryption on ANYONE's phone, not just this one.

And the reason why Apple's Tim Cook is engaging in this charade is because it gives them publicity that their phone's security system is unbreakable.

And where does Obama stand???

Ever the snoop and ever the destroyer of the Fourth Amendment, he wants Apple to comply.


NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 14, 2016 2:15 AM

SHINYGOODGUY


1- Apple have been asked, as manufacturers and producers of the IPhone, to cooperate with the Feds to see if the San Bernadino shooters had any relevant data as to further criminal activity. They are not suspects, so I don't see them being charged with obstruction of justice. I would imagine that the Feds will pursue this in court and use the law to try and force them to cooperate; although obstruction of justice consists of..............

"any attempt to hinder the discovery, apprehension, conviction or punishment of anyone who has committed a crime."

The question is: Has Apple hindered law enforcement from discovery? (there was a crime committed).

2. The cracking of "one" phone that may have been used in the commission of a crime
is the issue; although Apple insists that cracking that particular phone could lead to wide scale abuse via hacking. Privacy is the issue, unreasonable search and seizure (4th Amendment). Well, I look at it this way: What can be more personal and private than one's own DNA. Is it unreasonable to ask that one submit their most inner private combination lock to the police? Should one presume the right to privacy when it comes to aborting a fetus? Or one's DNA? Does the government, or anyone, have the right to deny you medical assistance? Should they have the right to send you to war against your will and better judgment? Would that be considered
government overreach? If you're not a Christian, does anyone have the right to stop
a woman from getting an abortion? Should a minority of people have sway over the general public at large? Those are the issues, and this privacy thing is not an absolute - just like the 2nd Amendment.

3. If they were to "cooperate" with the Feds, they would be violating the very thing they've protested against. The right to absolute privacy, regardless of the circumstances. If someone murdered my family and crazily decided to film it on their IPhone, complete with a confession, damn straight I want the law to crack that sucker and punish the guilty. Otherwise, fuck it I'll do the same. Buy an IPhone and murder the SOB and post it on Instagram.

The thing is that they could have their mother's apple pie recipe on that phone for all we know, but what are the odds of that. It may turn out to be nothing. Bottom line: they committed a heinous crime and violated human beings riddling them with
bullet holes. Do criminals, who violate the public trust and peaceful coexistence
of their neighbors, deserve the same protection of our freedoms as those that obey
the law and preserve the peace?


SGG


Quote:

Originally posted by ElvisChrist:
Apple says it *DOES NOT* have the ability to break its own encryption, and that's the part that virtually everybody is chafing at, unable to believe in the even the remotest possibility that any software company anywhere, ever, could *possibly* deliberately design an encryption algorithm that they themselves would be unable to break. Everybody builds in a back door, we're told, and it's become entrenched tribal knowledge that there's no such thing as unbreakable security. But what if Apple did it? What if they figured it out and really fucking actually *DID IT*?

Is it breakable? Sure, at some point. Put all of the NSA's supercomputers on it at the same time and brute-force the fucker, and you could probably break it in a few billion tries. But Apple screwed them there, too - if you try and fail ten times, the phone wipes itself clean, and all the data is irrevocably lost.

Here are some pertinent questions:

1) Has Apple been guaranteed a blanket immunity if they put their hands on this phone and it gets wiped? In other words, if they try to break its encryption and fail, are they going to be held up on destruction of evidence or obstruction of justice charges? If that's even a possibility, I'd tell the DOJ to fuck off.

2) Is there a possibility to crack *THIS* phone, just this individual one, that doesn't also give the NSA/DOJ/CIA/FBI and every other alphabet-soup gang of goons access to every similar phone on the planet? If there isn't, then they can fuck off.

3) Why hasn't the FBI just called Anonymous or Edward Snowden? ;) After all, they were able to get "secure" information out of supposedly unhackable systems many, many times in the past.

