Terrorism: Unlock the iphone when it is terrorism

Search
Go

Discussion Topic

Return to Forum List
This thread has been locked
Messages 1 - 301 of total 301 in this topic
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Original Post - Feb 20, 2016 - 04:12am PT
Apple is so proud of their stealth technology but so unwilling to contribute to unified National Security efforts against terrorism. Would a big knock at home change their minds?
Escopeta

Trad climber
Idaho
Feb 20, 2016 - 05:50am PT
Of course, that's how government coercion works. It will indeed be interesting to see what amount of "special" treatment Apple receives going forward.

I wonder how that zoning application is going up there in Cupertino (or Sunnyvale?)

Before we get all ball cuppy about Apple, let's not forget that they handed over, immediately, everything that was on their cloud to the Feds faster than a cat lapping chain lightning.
Jaybro

Social climber
Wolf City, Wyoming
Feb 20, 2016 - 05:58am PT
The FBI request, is in itself, an act of terrorism.
Craiger

Trad climber
North Conway, NH
Feb 20, 2016 - 06:15am PT
What about all the other murders in our country.... oh only when a Muslim does it hand over our liberty? Like above apple has unlocked previous ios phones before, but under different circumstances.


http://patriotrising.com/2016/02/19/freedom-isnt-free-except/
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 06:29am PT
[The ... request], is in itself, an act of terrorism.

Jay, I Don't see it?

I think the stalling by Apple is a form of utilizing free advertising--they are getting press.
nature

climber
Boulder, CO
Feb 20, 2016 - 06:59am PT
nope.

and Jay's spot-on.
crankster

Trad climber
No. Tahoe
Feb 20, 2016 - 07:12am PT
You can't give the government the keys to the "back door" one time only.
This is a tough call but I side with Apple and other tech companies that sell their product based on a guarantee of privacy.
climbski2

Mountain climber
Anchorage AK, Reno NV
Feb 20, 2016 - 07:13am PT
You live in a country where every phone call is recorded by your government and most internet traffic as well and somehow you think you are free and that Apple and terrorists are the problem? You think the FBI needs more tools and cannot do the job it has done the normal way for decades?

Ancient strategies still work.. Take advantage of and over hype an emergency to get the people to give up their freedom or do other things like go to war against their best interests.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 07:25am PT
nauture,

for someone that is baked all the time I not sure you would understand the thread but I do see that living in Colorado you no longer see a need for your particular privacy.
apogee

climber
Technically expert, safe belayer, can lead if easy
Feb 20, 2016 - 07:29am PT
Apple is making the right call here.
D'Wolf

climber
Feb 20, 2016 - 07:30am PT
Don't know that it's about unlocking "the" iPhone: these phones all run on basically the same OS - develop the software/technology/ability to unlock one and you've unlocked them all. Once that genie's out of the bottle, there's no putting it back. How do we keep that technology safe and prevent breaching everyone's privacy?

Handcuffing our government is a double-edged sword that allows all of us the freedom to pursue our dreams, nefarious or otherwise.

apogee

climber
Technically expert, safe belayer, can lead if easy
Feb 20, 2016 - 07:39am PT
It's always surprising to me when the same people who cannot stand the idea of gov't intrusion into their lives will easily and willingly give up their personal freedom from gov't intrusion into their life when they are afraid of something.
Spider Savage

Mountain climber
The shaggy fringe of Los Angeles
Feb 20, 2016 - 07:41am PT

The Truth is here: http://www.apple.com/customer-letter/

Tim Cook is the patriot.


If the FBI wants to do something effective, they should check the San Bernardino shooters' medicine cabinet.

http://www.cchrint.org/2015/11/24/prescription-terrorism/


The media is not broadcasting clear info on this matter. The job is to shock you into paying attention so they can deliver ears and eyes to advertisers.


There are a few in power who would like to just put everyone in a straight jacket so we are all nice and safe. Don't be a sucker.
D'Wolf

climber
Feb 20, 2016 - 07:42am PT
Climbski2 makes a good point: I thought all of our phone conversations were recorded by the NSA; can't they just listen to the conversations that took place over that phone during the timeframe in question?

Maybe they don't really record everything. Maybe they can't really record everything? People believe these things but then times like this make it appear that maybe we haven't been told the whole truth. Or have we?

These are the disjointed puzzle pieces that we all seem to miss.
Chaz

Trad climber
greater Boss Angeles area
Feb 20, 2016 - 07:47am PT
The government can seize things. They have that legitimate power.

But the government can't make you do something you would rather not do, if you've not broken any laws.

Jaybro is correct. What the government is doing - attempting to coerce Apple, in public - is a terrorist threat of its own.

Even if cracking this phone would only affect this phone, Apple has already said they don't feel like doing it. That should be it. They don't feel like doing it. The government should leave them alone at that point.

All the cops had to do to stop all this before it even got started was to simply enforce the existing laws. Redlands Police drove past Farook & Wife's condo EVERY DAY, dozens of times, and all they had to do was knock on their door once to make two felony arrests. But no. They couldn't trouble themselves to do a damn thing until 14 people were DEAD.

Brandon-

climber
The Granite State.
Feb 20, 2016 - 07:50am PT
http://www.supertopo.com/climbers-forum/2767654/Apple-to-FBI-No

Excellent redundant thread!
climbski2

Mountain climber
Anchorage AK, Reno NV
Feb 20, 2016 - 07:53am PT
Maybe they don't really record everything. Maybe they can't really record everything?

Maybe the FBI is just pissed off they cant do anything they want and they see this as an opportunity to get the public on their side. Maybe it has nothing to do with any likely useful info to be found.

FBI has been bitching and moaning and saying encryption tools in public hands are a menace for a couple years at least. This story was inevitable and predicted.

ie..Now they finally got ahold of some dead two bit dipshit terrorists who did something with encryption and the FBI is milking it for all it is worth.

Apple will lose this fight this time because this particular phone model is breakable. But they are laying the groundwork for unbreakable encryption. They are also making it as difficult as possible so that the FBI does not feel it is worth fighting over every time it wants something.

For one of the very few times ever to a company I do not really like... Thank-you Apple.
WBraun

climber
Feb 20, 2016 - 08:06am PT
climbski2 the only guy who has it right.

If you know the real full story of the San Bern psyops.

Americans are so stoopid and continually 0wned ......
pud

climber
Sportbikeville & Yucca brevifolia
Feb 20, 2016 - 08:12am PT
Whatever information gleaned from these murderer's iphone(s) is not going to put a dent in the ongoing fight against islamic jihad.
By not sharing this technology (which already exists), apple is serving the public in a way the government is supposed to.
Contractor

Boulder climber
CA
Feb 20, 2016 - 08:22am PT
apogee-

I understand your statement but it's similar to saying that you are patently again war.

Fine, I'm against war and government intrusion as well. Our country enjoyed a healthy pacifist tradition- until Hitler was marching towards world domination.

I still think the bigger threat to our personal freedoms would come from within, such as Donald or Cruz having the NSA at their disposal. Historically, Nixon with the Plumbers and attempting to fire the Attorney General rates up there as one of the most perilous threats to our democracy.

I have SEAL and intel buddies who've hunted Jihadist in the middle East and Africa. They're putting it on the line so we can debate this crap, freely over a cup of coffee. They need all the help they can get.

When or will this reach proportions of WW2 in terms of national anxiety and the gloves really come off? It may be inevitable.
thebravecowboy

climber
The Good Places
Feb 20, 2016 - 08:29am PT
unified National Security efforts
interesting.

































HermitMaster

Social climber
my abode
Feb 20, 2016 - 08:35am PT
It's always surprising to me when the same people who cannot stand the idea of gov't intrusion into their lives will easily and willingly give up their personal freedom from gov't intrusion into their life when they are afraid of something.

John M

climber
Feb 20, 2016 - 08:51am PT
I understand your statement but it's similar to saying that you are patently again war.

I don't see how you get that. To me his statement is more like saying, yes, its war, but you can't use a nuke every time you feel like using a nuke just cause war is scary or hard.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 08:52am PT
Privacy: If I want privacy, I keep the data/idea in my head.

Once I speak my privacy vanishes.

Why should I depend on Apple and their encryption for privacy? A false god of security some of you cater to?

Sir George Moore knew this idea -- but he talked and lost his head.

WBraun

climber
Feb 20, 2016 - 09:00am PT
Privacy: If I want privacy, I keep the data/idea in my head.

Doesn't work that way anymore.

The human mind has become vey weak.

The trust of mans word means nothing anymore in this stoopid day and age of hypocrisy and quarrel.

Everything has to be written down or digitized.

Then the dumb azz lawyers will come and dissect it to fit the way they want it.

The battle will be drawn to the will of whomever unless providence over rides at certain times and circumstances.

You people are insane now .....
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 09:03am PT
Couchmaster,

I am saying I do not depend on externals to keep what I want private -- even apple. All bubbles can be broken so I do not depend on their intactness for privacy.

The rights in the Constitution are not without stipulations -- our society is somewhat utilitarian -- so some rights trump others.

National security trumps individual privacy as one would expect in any system of rule playoffs that keeps the top system in total power to preserve itself. I would rather satisfy national security [which I do depend upon] than protect some would be method of purchased security against one's dumb ass public blabbing. Apple -- I do not need their products.

So Couchmaster, I am asking why depend on Apple when you already have a great system of privacy? Apple's type of privacy is simply a middleman milking you every month and why should national security be breached in the name of apple's grand scheme of capitalism?


nature

climber
Boulder, CO
Feb 20, 2016 - 09:18am PT
Assume enough, dingus?

keep trying. and failing.


ah... f*#k it. you won't get a response again.

greased.
WBraun

climber
Feb 20, 2016 - 09:29am PT
WOW ^^^

Grease monkey Dingus for his opinion.

So fuking coward and sterile.

I don't need to agree or disagree with him but I'm so glad guys like him put forth his/their thoughts .....
bluering

Trad climber
Santa Clara, CA
Feb 20, 2016 - 09:32am PT
If the phone was suspected to be used in the commission of a felony crime, the phone can be seized as evidence. I got that, no arguments, right?

The Gov does not have the skillz to get to the goods. Apple says they can't get the data, but everybody knows they can if they wanted to. Like if their PROFITS would increase by $200 billion, I'll bet they'd find a way.

What if Apple agreed to privately access the data and deliver ONLY THAT DATA FROM THAT PHONE to the Feds?

Apple is not in a good position in this case, one way or the other.
Reilly

Mountain climber
The Other Monrovia- CA
Feb 20, 2016 - 09:37am PT
Y'all talk like yer a bunch of Paul Revere incarnations. Who the hell needs encryption on
their phone other than spouse-cheaters and criminals?


Apple vs. FBI: Battle over unlocking phone gets nastier

http://www.latimes.com/local/lanow/la-me-ln-apple-vs-fbi-battle-over-unlocking-phone-gets-nastier-20160220-story.html


Why Apple's fight with the FBI could have reverberations in China

http://www.latimes.com/business/technology/la-fi-tn-apple-global-privacy-20160219-story.html
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 09:48am PT
Right on Reilly!

Spouse cheaters?
cuvvy

Sport climber
arkansas
Feb 20, 2016 - 09:53am PT
If its an investigation, regardless of the perpetrators, why not try to assist? wonder if this press will affect stock price over the long run, probably not. Might get a dip but then business as usual
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 09:54am PT
Good article here: https://securosis.com/blog/do-we-have-a-right-to-security

The FBI, DOJ, and others are debating if secure products and services should be legal. They hide this in language around warrants and lawful access, and scream about terrorists and child pornographers. What they don’t say, what they never admit, is that it is physically impossible to build in back doors for law enforcement without creating security vulnerabilities.

It simply can’t be done. If Apple, the government, or anyone else has master access to your device, to a service, or communications, that is a security flaw. It is impossible for them to guarantee that criminals or hostile governments won’t also gain such access. This isn’t paranoia, it’s a demonstrable fact. No company or government is completely secure.

See also: Bruce Schneier on the iPhone (and linked articles therein).

Between them, these guys have forgotten more about security than I suspect the entire Supertopo cohort combined has ever known.
Jeremy B.

climber
Northern California
Feb 20, 2016 - 10:09am PT
Who the hell needs encryption on
their phone other than spouse-cheaters and criminals?

Reporters, for one. In some parts of the world they have a rather short life expectancy.

Anyone doing business or research in competitive environments, for another.

Or, anyone who thinks their private correspondence is their own business. This isn't yet East Germany, as much as the more timid might want it to be.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 10:14am PT
jeremy b,

all the encryption in the world doesn't stop traitors.

and for reporters: If they do not have complete rights of ingress and egress.

They can be held with encryption in hand until the contents are understood by the detainers. A risk they choose.

I doubts whether we will go to war over the loss of a reporter. Our government has its own divisions for espionage/reporting than depend on the public sector.
rbord

Boulder climber
atlanta
Feb 20, 2016 - 10:21am PT
How did the FBI get the info from the medicine cabinet? What - did we agree to give them the OS to get a search warrant and break into the privacy of their medicines? Hell now they can just break into anyone's medicine cabinet. What's in your medicine cabinet?
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 10:32am PT
Who the hell needs encryption on
their phone other than spouse-cheaters and criminals?

What Jeremy B. said. And:

• Anyone fighting for democracy, liberty, or human rights in an oppressive state.
survival

Big Wall climber
Terrapin Station
Feb 20, 2016 - 10:33am PT
Elect The Hair!!

He'll fix everything and make these Apples bend over and say thank you!!
Jeremy B.

climber
Northern California
Feb 20, 2016 - 10:43am PT
True, but it limits the leakage from "everyone" to just the few that were paid off/blackmailed/recruited. The state of this country's information security is bad enough without the FBI blowing holes in it just so they can add another tool to their toybox.

