Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Apple Says 'No'

Apple Says 'No'

Scheduled Pinned Locked Moved The Lounge
ioscomhelp
62 Posts 36 Posters 1 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • OriginalGriffO OriginalGriff

    If such a tool existed - and I was a Serious Criminal - I'd be prepared to spend BIG money in terms of bribes to the appropriate Apple employee(s) to get a copy of the source. How many people here would turn down - say - ten years salary in a Swiss bank account? The criminals could get that back in a day...

    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

    K Offline
    K Offline
    Kevin Marois
    wrote on last edited by
    #14

    Having been a developer for 30+ years, I can't sit here and believe that Apple doesn't already have a way to open a phone. Have you ever written encryption without a way to unlock it? How would you test it without an unlocking mechanism? It already exists - Apple just doesn't want to give it up.

    If it's not broken, fix it until it is

    D 1 Reply Last reply
    0
    • D Duncan Edwards Jones

      This section seems a bit strange:-

      Quote:

      Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession.

      If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption? Also - wouldn't doing that utterly corrupt the chain of evidence meaning anything discovered could not possibly be used in a civilian court of law?

      K Offline
      K Offline
      Kevin Marois
      wrote on last edited by
      #15

      No Yes

      If it's not broken, fix it until it is

      1 Reply Last reply
      0
      • K Kevin Marois

        I don't know. It's hard to decide what the right balance is. While I believe that each of us has a right to our privacy, the good of the many outweighs the good of the one.

        If it's not broken, fix it until it is

        G Offline
        G Offline
        GStrad
        wrote on last edited by
        #16

        Quote:

        the good of the many outweighs the good of the one.

        On this I agree, but I am not convinced that setting a precedent which allows the unlocking of phones and possibly reducing the security of many other users to do it represents the many over the few.

        1 Reply Last reply
        0
        • C Chris Maunder

          GStrad wrote:

          once they open pandora's box they can't close it

          Yes they can. Lots and lots of legal decisions - both good and bad - get overturned every day.

          cheers Chris Maunder

          G Offline
          G Offline
          GStrad
          wrote on last edited by
          #17

          legal precedents are harder to over turn than they are to not create in the first place and I was lso thinking of this:

          Quote:

          "asked us to build a backdoor to the iPhone" — something he described as "too dangerous to create."

          pandora's box, that would be exploited by criminals and legally allowed representatives alike. Really bad idea!

          C 1 Reply Last reply
          0
          • K Kevin Marois

            Apple Fights Order to Unlock San Bernardino Shooter's iPhone[^]. Normally I would side with Apple, but I live 20 minutes from San Bernadino so this one hits home. The Gov isn't asking hem to unlock EVERYONE's phone - just this one. It could start a dangerous precedent, but I think the opportunity to discover valuable intel trumps Apple.

            If it's not broken, fix it until it is

            J Offline
            J Offline
            Jeremy Falcon
            wrote on last edited by
            #18

            More people have been killed with babies by guns than terrorists. Don't let hoopla and propaganda cloud your judgement. Yes it was sad, but the media blew it up to play the fear card to make it seem like it's a much bigger problem than it really is. So, it's not worth Pandora's box being opened.

            Jeremy Falcon

            A 1 Reply Last reply
            0
            • L Lost User

              Ben Franklin:

              Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.

              'nuff said.

              There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.

              J Offline
              J Offline
              Jeremy Falcon
              wrote on last edited by
              #19

              We're supposed to be the home of the brave, not the home of the pansies. +5 million :thumbsup:

              Jeremy Falcon

              1 Reply Last reply
              0
              • C Chris Maunder

                GStrad wrote:

                once they open pandora's box they can't close it

                Yes they can. Lots and lots of legal decisions - both good and bad - get overturned every day.

                cheers Chris Maunder

                N Offline
                N Offline
                Nish Nishant
                wrote on last edited by
                #20

                But why go to Apple? Just hire 2-3 really good phone hackers and they'll get in within a week.

                Regards, Nish


                Website: www.voidnish.com Blog: voidnish.wordpress.com

                F 1 Reply Last reply
                0
                • K Kevin Marois

                  I don't know. It's hard to decide what the right balance is. While I believe that each of us has a right to our privacy, the good of the many outweighs the good of the one.

