Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Apple Says No

Apple Says No

Scheduled Pinned Locked Moved The Lounge
ioscomsecuritybusinesshelp
10 Posts 6 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B Offline
    B Offline
    benf2
    wrote on last edited by
    #1

    My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

    W 9 L J C 5 Replies Last reply
    0
    • B benf2

      My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

      W Offline
      W Offline
      W Balboos GHB
      wrote on last edited by
      #2

      The cynical irony of it is that Apple's iCrap is constantly grabbing personal information about the poor users they care so much about. Suddenly they're concerned? Now - if this can be done in a one-off manner, I would definitely side with the FBI. Whilst Apple's argument that the phone's security would be compromised, forever, soon after, should they cooperate, they know full well that's it's already being worked on (very possibly already succeeded) all over the world. Good hackers never tell. So - back to the point: should they relent? Again, if I recall correctly, the ten-try limit, which is what really makes the security, was an anti-theft, making a stolen iPhone worthless to the thief. If that's what they're really protecting - then I side with the FBI. The question, however, is one I struggled with: should I take a part in delaying the inevitable? The matter, the ability to enrich uranium with a CO2 laser had serious implications (to say the least). It worked on a table-top in. I, however, found the equivalent, morally, of that hacker to release my conscience.

      "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

      "As far as we know, our computer has never had an undetected error." - Weisert

      "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

      1 Reply Last reply
      0
      • B benf2

        My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

        9 Offline
        9 Offline
        9082365
        wrote on last edited by
        #3

        My guess is that you've been watching too many movies[^]!

        I am not a number. I am a ... no, wait!

        1 Reply Last reply
        0
        • B benf2

          My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #4

          benf2 wrote:

          My guess is that the NSA can read any phone they want

          "After all as Snowden previously revealed, the NSA already has full access to all the iPhone data it needs."

          benf2 wrote:

          The real issue is trying to get what they find admissible into court.

          Looks more like marketing to me. "We stopped the government from accessing your iPhone, it is *reeelly* safe now."

          Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

          W 1 Reply Last reply
          0
          • L Lost User

            benf2 wrote:

            My guess is that the NSA can read any phone they want

            "After all as Snowden previously revealed, the NSA already has full access to all the iPhone data it needs."

            benf2 wrote:

            The real issue is trying to get what they find admissible into court.

            Looks more like marketing to me. "We stopped the government from accessing your iPhone, it is *reeelly* safe now."

            Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

            W Offline
            W Offline
            W Balboos GHB
            wrote on last edited by
            #5

            Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)

            "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

            "As far as we know, our computer has never had an undetected error." - Weisert

            "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

            L 2 Replies Last reply
            0
            • W W Balboos GHB

              Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)

              "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

              "As far as we know, our computer has never had an undetected error." - Weisert

              "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #6

              W∴ Balboos wrote:

              Sounds like a plausible conspiracy to me!

              No, more like ordinary business. The FBI would want it's own backdoor, and Cook simply takes the chance to get some good PR from it. There will not have been a drastic change in how they view the user at Apple; backdoors have been added for the NSA without the user knowing, so regardless of what the man says - we know it may be very different from what he does.

              Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

              1 Reply Last reply
              0
              • B benf2

                My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

                J Offline
                J Offline
                Johnny J
                wrote on last edited by
                #7

                They try to make me buy an Iphone, I say "no, no, no"... La la la la la... Yeah I know, I sing terribly! ;)

                Anything that is unrelated to elephants is irrelephant
                Anonymous
                -----
                The problem with quotes on the internet is that you can never tell if they're genuine
                Winston Churchill, 1944
                -----
                I'd just like a chance to prove that money can't make me happy.
                Me, all the time

                1 Reply Last reply
                0
                • B benf2

                  My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]

                  C Offline
                  C Offline
                  Chris C B
                  wrote on last edited by
                  #8

                  I think it is worth perusing this[^] - if you can get past the picture of the Messiah without puking, that is. As this would appear to be the FBI communication in question, I can see no reason whatsoever why Apple should not comply. Swedish aerosols all! (24 seconds[^])

                  L 1 Reply Last reply
                  0
                  • C Chris C B

                    I think it is worth perusing this[^] - if you can get past the picture of the Messiah without puking, that is. As this would appear to be the FBI communication in question, I can see no reason whatsoever why Apple should not comply. Swedish aerosols all! (24 seconds[^])

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #9

                    Chris C-B wrote:

                    I can see no reason whatsoever why Apple should not comply.

                    Interesting... If Apple complies a legal precedent is set and US law enforcement will use it, use it often and eventually abuse it. If Apple complies for the FBI they will have no legal standing to deny also providing it to any country where they do business (ie. Russia, China, etc...). These "other" countries will certainly abuse it. If Apple complies it won't be long before the tool is "leaked" into the wild and every law abiding iPhone user's privacy will be gone. I'd call them 3 very significant reasons.

                    There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.

                    1 Reply Last reply
                    0
                    • W W Balboos GHB

                      Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)

                      "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                      "As far as we know, our computer has never had an undetected error." - Weisert

                      "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #10

                      http://www.nydailynews.com/news/national/feds-rip-apple-security-claims-terrorist-iphone-article-1.2537817[^]

                      “Apple’s current refusal to comply with the court’s orders, despite the technical feasibility of doing so, instead appears to be based on its concern for its business model and public brand marketing strategy,” the Justice Department's motion alleges.

                      ..and as the article states, the phone has been opened often enough before - the sudden change of heart is not convincing.

                      Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups