FBI Gets Court Order for Apple to Hack Terrorist's iPhone
GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Dabble, but latest used are Fedora 13 and Ubuntu 10.4.1
Posts: 425
Rep:
FBI Gets Court Order for Apple to Hack Terrorist's iPhone
and Apple is resisting. My prosaic question is this: If the phone is encrypted, how could one load a new OS into it? And if the encryption only covers part of the phone, and you replace the OS (which is currently set up to wipe encrypted data after 10 incorrect passcode entries), doesn't the FBI still have to guess the passcode?
I'm assuming that the FBI doesn't see that (breaking encryption) as a problem given the short length of passcodes in iPhones.
That phone belonged to one of the terrorists who murdered 14 people. Naturally they need to know who his contacts may be. They'll have searched his home. Why shouldn't they search his computer and phone?
That phone belonged to one of the terrorists who murdered 14 people. Naturally they need to know who his contacts may be. They'll have searched his home. Why shouldn't they search his computer and phone?
I'm rather surprised to see people condemning Apple here. Apple isn't resisting demands to search a terrorist's phone. What Apple is resisting is the demand to create a special version of iOS with a backdoor. Because Apple believes, quite wisely IMHO, that "create this for us and it will only be used this once, this one time" isn't a promise that the FBI can be trusted to keep or be able to keep.
moxieman99: the second link should answer your technical questions.
Also, one reason I wouldn't want Apple to do this for the FBI, is because the wall between the FBI and the CIA (which pretty much exists exclusively to do illegal stuff) has been demolished by the Patriot Act.
I'm with dugan on this. I'm troubled by how what was asked for by the FBI is being described by the media. The headlines are all along the lines of "FBI wants Apple's help hacking a particular phone". That is not actually what the FBI has asked for. The FBI has asked Apple to develop an alternative iOS that can bypass iOS's security for ANY phone. That is substantially different from asking for assistance in brute-forcing a particular phone.
My even bigger concern is that Apple already has a backdoor iOS and would prefer not to acknowledge that fact.
I though the FBI had the resources to break or bypass any encryption as they claim in the pass, or ws that the NSA? Not sure, I guess they were lying through their teeth.
I will never buy mac, will they $py on you plus w\don't vote for people! I say bring on "gods eye." For me and mine nothing to hide and will be long gone before real change on dirt.
Do note that if the motive had actually been to get data off the phone, then the court order would just have been "get us the data off this phone." It would not have demanded (and certainly not in such detail) how Apple does it.
The short version is this: the FBI is not asking for a back door. They have a warrant and want Apple to open the front door.
Whether or not you agree with it, I think the writer's argument is worth taking into account. The concern is normally about "warrantless" searches, not "warrant-full" searches.
Please note that I am not taking a position; I've been too busy doing other things today to research this fully. I just happened to see this and thought it interesting.
Afterthought: Given that the person who owned the iJunk did indeed kill folks in the presence of witnesses, I think the authorities meet the test of "probably cause" for a warrant.
What I don't know is whether Apple could open that front door without giving away its encryption.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.