Apple Says No
-
My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]
The cynical irony of it is that Apple's iCrap is constantly grabbing personal information about the poor users they care so much about. Suddenly they're concerned? Now - if this can be done in a one-off manner, I would definitely side with the FBI. Whilst Apple's argument that the phone's security would be compromised, forever, soon after, should they cooperate, they know full well that's it's already being worked on (very possibly already succeeded) all over the world. Good hackers never tell. So - back to the point: should they relent? Again, if I recall correctly, the ten-try limit, which is what really makes the security, was an anti-theft, making a stolen iPhone worthless to the thief. If that's what they're really protecting - then I side with the FBI. The question, however, is one I struggled with: should I take a part in delaying the inevitable? The matter, the ability to enrich uranium with a CO2 laser had serious implications (to say the least). It worked on a table-top in. I, however, found the equivalent, morally, of that hacker to release my conscience.
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein
"As far as we know, our computer has never had an undetected error." - Weisert
"If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010
-
My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]
-
My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]
benf2 wrote:
My guess is that the NSA can read any phone they want
"After all as Snowden previously revealed, the NSA already has full access to all the iPhone data it needs."
benf2 wrote:
The real issue is trying to get what they find admissible into court.
Looks more like marketing to me. "We stopped the government from accessing your iPhone, it is *reeelly* safe now."
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
benf2 wrote:
My guess is that the NSA can read any phone they want
"After all as Snowden previously revealed, the NSA already has full access to all the iPhone data it needs."
benf2 wrote:
The real issue is trying to get what they find admissible into court.
Looks more like marketing to me. "We stopped the government from accessing your iPhone, it is *reeelly* safe now."
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein
"As far as we know, our computer has never had an undetected error." - Weisert
"If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010
-
Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein
"As far as we know, our computer has never had an undetected error." - Weisert
"If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010
W∴ Balboos wrote:
Sounds like a plausible conspiracy to me!
No, more like ordinary business. The FBI would want it's own backdoor, and Cook simply takes the chance to get some good PR from it. There will not have been a drastic change in how they view the user at Apple; backdoors have been added for the NSA without the user knowing, so regardless of what the man says - we know it may be very different from what he does.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]
They try to make me buy an Iphone, I say "no, no, no"... La la la la la... Yeah I know, I sing terribly! ;)
Anything that is unrelated to elephants is irrelephant
Anonymous
-----
The problem with quotes on the internet is that you can never tell if they're genuine
Winston Churchill, 1944
-----
I'd just like a chance to prove that money can't make me happy.
Me, all the time -
My guess is that the NSA can read any phone they want. The real issue is trying to get what they find admissible into court. On a different note, here is the IOS Security Guide: https://www.apple.com/business/docs/iOS_Security_Guide.pdf[^]
I think it is worth perusing this[^] - if you can get past the picture of the Messiah without puking, that is. As this would appear to be the FBI communication in question, I can see no reason whatsoever why Apple should not comply. Swedish aerosols all! (24 seconds[^])
-
I think it is worth perusing this[^] - if you can get past the picture of the Messiah without puking, that is. As this would appear to be the FBI communication in question, I can see no reason whatsoever why Apple should not comply. Swedish aerosols all! (24 seconds[^])
Chris C-B wrote:
I can see no reason whatsoever why Apple should not comply.
Interesting... If Apple complies a legal precedent is set and US law enforcement will use it, use it often and eventually abuse it. If Apple complies for the FBI they will have no legal standing to deny also providing it to any country where they do business (ie. Russia, China, etc...). These "other" countries will certainly abuse it. If Apple complies it won't be long before the tool is "leaked" into the wild and every law abiding iPhone user's privacy will be gone. I'd call them 3 very significant reasons.
There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.
-
Sounds like a plausible conspiracy to me! (And all the free air-time for apple products, as well)
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein
"As far as we know, our computer has never had an undetected error." - Weisert
"If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010
http://www.nydailynews.com/news/national/feds-rip-apple-security-claims-terrorist-iphone-article-1.2537817[^]
“Apple’s current refusal to comply with the court’s orders, despite the technical feasibility of doing so, instead appears to be based on its concern for its business model and public brand marketing strategy,” the Justice Department's motion alleges.
..and as the article states, the phone has been opened often enough before - the sudden change of heart is not convincing.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)