This is once again government overreach, just like torture was, and they're trying to sell us on their line of bullshit by telling us that there's a metaphorical ticking time tomb in downtown Los Angeles, or some similar line of crap. Is there information on the phone that might be useful? Maybe. Will forcing Apple to hand over the key - if it even possesses such a thing or the ability to invent such a thing - put everybody else's private data at risk? Definitely.

I'll take the certainty over the possibility on this one, and err on the side of privacy.


NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 14, 2016 11:38 AM

SIGNYM

I believe in solving problems, not sharing them.


SGG, you're misreading the situation.

I'm sure the FBI has a warrant for Farook's phone, and therefore they have every right to search it.

If the FBI were to hand over the phone to Apple or some other technical expert, and that technical expert were to then et viola! hand back the unlocked phone, or to reproduce the data within it, even if encrypted, that would be one thing.

But what the FBI is doing is asking Apple to create software that can unlock EVERY phone.

That does three things:

1) It gives the FBI the capability - the tools needed- to unlock any phone in the future, and
2) It sets a precedent that would force any security expert to cooperate with the FBI in providing broad generalized tools for snooping, and
3) It makes it all legal.

------------

By analogy, this would be like a lockmaker who makes an unbreakable lock. There is a safe with something inside that investigators would like to see. It would be one thing to ask the lockmaker to open THIS lock, another entirely to require the lockmaker to create a tool that could open ANY lock.

-----------------
There has been a fight going on for literally decades that hasn't come up to surface, except for technical experts who watch this closely, and that is the fight between strong encryption and weak encryption.

This fight goes back to before 2000. Some if it surfaces with the discovery of a variable in Microsoft's operating system. Please read this part carefully:

Quote:

It was already known that Microsoft used two keys, a primary and a spare, either of which can create valid signatures. Microsoft had failed to remove the debugging symbols in ADVAPI32.DLL, a security and encryption driver, when it released Service Pack 5 for Windows NT 4.0, and Andrew Fernandes, chief scientist with Cryptonym, found the primary key stored in the variable _KEY and the second key was labeled _NSAKEY. ... In addition, Dr. Nicko van Someren found a third key in Windows 2000, which he doubted had a legitimate purpose, and declared that "It looks more fishy".
https://en.wikipedia.org/wiki/NSAKEY

The "keys" are what provides the information by which the data on the operating system can be decrypted.

In this case, the first key was for the user.
The second key was most likely for the NSA, as labeled.
The third key could allow Microsoft to snoop on your computer every time you were online to - among other things- look for illegal copies of software.

Since then, when Microsoft bent over for the NSA and built in a backdoor for the government (and received protection against prosecution for its monopolistic behavior), computer manufacturers and software writers have been much more careful about providing strong protection, and with good reason- given the number of servers and devices that are being hacked today. A person might wish to have strong protection on their devices, not to thwart investigators but to thwart hackers, who are getting smarter and smarter on getting into banks, the IRS, hospital servers (thanks, Microsoft, for making such a crappy OS!) and YOUR PHONE.

-----

BTW-
I'm firmly convinced that one of the reasons why Microsoft was allowed to behave in an illegal monopolistic fashion by the so-called Justice Department was because the government had a deal with MS, and the NSA found it far more convenient to deal with a field of home computers, all of which had a backdoor built in.

MS was brought to trial for its monopolistic behavior (of which there was evidence a-plenty) The Justice Department was seeking only to peel Explorer from the rest of the OS, and at one point, Judge Penfield Jackson wound up arguing with the Prosecutor that the penalties should be mush stiffer. He ultimately ruled that MS should be broken up, which obviously never happened. If you want to read more about the trial, go here: http://www.nytimes.com/2013/06/16/us/thomas-penfield-jackson-outspoken
-judge-dies-at-76.html?_r=0
. I was following the trial rather closely so I remember this quite well.




--------------
You can't build a nation with bombs. You can't create a society with guns.

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 14, 2016 2:35 PM

1KIKI

Goodbye, kind world (George Monbiot) - In common with all those generations which have contemplated catastrophe, we appear to be incapable of understanding what confronts us.