The feds already have the call records, the texts, the emails, heck, they even have the shooters. For that matter, they probably have recordings of the calls. The FBI doesn't exactly have a sterling record of not abusing the public's trust so I'm not particularly inclined to extend more just because their PR folk have switched from "it's for the children" to "the terrorists are coming".
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 10:46am PT
Jeremy B,

you say encryption is a tool these people need:

Reporters, for one. In some parts of the world they have a rather short life expectancy.

Anyone doing business or research in competitive environments, for another.

Or, anyone who thinks their private correspondence is their own business. This isn't yet East Germany, as much as the more timid might want it to be.


Answer, if you can get out of the box, what are the tools National Security needs to stop those whose very intent is destroy a system that permits the freedoms you talk about?
John M

climber
Feb 20, 2016 - 10:46am PT
all the encryption in the world doesn't stop traitors.

thats not very good reasoning. what you are saying is that since we can't stop everything, we shouldn't try to stop anything.

If you applied that reasoning to a bank, then we should just leave the vault open because we can't stop every robber.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 10:49am PT
John M,

No! We would be better of identifying traitors and when they are selling the goods over the phone -- then nab 'em.

Encryption doesn't not stop diffusion of proprietary ideas and if traitors have encryption privileges then they will be harder yet to detect.

thebravecowboy

climber
The Good Places
Feb 20, 2016 - 10:50am PT
speaking of the Hair, I heard PETA was after him for animal cruelty in the collection of that chimp-rug-toupee


identifying traitors


man, you sound awful scared DM. did you enjoy the McCarthy years?

Those who sacrifice liberty for security deserve neither.


And yeah, some folks that choose to illegally acquire meds for humane/comfortable end-of-life exit DO need encryption to protect themselves from this morally turgid legal system. But yeah, I get it, yer scurred.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 11:07am PT
thebravecowboy,

you sound awful scared DM. did you enjoy the McCarthy years?
I do not take a liking to your juxtapositioning --- This line is not a line from me:

Those who sacrifice liberty for security deserve neither.

And what would you know about the McCarthy years?

Last summer I battled three dumb fu*king cowboys of the Q Creek Ranch [Wal Mart Shirley Basin] and beat them at their finest game: 3 on One and they had the GUN.

Why the hell would I be scared of an illusion? The valiant never taste of death but once.

If there ever was a case against eating red meat, it should be that the cowboys are so stupid!

Jeremy B.

climber
Northern California
Feb 20, 2016 - 11:14am PT
Answer, if you can get out of the box, what are the tools National Security needs to stop those whose very intent is destroy a system that permits the freedoms you talk about?

I'll start with the ever-nebulous but oft-neglected "basic policework". Reliance on fancy tools can be a crippling thing; if you can win the people over most of your work is done for you. When things go badly wrong it's often the result of a chain of mistakes.

Another tool? Education, and setting expectations. A ignorant population is easily led by the nose, particularly with (usually incorrect) phrases like "just this once", "we must do something", and "this couldn't have been foreseen". That's a population that expects free lunches because everything around them is structured around hiding the actual costs. It's a population that's always trapped in a reactive mode, rather than having the maturity to sit back and take a longer view.

For more specific tools, attack and defense of running systems. We're good at it already, so are other countries. That's the weak spot, the battleground. Getting to every last corner of some dead terrorists' device is just a side-show; they should already have the communications metadata they need to hunt down anyone else they were working with.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 11:19am PT
Jeremy B.,

It seems you do not know much about small cells and detecting them. You did poorly on answering what tools National Security could use.
Jaybro

Social climber
Wolf City, Wyoming
Feb 20, 2016 - 11:24am PT
Look harder Dingus, you're a reasonably smart guy and it's a simple concept,

Yeah and what 2 ski said, but was not first to say, Werner, they're just bullys asserting themselves. This is not news.
Lorenzo

Trad climber
Portland Oregon
Feb 20, 2016 - 11:26am PT
The feds already have the call records, the texts, the emails, heck, they even have the shooters. For that matter, they probably have recordings of the calls. The FBI doesn't exactly have a sterling record of not abusing the public's trust so I'm not particularly inclined to extend more just because their PR folk have switched from "it's for the children" to "the terrorists are coming".

They also have the most recent iCloud backup to the phone in question.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 11:27am PT
From a few months ago:
Security Experts Oppose Government Access to Encrypted Communication

SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.

A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates…

In the paper, the authors emphasized that the stakes involved in encryption are much higher now than in their 1997 analysis. In the 1990s, the Internet era was just beginning — the 1997 report is littered with references to “electronic mail” and “facsimile communications,” which are now quaint communications methods. Today, the government’s plans could affect the technology used to lock data from financial and medical institutions, and poke a hole in mobile devices and countless other critical systems that are moving rapidly online, including pipelines, nuclear facilities and the power grid.

“The problems now are much worse than they were in 1997,” said Peter G. Neumann, a co-author of both the 1997 report and the new paper, who is a computer security pioneer at SRI International, the Silicon Valley research laboratory. “There are more vulnerabilities than ever, more ways to exploit them than ever, and now the government wants to dumb everything down further.”

Here is the white paper itself.

These are many of the people who invented and built the current security infrastructure. With all due respect, Dingus, I'm going to accept their recommendations before I accept the FBI's — or yours.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 11:37am PT
Meanwhile, here's how much you can trust the FBI on technical matters.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 11:37am PT
Spiny Norman,


This argument seems to have a flaw in it?

SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.

If what Apple knows can open the phone, then a traitor could also sell the method of de-encryption[or whatever] to some bank hackers in Nigeria. Or simply then the system cannot possibly be as secure as what they the elite group[how does one get such status?] argues it is.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 11:39am PT
Read the report, Dingus, not the NYT summary thereof. I already linked it for you.

Edit: for your convenience here's a direct download link [PDF].

Abstract

Twenty years ago, law enforcement organizations lobbied to require data and
communication services to engineer their products to guarantee law enforcement
access to all data. After lengthy debate and vigorous predictions of enforcement
channels “going dark,” these attempts to regulate the emerging Internet were abandoned.

In the intervening years, innovation on the Internet flourished, and law
enforcement agencies found new and more effective means of accessing vastly larger
quantities of data. Today we are again hearing calls for regulation to mandate the
provision of exceptional access mechanisms. In this report, a group of computer
scientists and security experts, many of whom participated in a 1997 study of these
same topics, has convened to explore the likely effects of imposing extraordinary
access mandates.