                  If it's not broken, fix it until it is

                  Mike HankeyM Offline
                  Mike HankeyM Offline
                  Mike Hankey
                  wrote on last edited by
                  #21

                  But the problem is; who decides if it's for the good of the many?

                  New version: WinHeist Version 2.2.2 Beta
                  tomorrow (noun): a mystical land where 99% of all human productivity, motivation and achievement is stored.

                  B 1 Reply Last reply
                  0
                  • D Duncan Edwards Jones

                    This section seems a bit strange:-

                    Quote:

                    Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession.

                    If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption? Also - wouldn't doing that utterly corrupt the chain of evidence meaning anything discovered could not possibly be used in a civilian court of law?

                    N Offline
                    N Offline
                    Nish Nishant
                    wrote on last edited by
                    #22

                    They have enough evidence to go to any level of legal measure required. This is an attempt to get more information and intelligence.

                    Regards, Nish


                    Website: www.voidnish.com Blog: voidnish.wordpress.com

                    1 Reply Last reply
                    0
                    • K Kevin Marois

                      Having been a developer for 30+ years, I can't sit here and believe that Apple doesn't already have a way to open a phone. Have you ever written encryption without a way to unlock it? How would you test it without an unlocking mechanism? It already exists - Apple just doesn't want to give it up.

                      If it's not broken, fix it until it is

                      D Offline
                      D Offline
                      Daniel Pfeffer
                      wrote on last edited by
                      #23

                      A good encryption system is one that will not allow an attacker to decrypt a ciphertext even if he (a) knows the encryption/decryption algorithms and (b) has both plaintext and ciphertext of a set of messages encrypted with the key. If the key used has enough bits, the only way to crack the encryption is to attack the algorithm. Once the algorithm is known to be sound, you test an encryption system by generating keys (or key pairs). You do not encrypt (and destroy the plaintext) of any important data. No one can prove that many popular algorithms do not have built-in "back doors" (rumors about the NSA's work are legion), but if so - no one is talking...

                      If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                      A 1 Reply Last reply
                      0
                      • T Tim Carmichael

                        If Mr. Cook chooses to ignore a court order, then Mr. Cook should be held in contempt of court. Isn't this what would happen to the rest of us?

                        A Offline
                        A Offline
                        Albert Holguin
                        wrote on last edited by
                        #24

                        I don't think he's simply going to "ignore" the ruling, they're going to appeal the decision. I'm sure Apple has an army of lawyers.

                        1 Reply Last reply
                        0
                        • D Duncan Edwards Jones

                          This section seems a bit strange:-

                          Quote:

                          Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession.

                          If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption? Also - wouldn't doing that utterly corrupt the chain of evidence meaning anything discovered could not possibly be used in a civilian court of law?

                          A Offline
                          A Offline
                          Albert Holguin
                          wrote on last edited by
                          #25

                          I believe I read somewhere that there's currently a security measure that deletes the encryption key upon too many failed attempted login attempts. If I'm not mistaken, they're asking Apple to change that setting so that they can brute force the password (i.e. make it so it doesn't delete anything when faced with a brute force attack).

                          1 Reply Last reply
                          0
                          • D Duncan Edwards Jones

                            This section seems a bit strange:-

                            Quote:

                            Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession.

                            If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption? Also - wouldn't doing that utterly corrupt the chain of evidence meaning anything discovered could not possibly be used in a civilian court of law?

                            V Offline
                            V Offline
                            Vark111
                            wrote on last edited by
                            #26

                            Duncan Edwards Jones wrote:

                            If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption?

                            My understanding is that if you attempt bad passwords X number of times, the phone bricks itself essentially. The "new" iOS being requested by the courts/FBI would allow unlimited attempts therefore making any phone that can have that OS installed brute forcible.

                            A K 2 Replies Last reply
                            0
                            • J Jeremy Falcon

                              More people have been killed with babies by guns than terrorists. Don't let hoopla and propaganda cloud your judgement. Yes it was sad, but the media blew it up to play the fear card to make it seem like it's a much bigger problem than it really is. So, it's not worth Pandora's box being opened.

                              Jeremy Falcon

                              A Offline
                              A Offline
                              Albert Holguin
                              wrote on last edited by
                              #27

                              I say we ban babies! :suss:

                              J 1 Reply Last reply
                              0
                              • A Albert Holguin

                                I say we ban babies! :suss:

                                J Offline
                                J Offline
                                Jeremy Falcon
                                wrote on last edited by
                                #28

                                Agreed. They don't do anything but cry and poop anyway. Who needs them.