SGG

According to McAfee the FBI can both download and decrypt the information without Apple's help. It'll just take them longer.

They don't need generalized tools (that can be used on anyone at any time) to crack this one phone.

So, why are they asking for them?




SAGAN: We are releasing vast quantities of carbon dioxide, increasing the greenhouse effect. It may not take much to destabilize the Earth's climate, to convert this heaven, our only home in the cosmos, into a kind of hell.

NOTIFY: N   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Monday, March 14, 2016 5:58 PM

1KIKI

Goodbye, kind world (George Monbiot) - In common with all those generations which have contemplated catastrophe, we appear to be incapable of understanding what confronts us.


So, speaking of systems vulnerable to hacking:

http://www.scientificcomputing.com/news/2016/03/nations-ranked-vulnera
bility-cyberattack?et_cid=5172016&et_rid=366206770&type=headline&et_cid=5172016&et_rid=366206770&linkid=http%3a%2f%2fwww.scientificcomputing.com%2fnews%2f2016%2f03%2fnations-ranked-vulnerability-cyberattack%3fet_cid%3d5172016%26et_rid%3d%%subscriberid%%%26type%3dheadline


Data-mining experts from the University of Maryland and Virginia Tech recently co-authored a book that ranked the vulnerability of 44 nations to cyberattacks.

The United States ranked 11th safest, while several Scandinavian countries (Denmark, Norway and Finland) ranked the safest. China, India, Russia, Saudi Arabia and South Korea ranked among the most vulnerable.




SAGAN: We are releasing vast quantities of carbon dioxide, increasing the greenhouse effect. It may not take much to destabilize the Earth's climate, to convert this heaven, our only home in the cosmos, into a kind of hell.

NOTIFY: N   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

Friday, March 18, 2016 1:10 PM

ELVISCHRIST




Here's an irony at the heart of this whole thing:

1) The government *INSISTS* that Apple is lying, that it totally has the ability to break its encryption, because let's face it, *NOTHING* is ever really secure when it comes to software, right?

2) That same government then insists that it *WILL NOT* misuse this ability if Apple gives it to them, that it is impossible that it could ever be misused, because let's face it, it's going to be kept completely secure by the government.

Those things are not mutually possible. You can't claim that there's no perfect security and then claim to have it. On the scale of events, we know for a fact that government databases are routinely cracked and hacked, though. If the government were to ever get this key, it would not remain secure for long at all, that's guaranteed.

NOTIFY: Y   |  REPLY  |  REPLY WITH QUOTE  |  TOP  |  HOME  

YOUR OPTIONS

NEW POSTS TODAY

USERPOST DATE

OTHER TOPICS

DISCUSSIONS
Elections; 2024
Wed, December 4, 2024 13:42 - 4886 posts
In the garden, and RAIN!!! (2)
Wed, December 4, 2024 13:16 - 4813 posts
Is Elon Musk Nuts?
Wed, December 4, 2024 12:37 - 427 posts
Pardon all J6 Political Prisoners on Day One
Wed, December 4, 2024 12:31 - 7 posts
Russia Invades Ukraine. Again
Wed, December 4, 2024 07:25 - 7538 posts
My Smartphone Was Ruining My Life. So I Quit. And you can, too.
Wed, December 4, 2024 06:10 - 3 posts
Thread of Trump Appointments / Other Changes of Scenery...
Tue, December 3, 2024 23:31 - 54 posts
Vox: Are progressive groups sinking Democrats' electoral chances?
Tue, December 3, 2024 21:37 - 1 posts
human actions, global climate change, global human solutions
Tue, December 3, 2024 20:35 - 962 posts
Trump is a moron
Tue, December 3, 2024 20:16 - 13 posts
A thread for Democrats Only
Tue, December 3, 2024 11:39 - 6941 posts
You can't take the sky from me, a tribute to Firefly
Mon, December 2, 2024 21:22 - 302 posts

FFF.NET SOCIAL