We have found that the damage that could be caused by law enforcement exceptional
access requirements would be even greater today than it would have been 20
years ago. In the wake of the growing economic and social cost of the fundamental
insecurity of today’s Internet environment, any proposals that alter the security dynamics
online should be approached with caution. Exceptional access would force
Internet system developers to reverse “forward secrecy” design practices that seek to
minimize the impact on user privacy when systems are breached. The complexity of
today’s Internet environment, with millions of apps and globally connected services,
means that new law enforcement requirements are likely to introduce unanticipated,
hard to detect security flaws. Beyond these and other technical vulnerabilities, the
prospect of globally deployed exceptional access systems raises difficult problems
about how such an environment would be governed and how to ensure that such
systems would respect human rights and the rule of law.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 11:48am PT
The point of this request is not to get access to the San Bernardino shooters' phones. It's a trojan horse request. What they really want is access to any phone that comes into FBI custody.
thebravecowboy

climber
The Good Places
Feb 20, 2016 - 12:09pm PT
DM, Benjamin Franklin said:
Those who sacrifice liberty for security deserve neither.
, not you, clearly.
Jeremy B.

climber
Northern California
Feb 20, 2016 - 12:15pm PT
Dingus, small cells are by their very nature hard to detect. Often the detection is from that same "basic policework"; particularly with jihadists there is not much funding or long term training available. That often means they stick like a sore thumb during the preparation and surveillance phase of the attack cycle. An alert patrol officer, store clerk, or community member is more often how the detection happens. Drilling into encryption is just part of the after-action cleanup, unless it's a TV show.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 12:22pm PT
What they really want is access to any phone that comes into FBI custody.

The technology race between criminals and cops has been going for several centuries.

It seems the gents that wrote that report don't know the hand that feeds. There would be more encrip employment the sooner this method fails.

john prine -- ...it's blow up you cell phone... and find Jesus on yur own.
John M

climber
Feb 20, 2016 - 12:24pm PT
If what Apple knows can open the phone, then a traitor could also sell the method of de-encryption

The above is false.. what Apple says is.

http://www.apple.com/customer-letter/

We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

So the argument is about the government wanting Apple to change what it does and create a back door. A back door makes a device vulnerable to hackers. Its not about that information on that phone because Apple can not get to it. Its beyond Apples current reach. Creating a back door makes everything more vulnerable, which is why Apple did not do this. Because you are correct, if they create a back door, then that information could be leaked. Without a back door, there is no information to be leaked because Apple can not access it.

Your argument Dingus makes us more vulnerable. Not less. Encryption is very hard to break. Putting in a back door does away with that level of protection.

This is my understanding of how things stand. I am open to being corrected on my understanding.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 12:26pm PT
jeremy B,

this seems like a contradiction:

Dingus, small cells are by their very nature hard to detect. Often the detection is from that same "basic policework"; particularly with jihadists there is not much funding or long term training available. That often means they stick like a sore thumb during the preparation
You say:
small cells are by their very nature hard to detect

then you say:
they stick like a sore thumb during the preparation


How can something be both hard to detect and at the same time stick [out] like a sore thumb?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 12:33pm PT
John M,

I am calling business bull shite talk and a stupid assessment of their statement.

We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

No one hides[destroys?] how they make something unless they never want to make another. And Apple just happens to be in the business of a form of mass production with improvements in mind.

You have been fooled by the rhetoric.
John M

climber
Feb 20, 2016 - 12:40pm PT
no sir... I believe that I understand how encryption is done today.

As I understand it.

The phone is guarded by encryption. The key to the encryption is the person's personal code. Even the stored code on the phone is encrypted. So without the code, the phones information is protected by encryption. Right now one is allowed three tries to break the person's code. After three tries the phone automatically erases itself. So without the code even Apple can not access that information. They did this on purpose so that the phone would not be vulnerable to anyone.

If as you suggest, they made a back door, then that would create a vulnerability because as you say, the information could be leaked and that would be devastating to Apple's credibility. They have nothing to gain by creating a back door and a lot to lose.

What the government is asking them to do is create a back door.
Bushman

Social climber
Elk Grove, California
Feb 20, 2016 - 12:45pm PT

The Appointment of Dr Fink and his Tribulation Show

He'll appoint a surgeon General
To be his new chief of staff
O'er the armies of our lord
With instruments of torture
Water boarding left him bored
His name is Dr Fink
He works best when he drinks
You'll be red and white and blue
When he gets through with you
And the president will praise him
For all that he would do

To keep our country safe
He'll extract what he needs
And sue your family for the bill
Interrogation isn't pretty
And torture isn't cheap
A great leader's always wise
But something you won't witness
When you've met with your demise

And he'll praise on our behalf
His new warrior and chief
Dr Fink will take the blame
Much to our relief

"Dr Fink Dr Fink
You can have another drink
Dr Fink Dr Fink
Please don't tell me what you think
Dr Fink Dr Fink
What is that there in the sink?
Dr Fink Dr Fink
They tell me that you stink!"

A physician's never told
When the outcome was foretold
But a prognosticator knows
That's the way it always goes
With torture and the rest
And every means put to the test
A tad uncivilized at best
Welcome to the Wild West

Only he understands the constitution
Only he knows the definition
Of who's eligible to run and be elected
After all our private thoughts have been inspected
He has rightfully proclaimed his divine qualification
And a true believer as per '2' Corinthians
Let the Pope regret his decision not to anoint him
And let ISIS overrun the Vatican

With walls to be built
With wars to win
Our safety to insure
And American greatness to restore
Praise him!
Praise him!
Praise him!
And Vise Lady Sara
Of immaculate misconception
Praise them!
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 12:49pm PT
The phone is guarded by encryption.

Do any of us [outsiders] know with any certainty that there is no way around this? You seem to have taken a big bite off the Apple.

Making something work a certain way [like 3 tries] is different than fooling the machine in other ways so it doesn't see 3 tries [the back door].

We nor apple can say there is no way around the current 3 try limit.

Apparently there have been hackers that beat the unhackable system and Apple software mechanics.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 01:22pm PT
It seems the gents that wrote that report don't know the hand that feeds.

I believe that Hal Abelson, the lead author, is a member of JASON. I strongly suspect that Abelson knows precisely what he's doing.
Reilly

Mountain climber
The Other Monrovia- CA
Feb 20, 2016 - 01:29pm PT
I wish y'all were more consistent. One day yer all begging the gubmint to
come down hard on the Malheur Malcontents and the next day yer telling 'em
to back off from iPhone Malcontents. You want big gubmint, or knott?
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 01:35pm PT
Explain how that is inconsistent, Reilly.

I know it's challenging for you, but try to do it with some amount of precision.

A starting point: it is not difficult to both support an active government, and to say that that government should not have unlimited powers. In fact, that balance is the PRECISE reason that the founders inserted the Bill of Rights into the Constitution and indeed their precise reason for drafting the Constitution in the first place.

The dangers of not striking a balance here are vividly illustrated by authoritarian dystopias like Maoist China or communist East Germany or the Shah's Iran or Hitler's Germany on the one hand, and lawless anarchies like Somalia on the other.
Jeremy B.

climber
Northern California
Feb 20, 2016 - 01:48pm PT
How can something be both hard to detect and at the same time stick [out] like a sore thumb?

The number of FBI agents is not that large. The number of agents working on counterterrorism is a small fraction of that.

