FBI Gets Court Order for Apple to Hack Terrorist's iPhone
GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
asked FBI Director James Comey if he considered the possibility of creating enough copies of the phone’s data to try hundreds of passwords. Apple likely wouldn’t have objected to this simple method, and the FBI couldn’t answer why they didn’t consider it.
The truth of the story is probably that Mr. Comey couldn't decide whether he should laugh, or cry. . .
Seriously: what did this hapless journalist expect him to say?
Obviously, the first order of business for the FBI, undoubtedly, was(!) to extract a copy of "the relevant file" from "the iPhone in question." After which, "again, 'undoubtedly,'" the entire question would have been rendered moot.
For some reason, Apple, Inc. seems to find it necessary to press a preposterous point: that any(!) data which is "stored upon an iPhone" is so(!!) "miraculously protected" that the FBI(!!!) must beg the Supreme Court for permission(!!!!) to read a murderer's file.
Show of hands, please ... of anyone who has ever successfully 'rooted' an iPhone?
Yeah, and you are not going to persuade me that a telephone has uncrackable cryptographic protection guarding its address list. It's equally absurd to me that the phone would be able to "actually destroy" data that was stored on the thing if someone flubs his password.
I mean, what if the owner was drunk? I mean, really drunk? There's a reason why taxicabs have phone numbers like "333-3333 ..."
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
Quote:
Originally Posted by sundialsvcs
Yeah, and you are not going to persuade me that a telephone has uncrackable cryptographic protection guarding its address list. It's equally absurd to me that the phone would be able to "actually destroy" data that was stored on the thing if someone flubs his password.
I mean, what if the owner was drunk? I mean, really drunk? There's a reason why taxicabs have phone numbers like "333-3333 ..."
Well, no, nothing but one-time-pad is unbreakable so the pass-random-string would have to be unusably long.
As for destroying the data -- either there's a world-wide ban on mentioning recovery of overwritten modile data or nobody has done it yet. I tend towards the latter but I won't rule out the former.
The Pass Code is only 4 numbers.
It is my understanding that the destructive payload or "lock" seems to be tied to 10 incorrect attempts using physical access (buttons for the unhip)
and the Integrity over at Fidelity, Bravery, and Integrity, want to be able to beat on it without this restriction.
If they could beat on it electronically, they'd have a chance, but since it must be physical... not-a-hope-in-Hell without Apple and Co.
signing off on a known_image with its Super Secret Decoder Ring. This new image would therefore remove any such requirement for physical access when entering the pass code.
What isn't being said, is that Apple has been rather forthcoming with the "deets" for the info requests the US Government has asked of them.
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
I know my employers have a self-destruct chip also -- so real security is there if companies like the FBI and NSA don't pay for loopholes.
Who knows, one day these FBI, CIA, NSA torture-for-hire scum may cease to exist?
Does nobody else here have an iPhone? I feel like I'm talking to myself. The iPhone has a setting for more advanced passwords. Mine is over a dozen characters and contains letters, numbers, and more. Regardless, an intentional weakness should never be ethically made.
Absolutely. Let's talk about "ethical" and see if I can make it "personal." (Hypothetically, of course.)
Quote:
Originally Posted by May it never happen, but it could:
Your child, and fifteen of his or her schoolmates, were murdered on the soccer field during a practice game. Across town, five similar attacks occurred at about the same time. The suspects were quickly arrested, surrendered their iPhones, and refused to say anything else.
Through traffic analysis, the FBI concluded that, indeed, the perpetrators were regularly exchanging encrypted information using their iPhones. However, since "the Apple Decision" was handed-down by the US Supreme Court in the year 2019, they cannot lawfully collect any information from "an iPhone." Since the perpetrators have remained silent (exercising their 5th Amendment rights), and because further evidence cannot be obtained, the Judge ordered them -- your child's murderer -- released, and their iPhones returned to them."
And, actually, there's not too much difference between that awful scenario and the present case, except for whose loved ones it is.
Encryption, you see, is not merely a benign protector of civil liberties: it can also be a weapon, even a weapon of war. If we were to establish the legal precedent that encrypted data (and/or personal devices which support encryption) was somehow privileged and sacrosanct, then every criminal and criminal organization on Planet Earth would promptly hide behind it, even more than they presently do.
Just as there is a Constitutional right (under US Law) to be "secure in your person and effects," there is also, stated in the very same sentence, a Constitutional right to "search and seizure," albeit under carefully proscribed conditions. And we, as a society, have to figure out where those boundaries should properly lie. I do not believe that the pursuit of privacy and of civil liberty, important though those concerns may be, should completely stymie our collective ability to pursue and to solve crimes. Especially heinous ones.
We have addressed these issues before. Shortly after the invention of the telephone, we created laws about "wiretapping." (We did this, even though millions of people still had "party lines.") We can do it again. But we're going to waste a lot of time if any of us decide to take a "bully pulpit" position. Intelligent compromise is needed here. The concerns expressed on both sides are legitimate. Now, where is "the middle ground?" We've got to find it. We've got to make some new laws here, and new legal principles. Then, we must make them work. Thinking-caps are needed here, not pulpits.
Last edited by sundialsvcs; 03-17-2016 at 07:12 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.