LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 03-09-2016, 07:07 PM   #76
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941

Quote:
asked FBI Director James Comey if he considered the possibility of creating enough copies of the phone’s data to try hundreds of passwords. Apple likely wouldn’t have objected to this simple method, and the FBI couldn’t answer why they didn’t consider it.
The truth of the story is probably that Mr. Comey couldn't decide whether he should laugh, or cry. . .

Seriously: what did this hapless journalist expect him to say?

Obviously, the first order of business for the FBI, undoubtedly, was(!) to extract a copy of "the relevant file" from "the iPhone in question." After which, "again, 'undoubtedly,'" the entire question would have been rendered moot.

For some reason, Apple, Inc. seems to find it necessary to press a preposterous point: that any(!) data which is "stored upon an iPhone" is so(!!) "miraculously protected" that the FBI(!!!) must beg the Supreme Court for permission(!!!!) to read a murderer's file.

Show of hands, please ... of anyone who has ever successfully 'rooted' an iPhone?
 
Old 03-09-2016, 10:32 PM   #77
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
If we don't read us our rights!!
 
Old 03-09-2016, 10:45 PM   #78
OregonJim
Member
 
Registered: Feb 2016
Posts: 98

Rep: Reputation: Disabled
Quote:
Originally Posted by sundialsvcs View Post
Show of hands, please ... of anyone who has ever successfully 'rooted' an iPhone?
Rooting a phone is entirely different. You must already have gotten past the encryption protection to do it.
 
Old 03-10-2016, 07:33 AM   #79
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Yeah, and you are not going to persuade me that a telephone has uncrackable cryptographic protection guarding its address list. It's equally absurd to me that the phone would be able to "actually destroy" data that was stored on the thing if someone flubs his password.

I mean, what if the owner was drunk? I mean, really drunk? There's a reason why taxicabs have phone numbers like "333-3333 ..."
 
Old 03-10-2016, 12:36 PM   #80
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by sundialsvcs View Post
Yeah, and you are not going to persuade me that a telephone has uncrackable cryptographic protection guarding its address list. It's equally absurd to me that the phone would be able to "actually destroy" data that was stored on the thing if someone flubs his password.

I mean, what if the owner was drunk? I mean, really drunk? There's a reason why taxicabs have phone numbers like "333-3333 ..."
Well, no, nothing but one-time-pad is unbreakable so the pass-random-string would have to be unusably long.
As for destroying the data -- either there's a world-wide ban on mentioning recovery of overwritten modile data or nobody has done it yet. I tend towards the latter but I won't rule out the former.
 
Old 03-10-2016, 01:00 PM   #81
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
You could have it brick itself, permanently... (engage incendiary.)Click image for larger version

Name:	Processor+Burn.jpg
Views:	11
Size:	33.1 KB
ID:	21113
https://www.reddit.com/r/AskReddit/c...oy_a_companys/

Last edited by jamison20000e; 03-10-2016 at 01:03 PM.
 
Old 03-10-2016, 01:07 PM   #82
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
The Pass Code is only 4 numbers.
It is my understanding that the destructive payload or "lock" seems to be tied to 10 incorrect attempts using physical access (buttons for the unhip)
and the Integrity over at Fidelity, Bravery, and Integrity, want to be able to beat on it without this restriction.
If they could beat on it electronically, they'd have a chance, but since it must be physical... not-a-hope-in-Hell without Apple and Co.
signing off on a known_image with its Super Secret Decoder Ring. This new image would therefore remove any such requirement for physical access when entering the pass code.

What isn't being said, is that Apple has been rather forthcoming with the "deets" for the info requests the US Government has asked of them.
 
Old 03-10-2016, 01:28 PM   #83
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
My tablet has different locking options, for awhile I had a 9x9 grid to draw a picture in to open... (got tedious.)

The first phone you just needed apple's password (alpine if I remember?) Once rooted the sky's the limit.
 
Old 03-10-2016, 01:34 PM   #84
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
I know my employers have a self-destruct chip also -- so real security is there if companies like the FBI and NSA don't pay for loopholes.
Who knows, one day these FBI, CIA, NSA torture-for-hire scum may cease to exist?
 
Old 03-10-2016, 02:08 PM   #85
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
Like republicans and democrats, their not all bad just suckers.
 
Old 03-10-2016, 04:38 PM   #86
OregonJim
Member
 
Registered: Feb 2016
Posts: 98

Rep: Reputation: Disabled
Quote:
Originally Posted by sundialsvcs View Post
It's equally absurd to me that the phone would be able to "actually destroy" data that was stored on the thing if someone flubs his password.
It's a fact. Whether you choose to believe it is another story.
 
Old 03-10-2016, 04:53 PM   #87
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
Even a can wreck data.
 
Old 03-17-2016, 04:39 AM   #88
sag47
Senior Member
 
Registered: Sep 2009
Location: Raleigh, NC
Distribution: Ubuntu, PopOS, Raspbian
Posts: 1,899
Blog Entries: 36

Rep: Reputation: 477Reputation: 477Reputation: 477Reputation: 477Reputation: 477
Does nobody else here have an iPhone? I feel like I'm talking to myself. The iPhone has a setting for more advanced passwords. Mine is over a dozen characters and contains letters, numbers, and more. Regardless, an intentional weakness should never be ethically made.
 
Old 03-17-2016, 07:11 AM   #89
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Absolutely. Let's talk about "ethical" and see if I can make it "personal." (Hypothetically, of course.)

Quote:
Originally Posted by May it never happen, but it could:
Your child, and fifteen of his or her schoolmates, were murdered on the soccer field during a practice game. Across town, five similar attacks occurred at about the same time. The suspects were quickly arrested, surrendered their iPhones, and refused to say anything else.

Through traffic analysis, the FBI concluded that, indeed, the perpetrators were regularly exchanging encrypted information using their iPhones. However, since "the Apple Decision" was handed-down by the US Supreme Court in the year 2019, they cannot lawfully collect any information from "an iPhone." Since the perpetrators have remained silent (exercising their 5th Amendment rights), and because further evidence cannot be obtained, the Judge ordered them -- your child's murderer -- released, and their iPhones returned to them."
And, actually, there's not too much difference between that awful scenario and the present case, except for whose loved ones it is.

Encryption, you see, is not merely a benign protector of civil liberties: it can also be a weapon, even a weapon of war. If we were to establish the legal precedent that encrypted data (and/or personal devices which support encryption) was somehow privileged and sacrosanct, then every criminal and criminal organization on Planet Earth would promptly hide behind it, even more than they presently do.

Just as there is a Constitutional right (under US Law) to be "secure in your person and effects," there is also, stated in the very same sentence, a Constitutional right to "search and seizure," albeit under carefully proscribed conditions. And we, as a society, have to figure out where those boundaries should properly lie. I do not believe that the pursuit of privacy and of civil liberty, important though those concerns may be, should completely stymie our collective ability to pursue and to solve crimes. Especially heinous ones.

We have addressed these issues before. Shortly after the invention of the telephone, we created laws about "wiretapping." (We did this, even though millions of people still had "party lines.") We can do it again. But we're going to waste a lot of time if any of us decide to take a "bully pulpit" position. Intelligent compromise is needed here. The concerns expressed on both sides are legitimate. Now, where is "the middle ground?" We've got to find it. We've got to make some new laws here, and new legal principles. Then, we must make them work. Thinking-caps are needed here, not pulpits.

Last edited by sundialsvcs; 03-17-2016 at 07:12 AM.
 
Old 03-17-2016, 08:21 AM   #90
jamison20000e
Senior Member
 
Registered: Nov 2005
Location: ...uncanny valley... infinity\1975; (randomly born:) Milwaukee, WI, US( + travel,) Earth&Mars (I wish,) END BORDER$!◣◢┌∩┐ Fe26-E,e...
Distribution: any GPL that work on freest-HW; has been KDE, CLI, Novena-SBC but open.. http://goo.gl/NqgqJx &c ;-)
Posts: 4,888
Blog Entries: 2

Rep: Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567Reputation: 1567
Lightbulb

Don't be terrorists!
[img=http://s8.postimg.org/lepq1s0xd/shine_what_to_do_with_haters_10_638.jpg]
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
FBI Crying Fowl on Apple's and Google's fully encrypted phones OpensourceRulzs General 17 10-27-2014 06:09 AM
Apple Iphone 16Gb/ New Edition Iphone 3G telcom Linux - Newbie 1 07-11-2008 09:53 AM
For Sale Apple Iphone,htc,sidekick Lx,apple Ipod,blackberry sellphone Linux - Hardware 1 02-06-2008 04:13 AM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 06:40 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration