Page 2 of 7 FirstFirst 123456 ... LastLast
Results 16 to 30 of 103

Thread: Apple Govt. mandate

  1. #16
    Join Date
    Apr 2009
    Location
    fayetteville Arkansas
    Posts
    634
    Guess I'm thinking to simple here but why can't Apple open the phone, extract the all the data and had it over to the FBI. No need for the software to leave Apple. There is an article out today that Apple has already done this in 70 other cases working with different law enforcement entities.

  2. #17
    Join Date
    Sep 2013
    Location
    Carrollton, Georgia
    Posts
    1,815
    In order to create the software to de-encrypt the phone there must be some proprietary knowledge or else any hacker would be able to write the software. If Apple trusts whomever is safeguarding this proprietary knowledge they should trust them to safeguard the de-encryption software. I don't understand this debate.

  3. #18
    Join Date
    May 2008
    Location
    near San Diego: unincorporated section of county
    Posts
    764
    Good hackers (those with enough resources, i.e. money, behind them) have methods of trying to break into security devices that the average person would never imagine. Before I retired, I used to work on security chips, my job was to anticipate these attacks, and defend against them at the hardware level that software could not override. Without knowing anything about the iPhone, I suspect that it has pretty sophisticated "side channel attack" defenses. Nothing is really secure, you just try to make the cost of hacking the system too high to be profitable (admittedly that applies more to stealing banking info than to national security)

  4. #19
    Join Date
    Nov 2007
    Location
    Glenelg, MD
    Posts
    12,256
    Blog Entries
    1
    Quote Originally Posted by Ken Fitzgerald View Post
    Correct me Jerome if I'm wrong. Typically don't you have to turn the phone on and get past the password to authorize downloads or updates?
    Apple can force updates, if it so chooses...
    Hi-Tec Designs, LLC -- Owner (and self-proclaimed LED guru )

    Trotec 80W Speedy 300 laser w/everything
    CAMaster Stinger CNC (25" x 36" x 5")
    USCutter 24" LaserPoint Vinyl Cutter
    Jet JWBS-18QT-3 18", 3HP bandsaw
    Robust Beauty 25"x52" wood lathe w/everything
    Jet BD-920W 9"x20" metal lathe
    Delta 18-900L 18" drill press

    Flame Polisher (ooooh, FIRE!)
    Freeware: InkScape, Paint.NET, DoubleCAD XT
    Paidware: Wacom Intuos4 (Large), CorelDRAW X5

  5. #20
    Join Date
    Aug 2010
    Location
    USA
    Posts
    5,582
    Apple should not, ever, cooperate with this request. It is a huge Pandora's box with no upside. The FBI should be able to solve this on their own and, I fully expect they can and will. In the meantime, the politician's will make a mess of things, as usual, because they have election agenda's, not national security, as their primary focus. Please close this thread

  6. #21
    Join Date
    Sep 2009
    Location
    Medina Ohio
    Posts
    4,547
    Quote Originally Posted by Pat Barry View Post
    Apple should not, ever, cooperate with this request. It is a huge Pandora's box with no upside. The FBI should be able to solve this on their own and, I fully expect they can and will. In the meantime, the politician's will make a mess of things, as usual, because they have election agenda's, not national security, as their primary focus. Please close this thread
    If there is information on it that could stop another attack it is worth it. What would you say if one of your loved ones ended up dead and then you found out that it could have been stopped if they had cracked the phone.

  7. #22
    Quote Originally Posted by Pat Barry View Post
    Apple should not, ever, cooperate with this request. It is a huge Pandora's box with no upside. The FBI should be able to solve this on their own and, I fully expect they can and will. In the meantime, the politician's will make a mess of things, as usual, because they have election agenda's, not national security, as their primary focus. Please close this thread
    If Apple can access the data on that phone, other people can also (meaning a determined hacker or a foreign government). If Apple refuses to hack the phone, but announces that they COULD hack it (which I think they did), other entities will search for ways to access data on iPhones. I would not be surprised if the NSA can already hack an iPhone.

    Mike
    Go into the world and do well. But more importantly, go into the world and do good.

  8. #23
    Join Date
    Jan 2004
    Location
    Lewiston, Idaho
    Posts
    28,598
    Quote Originally Posted by Dan Hintz View Post
    Apple can force updates, if it so chooses...
    If that is the case, and I don't doubt it, shouldn't we be scared of Apple misusing this capability?

    It's a complex issue. Few things are as simple, as black and white, as most people would like to believe. There are REASONABLE solutions but people have to want a solution rather than standing their ground on what they see as morale high ground or beliefs brought on by paranoia.
    Ken

    So much to learn, so little time.....

  9. #24
    Quote Originally Posted by julian abram View Post
    Guess I'm thinking to simple here but why can't Apple open the phone, extract the all the data and had it over to the FBI. No need for the software to leave Apple. There is an article out today that Apple has already done this in 70 other cases working with different law enforcement entities.
    Because this isn't what the govt wants. I'm sure they'd refuse to just hand the phone over to Apple because of national security issues. If Apple does this they'll need to destroy the phone. The govt will reverse engineer the procedure and have their way into all new Apple phones.

  10. #25
    Join Date
    Nov 2015
    Location
    North Florida
    Posts
    22
    Seems like there are two questions. First, should cell phone records have special privacy protections than other forms of documents. I don't think so. Second question is whether it might affect Apple's business, and that seems like a much lower priority than investigating potential ties to terrorism.

  11. #26
    Join Date
    Apr 2013
    Location
    Cedar Park, TX (NW Austin)
    Posts
    579
    And what leverage would the US have if it were a Samsung phone, a South Korean company? The funny thing they don't even know if any valuable info is on the phone. My guess is no. If there was I would have thought they would have destroyed before the attack.

  12. #27
    Join Date
    Jul 2007
    Location
    NE OH
    Posts
    2,637
    You do to update firmware in the normal way....presumably with physical access to the phone there are alternative ways to install firmware, such as would be done during manufacturing.

  13. #28
    Secret Memo Details U.S.’s Broader Strategy to Crack Phones

    http://www.bloomberg.com/news/articl...o-crack-phones

  14. #29
    Join Date
    Jan 2004
    Location
    Lewiston, Idaho
    Posts
    28,598
    ....and it turns out it wasn't the shooter's personal phone but one issued to him by his San Bernardino County employer. So, is anything on that phone the shooter's "private or personal" data or does it belong to the owner of the phone...the county government agency?


    It's complex.
    Last edited by Ken Fitzgerald; 02-19-2016 at 7:35 PM.
    Ken

    So much to learn, so little time.....

  15. #30
    Who has the password? They are essentially the guardian of the information.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •