It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

The NSA Is Still Looking for a Way to Capture iMessages and FaceTime

page: 1
3

log in

join
share:

posted on Jun, 17 2013 @ 11:04 AM
link   
I guess us iphone and apple users have something to celebrate:



In its second official statement on the matter, Apple has clarified its relationship with the U.S. government claiming that at least FaceTime and iMessages are safe from the National Security Agency's prying eyes, due to super-encryption. "Conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them," says Apple. "Apple cannot decrypt that data." We've known that this very security has angered the NSA since before these latest leaks. In a 2011 testimony before Congress, the FBI's general counsel called this problem "going dark:"


So take THAT, android users!!!


news.yahoo.com...



posted on Jun, 17 2013 @ 11:10 AM
link   
reply to post by HomerinNC
 


Android doesn't have native video/messaging software. you have to use 3rd party software, as such, there are various secure apps that are not available to IOS users with end to end encryption for messaging and video chat.

So take that applefanboys


Be clear though, not being able to decrypt the message content is one thing, they are still aware of the contact, just not the content, keeping in line with their BS about metadata.

Besides, imessage also uses SMS and those aren't encrypted, only imessage to imessage is encrypted.



posted on Jun, 17 2013 @ 11:14 AM
link   
reply to post by phishyblankwaters
 





Android doesn't have native video/messaging software. you have to use 3rd party software, as such, there are various secure apps that are not available to IOS users with end to end encryption for messaging and video chat.


Secure apps that can still be tapped into by the NSA



posted on Jun, 17 2013 @ 11:40 AM
link   
reply to post by HomerinNC
 


Good sh to know...'cos I've been setting up meetings with my Ganja dealer through imessage.

He will be happy to know ours is a secure line.



posted on Jun, 17 2013 @ 12:02 PM
link   
reply to post by HomerinNC
 





Secure apps that can still be tapped into by the NSA


Umm, no, because they offer end to end encryption just like imessage to imessage and facetime, that would be why the US has on a few occasions attempted to enforce a single type of encryption giving the NSA the key.
edit on 17-6-2013 by phishyblankwaters because: (no reason given)



posted on Jun, 17 2013 @ 12:08 PM
link   
Apple will just patch the programs with something that reveals the keys if you have a specific NSA key to unlock the keys when you start the connection link (handshaking keys etc) so they'd need to capture the entire stream but they'd be able to decode it and replay it later but without the NSA key it would still be as encrypted as ever

But i wonder if two 15 year olds were using facetime to flash their bits to each other would the NSA operative have to resign for viewing child porn?



posted on Jun, 17 2013 @ 02:43 PM
link   
reply to post by HomerinNC
 


I wouldn't believe that 'statement' for all the tea in China !!

Apple and NSA are PARTNERS in the whole deal


Of course the NSA can 'see' everything. They have technology that dwarfs even the best 'public' technologies.

Assume the opposite is the truth on this one.



posted on Jun, 17 2013 @ 02:48 PM
link   

Originally posted by xuenchen
reply to post by HomerinNC
 


I wouldn't believe that 'statement' for all the tea in China !!

Apple and NSA are PARTNERS in the whole deal


Of course the NSA can 'see' everything. They have technology that dwarfs even the best 'public' technologies.

Assume the opposite is the truth on this one.


Seems like a failed attempt at reverse psychology to me


I recall a discussion about a particular Drug enforcement agency, not sure which, subtly let slip that they were unable to tap phone conversation using x,y,z carrier and as a result they noticed a huge switch over occurred and this group was able to effectively identify criminals.

I cannot verify the veracity of the above anecdote, but it seems well within the scope of behavior for some law enforcement.




edit on 17-6-2013 by MDDoxs because: (no reason given)



posted on Jun, 18 2013 @ 09:19 AM
link   
Oh yes, I'm quite certain that Apple's encryption is completely beyond the NSA's ability to decrypt....


However, it may mean these communications aren't as casually scanned, and only when an individual is targeted.




top topics



 
3

log in

join