Dingus, your point about the X-tries limit is valid. That this question is before the court means Apple didn't make the design as secure as they could (and I suspect it's been corrected in current models).

To use a crude analogy, the software is the gatekeeper in a guard shack outside a bunker. You tell the gatekeeper the password, he radios it in, and another guy inside (representing the crypto chip hardware) opens the gate if it's correct. The flaw is that it should be the job of the guy inside to hit the self-destruct after X tries, rather than the job of the guy outside. Apple likely assumed the guard shack was secure enough for most purposes at the time. (Hey, it seems to have stymied the FBI at least.)
madbolter1

Big Wall climber
Denver, CO
Feb 20, 2016 - 01:56pm PT
We get out of manipulating the Middle East, and pretty soon much of the problem for US will go away.

Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 02:07pm PT
spiny Norman,

I read the long report. 2 points of admission stand out:

Lawmakers should not risk the real economic, geopolitical, and strategic benefits of an open and secure Internet
for law enforcement gains that are at best minor and tactical.

It
is no surprise that this report has ended with more questions than answers, as the requirements for exceptional access are still vague. If law enforcement wishes to prioritize exceptional access, we suggest that they need to provide evidence to document their requirements and then develop genuine, detailed specifications for what they expect exceptional access mechanisms to do.

They do not seem to be against such interception but ask how do we want or would do it to preserve global security. In other words they seem to have no problem with the voice interception in the name of terrorism as to be a violation of the rights of privacy.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 02:13pm PT
madbolter1,

what happens here?

and pretty soon much of the problem for US will go away.

Is Trump getting elected?
pyro

Big Wall climber
Calabasas
Feb 20, 2016 - 02:16pm PT
apple will loose.. government is powerful

next thing the government will go after the PlayStations
Escopeta

Trad climber
Idaho
Feb 20, 2016 - 02:28pm PT
I wish y'all were more consistent. One day yer all begging the gubmint to
come down hard on the Malheur Malcontents and the next day yer telling 'em
to back off from iPhone Malcontents. You want big gubmint, or knott?

Ain't it funny?

And to think, these are the mental midgets they want to have access to all our personal information and health records....even my 70 year old mother doesn't fall for this sh#t.

Hacker uses social engineering to access DoJ, releases employee files from DHS, FBI.

http://siliconangle.com/blog/2016/02/08/hacker-users-social-engineering-hack-to-access-doj-releases-employee-files-from-dhs-fbi/
Sierra Ledge Rat

Mountain climber
Old and Broken Down in Appalachia
Feb 20, 2016 - 02:28pm PT
I've had it with Apple

Their products are not user friendly. Their software is counter-intuitive and using it is like playing with a digital puzzle. Customer service? What customer service? I cannot understand why the Apple products are so popular.

Now this.


madbolter1

Big Wall climber
Denver, CO
Feb 20, 2016 - 02:41pm PT
Is Trump getting elected?

LOL... who knows?

But our many decades of manipulation there in the ceaseless quest for empire-building, control, and oil has produced the hatred of us that would otherwise not exist. Now, our government wants to invade EVERY DETAIL of our lives "to keep us safe" from a threat that IT caused.
Ken M

Mountain climber
Los Angeles, Ca
Feb 20, 2016 - 03:07pm PT
Even if cracking this phone would only affect this phone, Apple has already said they don't feel like doing it. That should be it. They don't feel like doing it. The government should leave them alone at that point.

Like I said before, EXACTLY the same reasoning as the Cowliphate.

Doesn't matter that a court has ordered this, we don't feel like doing it. End of discussion.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 03:14pm PT
Up to this point Apple had by all accounts complied with all warrants issued.

Apple has not violated any laws at this point. They have refused to comply with just a single court order, but so far they have not been placed in contempt of court. That may yet happen. We will see how Apple then responds.

In other words, the legal fight has not yet played out. And in that way, this battle is very much different from the "cowliphate" — where there were already multiple felony convictions and court orders that were being defied.

Try to show the slightest bit of patience before you draw such conclusions.

And no, the discussion is not at an end simply because you so assert. Though you are welcome to walk away at any time.
Spiny Norman

Social climber
Boring, Oregon
Feb 20, 2016 - 03:18pm PT
EFF: A technical perspective on the Apple case.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 03:58pm PT
spiny N,

that was a good description of what is involved and not yet known.

and will Apple come forth and say, "the task is unduly burdensome". This story has yet to unfold even for the facetious? Ken M.
healyje

Trad climber
Portland, Oregon
Feb 20, 2016 - 04:08pm PT
Apparently within 24 hours after the phone was in the fed's hands someone decided to change the phone's passcode - big mistake.
Brokedownclimber

Trad climber
Douglas, WY
Feb 20, 2016 - 04:24pm PT
I've given up chiming in on political threads for Lent. ;>) But--this "request" by the FBI is in violation of the 4th Amendment in the Bill of Rights. I'm all for Apple, in this instance.
monolith

climber
state of being
Feb 20, 2016 - 04:26pm PT
Healyje, the fbi asked the SB health department (owners of the phone) to reset the password of the iCloud account associated with the phone, which it did. This worked and they got access to the iCloud account.

But it prevented the phone from doing any more automatic iCloud backups, which is where we are now.
madbolter1

Big Wall climber
Denver, CO
Feb 20, 2016 - 04:31pm PT
something went wrong

So, government incompetency now places some burden on Apple to clean up the mess? I'm not sympathetic to that idea.
WBraun

climber
Feb 20, 2016 - 04:39pm PT
SB health department (owners of the phone) to reset the password of the iCloud account

Any real physical people from the actual owners behind this with real names who will come forth to actually confirm doing this?
monolith

climber
state of being
Feb 20, 2016 - 04:42pm PT
No names, but the department acknowledged what happened at the fbi's request.

http://www.sbsun.com/general-news/20160219/san-bernardino-county-tweets-it-reset-terrorists-icloud-password-with-fbi
WBraun

climber
Feb 20, 2016 - 04:45pm PT
The account was reset by a San Bernardino County employee

What was his name?
WBraun

climber
Feb 20, 2016 - 04:52pm PT
Obviously nothing matters to you since your the perfect brainwashed fool here as usual.

Nothing matters to you.

You read something on the internet and it's immediately all true .....
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 04:56pm PT
What was his name?

The paper that I read said the person is known to use some 20 aliases but here are a few they reported:

Crankaloon, Valley Man, Spirit Box, Werner the Bitch, Deaf Ears, Valley Yogi, and other titles the admin here would kick me off for trying even to encrypt them.

They also reported it common for him to FU.
WBraun

climber
Feb 20, 2016 - 05:01pm PT
Just as I thought

You have no name at all .....
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 05:07pm PT
BDC,

is in violation of the 4th Amendment in the Bill of Rights
.

You are Absolutely Right, but in all system of law there are trade offs as to which rights override the 4th. It seems that to make much further sense you will have to show how such a search is unreasonable in the particular context of the challenge. Or you can Lent it be?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 20, 2016 - 05:16pm PT
werner,


just teasing. I will always appreciate the photo of the young man in front of a profusely wired Analog Computer that was posted here once upon a time.

And I do agree with your observation of what happens here:

You read something on the internet and it's immediately all true .....

Even Ed Hartouni is guilty of passing this kind of trash around.
Happiegrrrl2

Trad climber
Feb 20, 2016 - 05:35pm PT
Who the hell needs encryption on
their phone other than spouse-cheaters and criminals?

Maybe a person who lives in Syria these days might appreciate it. Or a citizen of China.

Or, try THIS one on:

Plenty guys who have gone through divorce/child custody issues have railed on and on, and on again, as to how their ex lied, manipulated, coerced and launched all manner of evil. Suppose such an ex, who has accused you of beating them, or sexually abusing the kids, calls your phone a few times in a manic rant about how you this and that and such and such.... You say "WTF? You're crazy!" but they go on, start crying with "I can't believe you are denying this. I have the bruises!!!"

Or....maaaaybe she really DOES have the bruises.....

Now, laws have allowed phones to be accessed under certain circumstances, and guess what - when it comes to a child's safety WHO would want to risk that?

You all(the royal PITA you all, not any of you all in particular) have written on this very site as to how, when the police/courts get told you're the bad guy, there's no saving yourself from that judgement.

STILL want your phones to be able to get cracked at a court's order?
madbolter1

Big Wall climber
Denver, CO
Feb 20, 2016 - 06:16pm PT
Who the hell needs encryption on
their phone other than spouse-cheaters and criminals?

How about people like me that have a lot of company info on the phone and don't want that available to anybody who might steal the phone or if I happened to lose it?

Also, since when did we as a nation decide that "spouse-cheaters" are so baaaddddd that their desire for privacy is utterly insignificant? Since when is this nation in the business of deciding moral values for individuals?
Chaz

Trad climber
greater Boss Angeles area
Feb 20, 2016 - 06:24pm PT
I go the other way with mine. I assume I'm going to lose it, leave it in a bar, or do like I did with my last one: Threw it in the ocean ( can you hear me now? )

No banking on the phone, no internet shopping. No passwords. No aps. No music. Nothing more personal than the phone numbers it's had run through it. I don't even post on here from the phone.

If my phone ever asked me for an *encryption code*, I'd be screwed, because I don't know it. It'd be tied up like Farook's phone.
WBraun

climber
Feb 20, 2016 - 06:47pm PT
Terrorists use pay as you go throw away phones.
Chewybacca

Trad climber
Kelly Morgan, Whitefish MT
Feb 20, 2016 - 07:47pm PT
Be afraid, be very afraid. Make sure the next generation is also afraid, very afraid.

Obviously the San Bernardino shooters succeeded in their goals.
Bargainhunter

climber
Feb 20, 2016 - 08:02pm PT
The two idiots who killed a bunch of innocent civilians in San Bernardino are now dead. Case closed. I don't care what's on their phone. I don't care who they communicated with. I don't care if they claim motivation from ISIS. If they have friends who do the same, those friends will be killed too. Yawn, next.
Ed Hartouni

Trad climber
Livermore, CA
Feb 20, 2016 - 08:13pm PT
Even Ed Hartouni is guilty of passing this kind of trash around.

whoa! even me?...
pyro

Big Wall climber
Calabasas
Feb 20, 2016 - 09:18pm PT
No banking on the phone, no internet shopping. No passwords. No aps. No music. Nothing more personal than the phone numbers it's had run through it. I don't even post on here from the phone.

Chaz suit urself those Smart Phones are a BIG part of everyday Communication HUGE leap for Mankind...

Just buy Apple Laptops because that's what they are good at!
The story of JObs start up is the only reason people love that kinda of product.. I love that story too..
WBraun

climber
Feb 20, 2016 - 09:23pm PT
Smart Phones are a BIG part of everyday Communication HUGE leap for Mankind

No they're not.

They're just plain caveman tools that set mankind millions of years back.

The advance class is not fixed in the material world ......
monolith

climber
state of being
Feb 21, 2016 - 07:13am PT
FBI Admits It Urged Change Of Apple ID Password For Terrorist’s iPhone

http://www.buzzfeed.com/johnpaczkowski/apple-terrorists-appleid-passcode-changed-in-government-cust#.aw0xEKO0n

WBraun, still no actual name of the person who clicked "reset my password now", so this article is probably all made up.
Flip Flop

climber
Earth Planet, Universe
Feb 21, 2016 - 07:14am PT
Aaaaaaaaargh!

If you want privacy then don't put your sh#t on the public internet.
People R Stupid.
Flip Flop

climber
Earth Planet, Universe
Feb 21, 2016 - 08:01am PT
Privacy doesn't include putting a locked armored van in a thoroughfare......among a long list of other things that are not your constitutional right to privacy.
Flip Flop

climber
Earth Planet, Universe
Feb 21, 2016 - 08:43am PT
Regarding Snowden,
(God knows I've never actually influenced anyone's thought but here we go again.)

If Snowden released private and protected personal information then isn't he the corrupt agent? Are his supporters for freedom of information? And if so, why should we collectively ignore free information? To what end? For what cause?

I'm not fixed in my opinion and these questions merely represent the horizon of my interest. As I don't have anything to hide, I also wonder something something something.
madbolter1

Big Wall climber
Denver, CO
Feb 21, 2016 - 10:07am PT
If you want privacy then don't put your sh#t on the public internet.

Having "sh#" on your personal, encrypted phone has no relation to the "public internet."

Making a point-to-point phone call, text, or email over encrypted protocols has no relation to the "public internet."

The government has SO changed the terms of the debate that THEY have forced US to literally move the bar of our expectations, and THAT is the most outrageous part the the "privacy debate" today. What we took for granted regarding privacy a decade ago turns out to not even then have been what reality actually was! Then, instead of rolling the HEADS of the pricks that were raping us then, we just capitulated and said, "Ohhh... okay. If it keeps me even an unmeasurably shred more 'safe,' then I guess it's what you have to do."

And now we DEBATE how much rapage we shall submit to, rather than to say flat-out: "Stop raping us! NOW! Or there WILL be consequences!"
Marlow

Sport climber
OSLO
Feb 21, 2016 - 10:13am PT

"In a tale, Christ comes back to earth in Seville at the time of the Inquisition. He performs a number of miracles (echoing miracles from the Gospels). The people recognize him and adore him, but he is arrested by Inquisition leaders and sentenced to be burnt to death the next day. The Grand Inquisitor visits him in his cell to tell him that the Church no longer needs him. The main portion of the text is devoted to the Inquisitor explaining to Jesus why his return would interfere with the mission of the Church.