                                Jeremy Falcon

                                1 Reply Last reply
                                0
                                • D Daniel Pfeffer

                                  A good encryption system is one that will not allow an attacker to decrypt a ciphertext even if he (a) knows the encryption/decryption algorithms and (b) has both plaintext and ciphertext of a set of messages encrypted with the key. If the key used has enough bits, the only way to crack the encryption is to attack the algorithm. Once the algorithm is known to be sound, you test an encryption system by generating keys (or key pairs). You do not encrypt (and destroy the plaintext) of any important data. No one can prove that many popular algorithms do not have built-in "back doors" (rumors about the NSA's work are legion), but if so - no one is talking...

                                  If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                                  A Offline
                                  A Offline
                                  Albert Holguin
                                  wrote on last edited by
                                  #29

                                  Daniel Pfeffer wrote:

                                  No one can prove that many popular algorithms do not have built-in "back doors"

                                  Most widely used algorithms have open-source implementations, meaning you can look at the source and see if you see any deficiencies or back doors. So... the algorithms themselves are pretty sound.

                                  D 1 Reply Last reply
                                  0
                                  • V Vark111

                                    Duncan Edwards Jones wrote:

                                    If the file exists on the phone and was encrypted using an existing version of the data, how would installing a new version of the iOS allow easier unencryption?

                                    My understanding is that if you attempt bad passwords X number of times, the phone bricks itself essentially. The "new" iOS being requested by the courts/FBI would allow unlimited attempts therefore making any phone that can have that OS installed brute forcible.

                                    A Offline
                                    A Offline
                                    Albert Holguin
                                    wrote on last edited by
                                    #30

                                    We answered the same thing at just about the same time, so I guess that is the stated story. I can see the concern, if this "modified" version of the OS got out onto "the wild", anybody could brute force an iPhone.

                                    1 Reply Last reply
                                    0
                                    • G GStrad

                                      legal precedents are harder to over turn than they are to not create in the first place and I was lso thinking of this:

                                      Quote:

                                      "asked us to build a backdoor to the iPhone" — something he described as "too dangerous to create."

                                      pandora's box, that would be exploited by criminals and legally allowed representatives alike. Really bad idea!

                                      C Offline
                                      C Offline
                                      Chris Maunder
                                      wrote on last edited by
                                      #31

                                      GStrad wrote:

                                      asked us to build a backdoor to the iPhone

                                      Ah, yes. That's certainly a nasty box. I was thinking purely of the legal rights. X|

                                      cheers Chris Maunder

                                      1 Reply Last reply
                                      0
                                      • A Albert Holguin

                                        Daniel Pfeffer wrote:

                                        No one can prove that many popular algorithms do not have built-in "back doors"

                                        Most widely used algorithms have open-source implementations, meaning you can look at the source and see if you see any deficiencies or back doors. So... the algorithms themselves are pretty sound.

                                        D Offline
                                        D Offline
                                        Daniel Pfeffer
                                        wrote on last edited by
                                        #32

                                        Very few people have the background in cryptography required to analyze an encryption algorithm. An algorithm with a vulnerability could be perfectly encoded, but still be vulnerable to attack.

                                        If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack. --Winston Churchill

                                        A 1 Reply Last reply
                                        0
                                        • K Kevin Marois

                                          Apple Fights Order to Unlock San Bernardino Shooter's iPhone[^]. Normally I would side with Apple, but I live 20 minutes from San Bernadino so this one hits home. The Gov isn't asking hem to unlock EVERYONE's phone - just this one. It could start a dangerous precedent, but I think the opportunity to discover valuable intel trumps Apple.

                                          If it's not broken, fix it until it is

                                          G Offline
                                          G Offline
                                          GuyThiebaut
                                          wrote on last edited by
                                          #33

                                          It could be a marketing stunt on the part of Apple: (1)Apple publish that they refuse to unlock phones knowing damn well that that will unlock them. (2)Their sales go up and they gain a market share from the Android users who think 'Apple have an ethical stance'. (3)Apple then say that sadly they had no choice and unlock the phone - they come out of it smelling of roses.

                                          “That which can be asserted without evidence, can be dismissed without evidence.”

                                          ― Christopher Hitchens

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups