It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: netbound
Why can’t Apple determine the password for this particular phone and then provide it to the FBI, rather than writing code to get around the login/auto-wipe features? Or, why can’t Apple gain access to the phone, do a complete data dump and provide the dump file to the FBI?
Google, the other tech behemoth that has promised to make encryption, security, and privacy a priority—but has stalled in implementing unbreakable encryption on its services by default—was notably silent for most of the day. But then Google CEO Sundar Pichai expressed his support in a series of tweets: “Important post by @tim_cook,” he wrote.
originally posted by: MystikMushroom
It's all theater and drama folks, nothing more.
originally posted by: Zcustosmorum
a reply to: Stevemagegod
Interesting piece from The Intercept which mentions Google also, not sure how much business they'll lose if encrytpion is outlawed but not everyone can live with their head in the sand:
originally posted by: MystikMushroom
Let's not forget that the regular police can crack into an iPhone if they want anyway. If you're arrested and your phone taken away, it's almost 100% certain your phone is going to be plugged into a police station computer and its contents downloaded and analyzed.
So, IMO this whole thing is nothing more than a psyop from Apple OR the FBI to judge public opinion and see what/how people think about backdoors for national security/law enforcement. Apple might want to see how their customers react by releasing the letter...the FBI might have asked Apple to do it so they can also see how people will respond.
In any case, the NSA can crack/hack anything they want and all electronic communication is slurped up by them anyway. If they wanted it, they can have it. This is such a big load of BS.
originally posted by: MystikMushroom
Let's not forget that the regular police can crack into an iPhone if they want anyway. If you're arrested and your phone taken away, it's almost 100% certain your phone is going to be plugged into a police station computer and its contents downloaded and analyzed.
They can crack SIM cards, social media passwords, get all your SMS text messages, phone logs, contacts, pictures ... everything. When and *IF* you get your phone back, it may magically be "water damaged" to hide the fact that all your data was stolen and copied to a police computer.
I've seen it happen with my own two eyes.
So, IMO this whole thing is nothing more than a psyop from Apple OR the FBI to judge public opinion and see what/how people think about backdoors for national security/law enforcement. Apple might want to see how their customers react by releasing the letter...the FBI might have asked Apple to do it so they can also see how people will respond.
In any case, the NSA can crack/hack anything they want and all electronic communication is slurped up by them anyway. If they wanted it, they can have it. This is such a big load of BS.
It's all theater and drama folks, nothing more.
originally posted by: Bedlam
(scratches head) Grant you, I haven't taken an iPhone apart. But the data is likely on a component you can dismount, or it's in the SIM. Either way, you should be able to make copies of it.
And there's only 100,000 passcodes, even if you brute force it, so, knowing how the encryption algorithm works, you should be able to take the contents of storage, have a program on a big desktop iterate through the passcodes and find the key.
originally posted by: Bedlam
(scratches head) Grant you, I haven't taken an iPhone apart. But the data is likely on a component you can dismount, or it's in the SIM. Either way, you should be able to make copies of it.
And there's only 100,000 passcodes, even if you brute force it, so, knowing how the encryption algorithm works, you should be able to take the contents of storage, have a program on a big desktop iterate through the passcodes and find the key.
originally posted by: jhn7537
originally posted by: Bedlam
(scratches head) Grant you, I haven't taken an iPhone apart. But the data is likely on a component you can dismount, or it's in the SIM. Either way, you should be able to make copies of it.
And there's only 100,000 passcodes, even if you brute force it, so, knowing how the encryption algorithm works, you should be able to take the contents of storage, have a program on a big desktop iterate through the passcodes and find the key.
If I'm not mistaken, I believe the phone gets wiped back to factory reset automatically if there's more than 10 failed password attempts... So, would it be possible to brute force it, or is there some work around to test those pass codes without it going against the actual phone device?
Google's chief executive sided with rival Apple on Wednesday in its battle with a judge who ordered it to help the FBI access information on the encrypted iPhone used by one of the San Bernardino shooters.
Caught red-handed last year making petabytes of personal data available to the U.S. intelligence community through the PRISM program, Google nevertheless continues to coast on the goodwill generated by its “don’t be evil” doublespeak.