The Inquisitor frames his denunciation of Jesus around the three questions Satan asked Jesus during the temptation of Christ in the desert. These three are the temptation to turn stones into bread, the temptation to cast Himself from the Temple and be saved by the angels, and the temptation to rule over all the kingdoms of the world. The Inquisitor states that Jesus rejected these three temptations in favor of freedom, but the Inquisitor thinks that Jesus has misjudged human nature. He does not believe that the vast majority of humanity can handle the freedom which Jesus has given them. The Inquisitor thus implies that Jesus, in giving humans freedom to choose, has excluded the majority of humanity from redemption and doomed it to suffer.

Despite declaring the Inquisitor to be an atheist, Ivan also has the Inquisitor saying that the Catholic Church follows "the wise spirit, the dread spirit of death and destruction," i.e. the Devil, Satan. He says "We are not with Thee, but with him, and that is our secret! For centuries have we abandoned Thee to follow him." For he, through compulsion, provided the tools to end all human suffering and for humanity to unite under the banner of the Church. The multitude then is guided through the Church by the few who are strong enough to take on the burden of freedom. The Inquisitor says that under him, all mankind will live and die happily in ignorance. Though he leads them only to "death and destruction," they will be happy along the way."
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 10:23am PT
fMarlow,

today is Sunday[does this justify a sermon?] but I will make do with my ignorance rather than bite on a promise that we could all lose our ignorance. For proof: I do see a lot of purely stupid Christians but in making my choice I have taken on the burden of freedom.
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 10:24am PT
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


Certainly a phone is a personal effect and any data on that personal effect should be interpreted as "papers." The question then boils down to what is "unreasonable" — and to what extent everyone must cede a measure of security so that a small minority might have warrated searches of their papers executed.

The fundamental argument of Apple — and of essentially the entire technical security community — is that it is impossible to execute the type of search currently sought by the FBI without also violating the right of the vast majority "to be secure in their persons, houses, papers, and effects."

IANA constitutional L, but when looking at the 4th Amendment, it would appear that that first sentence conveys the primary thrust of the passage.
Norton

Social climber
Feb 21, 2016 - 10:28am PT
One incident that may well give valuable security information does not Slippery Slope into
a future loss of privacy mandate.

You made your point, Apple, and you have been congratulated.

Now quietly unlock the phone

With Dingus on this one
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 10:30am PT
Again, Norton, Apple probably cannot do that without compromising the security of all iOS devices including all iPhones and tablets.

There is a very real security trade-off here.

http://www.nytimes.com/2016/02/21/technology/apple-sees-value-in-privacy-vow.html
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 10:32am PT
SN,

without compromising the security of all iPhones

I do see your link but let's see your summarizing skills?


How so?

Put the iphone in liquid nitrogen. Sever the RAM memory. Warm it up and read it.
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 10:36am PT
Here's a good summary from the Electronic Frontier Foundation:
https://www.eff.org/deeplinks/2016/02/technical-perspective-apple-iphone-case

Here's a more general white paper from an extremely distinguished panel of some of the best computer security experts in the world:
https://assets.documentcloud.org/documents/2158970/data-security-report.pdf
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 10:37am PT
SN,

so can't you summarize?

Drop a bomb. Let's see some pieces fly? Or isn't paper all that good?
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 10:38am PT
Why should I summarize again when there's a careful and proficient summary at the first link above? And I already posted the Abstract for the second document upthread.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 10:45am PT
I have read that paper and they merely suggest difficulties.

It is up to the Big Apple to declare that the task places an "unduly burden on them," because such and such is the case.

The papers you cite do not exactly know but only speculate how Apple has their security locks.

Maybe I have missed something and you can pull it out from between the sentences?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 11:02am PT
SN,

to give you an analogy about simply citing the document.

Christians say, "here the proof is in the Bible" and you suggest here the proof is in these papers because they are authorities.

Well, the bar here on ST is a little higher than merely spouting lip service as to the source. Show us what you conclude from their presentation.
Norton

Social climber
Feb 21, 2016 - 11:11am PT
Again, Norton, Apple probably cannot do that without compromising the security of all iOS devices including all iPhones and tablets.

Spiny, I admit to knowing very little about how Iphones are actually built.

You are saying that Apple cannot give the unlock code or new password of whatever to the FBI without compromising the security of MY Iphone and all hundreds of millions of others all over the world?

Somehow I just have a lot of trouble believing that but please help my understand?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 11:29am PT
Norton,

please have patience with SN; it takes a while to find something that doesn't exist!
overwatch

climber
Arizona
Feb 21, 2016 - 11:33am PT
Come on, Spiny, you have been given your assignment now finish your homework.

Spiny trying to keep up with Dingus' work load
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 11:34am PT
That's correct, Norton.

That is Apple's argument and there is every reason to believe that that Apple's argument is correct. Not least because they will have to be able to defend their position in what we may assume will be ongoing court proceedings.

Apple has no motive to stake out a technically indefensible position here. They could, after all, have just caved to the FBI's request — and most people (as several on this thread have already demonstrated) would not care.

So ask yourself: why is Apple drawing a line here?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 12:15pm PT
monolith,

again, are you passing the Bible as fact? I just don't buy that stupid line of sh#t.

I have read these papers and have reported above what they report as the case. Their recommendation seems unsupportable given what they admit they do not know about Apple's iphone works.

The hardware and software used in the iphone is Apple's proprietary design. These authors admit they do not know how and how much security Apple has on this iphone. Case rests: it is Apple turn to talk> Or is Spiny Norman going to present his proof read case and not an abstract?

The evidence simply is not in these papers! What the hell? can't you guys conclude a damn thing and report on it with statements from the document to substantiate your claims?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 12:33pm PT
So ask yourself: why is Apple drawing a line here?

Because they have sold their iphone as invincible and it simply is not. They have some face to save.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 12:42pm PT
Apple stock will plummet when they pay the lawyers, engineers and court costs for all the defence -- merely to save face?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 12:45pm PT
overwatch,

I am still laughing at that photo of Spiny! it is a gut buster!!
monolith

climber
state of being
Feb 21, 2016 - 12:48pm PT
Dingus, do you know all the details of the security there is on Apple's phone?

case rests.

In other words, why should we trust your opinion over the EFF?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:00pm PT
No! and only Apple does. So what do you mean your case rests? I take that you mean you are conceding that since I know nothing about Apple how could I have a case.

My case is that since all Apple's Security mechanisms are proprietary no one but Apple might have a case as to why unlocking the device should not proceed. Others speaking before Apple talks, cannot justifiably rule that the task is unduly burdensome--they have no evidence as to how simple or difficult an unknown task is with unknown mechanisms? maybe.
monolith

climber
state of being
Feb 21, 2016 - 01:04pm PT
Apple stock will plummet when they pay the lawyers, engineers and court costs for all the defence -- merely to save face?

You've got to be kidding, Dingus.

If their stock plummets, it won't be bacause they can't afford lawyers, engineers and court costs.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:05pm PT
The markets work on fear and speculation--not love
monolith

climber
state of being
Feb 21, 2016 - 01:09pm PT
Dingus, Apple didn't invent public key cryptography. They would be a fool to invent their own.

As noted in the EFF article, they use variations of public standards that have been tested thoroughly by experts in the security field.

Just because we don't have their code in front of us doesn't mean we cannot deduce the general principles they use.


Please tell us when you think Apples stock has taken a hit over this. Should be easy to produce a chart in a month or two where you can point to this massive hit you say is coming. I won't hold my breath.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:11pm PT
You are speaking out your ass. You do not know the design.

The general case does not prove the specific case.

FYI it is code and hardware in this situation.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:15pm PT
Please tell us when you think Apples stock has [will take]n a hit over this.

Court expenses cut into profits and those with stock wanting a good bi-yearly dividend/payoff will not take a chance when they see other stocks having less non productive payouts. This response may be thought of as fear based.
monolith

climber
state of being
Feb 21, 2016 - 01:24pm PT
lol. You have know idea how much cash and assets Apple has do ya Dingus?

We'll know soon enough if apple's stock is taking a hit over this. Analysts will note the cause with great alarm.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:28pm PT
I am telling you how an investor thinks. I do not need to now how much cash Apple has. Obviously if they keep it all there is little for dividends.
monolith

climber
state of being
Feb 21, 2016 - 01:37pm PT
We'll see what happens to dividends this quarter.

I'll remind you after the next ex-dividend date in May.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:40pm PT
Good Monolith,

The desire to switch stock depends on how long the case carries on and reported costs.
monolith

climber
state of being
Feb 21, 2016 - 01:45pm PT
LOL, you keep talking about court costs.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 01:49pm PT
Dingus, Apple spends exponentially more in Atty fees on the innumerable patent fights with competitors.

Even if this costs several million in fees will be money well spent. Attorneys fees such as this are just a part of the cost of doing business (and are literally "peanuts") for a large tech company.

Sorry to say, you don't really know what you are talking about.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 01:57pm PT
exponentially

Hardly, most people that use this word do not know what they are talking about.
pyro

Big Wall climber
Calabasas
Feb 21, 2016 - 02:10pm PT
Dingus I wonder if IBM would react the same way to the Fed's the same way apple did or has?
Ken M

Mountain climber
Los Angeles, Ca
Feb 21, 2016 - 02:24pm PT
It should be noted that Apple is playing with fire.

They are used to dealing with the media, not the FBI.

They are now talking to people, who if they personally lie, they are at risk of serious jail time, just for the lie. Ask Scooter and Martha.

Particularly since this is so high profile. A lesson is in order.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 02:47pm PT
pyro,

I was just wondering the same thing about IBM as I walked the dog a short bit ago.

They won the first rounds against Control Data by outright lying.

Ken M,

I see your point. The stakes are little bigger than usual.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 02:48pm PT
Yes. I know what exponentially means and I am correct in its usage here.

On the other hand, several of your pronouncements lack any factual basis.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 02:49pm PT
sketchy,

what is the independent variable[in your statement of exponentiality]?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 02:51pm PT
sketchy,

f
this costs several million in fees


You show no sense of perspective: How about several hundred million?
monolith

climber
state of being
Feb 21, 2016 - 03:02pm PT
You show no sense of perspective

Classic, Dingus. You really stepped into it.

How about 200 Billion in cash reserves.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 03:04pm PT
You seriously believe that fighting this will cost more than 10% of what Apple has spent on Patent fights? This is a purely legal issue to be decided. There are no disputed facts of consequence. No protracted discovery.

And Ken, who at Apple is giving testimony or providing statements to the FBI? They merely said No we are not complying.

Dingus, how much actual experience do you have with complex business litigation? None?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:05pm PT
How about 200 Billion in cash reserves
.

Where did you pull this number from? Net worth Bill Gate now $72 billion; he was up to $92 billion.
monolith

climber
state of being
Feb 21, 2016 - 03:08pm PT
Bill Gates is not Microsoft, and that's not his cash.

Wow.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:08pm PT
sketchy,

the challenge I ask was what is the independent variable. Is your statement intended to be some kind of a strawman argument that I might accept?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:09pm PT
Bill Gates is not Microsoft.
I never said he was.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:10pm PT
Mono,

the questions at hand is where did you come up with $200 billion cash?
monolith

climber
state of being
Feb 21, 2016 - 03:12pm PT
It's microsoft that is sitting on that kind of cash, not Bill Gates

You still haven't figured what Apples cash reserve is.

Try using this thing called Google.

Type 'apple cash reserves'.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 03:12pm PT
Read my post. I define the independent variable exactly and in context. You, on the other hand have very little understanding of what you talking about. But, don't let that stop you.

Futility is debating with those with no knowledge of the subject. I'm going back to the Sunday crossword puzzle.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:13pm PT
Apple isn't really sitting on $216 billion in cash - MarketWatch
monolith

climber
state of being
Feb 21, 2016 - 03:15pm PT
You'll find many estimates in the 200B range.

If apple only had 100 Billion cash reserves, how many more times is that then say 200 million spent on a legal fight?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:16pm PT
sketchy,

Tell me what the independent variable is. You like to tell us that you know but cannot present it -- you big bullshitter. Stand up and Deliver.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:19pm PT
I'm going back to the Sunday crossword puzzle.

Probably good as I can see your expertise is not math.
monolith

climber
state of being
Feb 21, 2016 - 03:20pm PT
Speaking of math, I'm still awaiting your answer, Dingus.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:23pm PT
Monolith,

maybe the cost will be $ billions? It certainly will be more than several million. Maybe my perspective is low?

But I see your point about maybe not to much cost to them as this expenditure can be wrote off and thought of as good advertising.

monolith

climber
state of being
Feb 21, 2016 - 03:23pm PT
Oh, now it's billions.

Good grief, Dingus. Whatever it is it will be peanuts compared to their cash reserves alone, not even compared to their valuation.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 03:23pm PT
Since reading comprehension is not your strong suit, the independent variable is the cost of this legal fight with the FBI.

And making an issue out this is just your way of avoiding an acknowledgment of your complete lack of understanding of the subject at hand.

And, remind me, what actual experience do you have that qualifies you to opine about the cost of this type of litigation?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:24pm PT
locker the crooker,

please tell us more.
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 03:25pm PT
Damn, that is a picture of me right now, Overwatch. No deviation from reality at all. (It's grant writing time in Spiny's research laboratory.) Well done, doode.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:27pm PT
sketchy,

if that cost is the independent variable you have no data to ascertain that it's curve is exponential.

Exponential decay is quite common in Nature and Processes but exponential growth other than within a very small region is not sustainable.
looking sketchy there...

Social climber
Lassitude 33
Feb 21, 2016 - 03:29pm PT
Thank you for proving my point.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:32pm PT
sketchy,

Such Assertiveness. Wow wow wow Where did you pick up this useless skill?

If you think I proved your point you have just substantiated that you know very little if any about exponential growth. You do know how to spell the word. You can talk the tall but you cannot walk ....

You are a great wind bag with hedging skills!!
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 03:36pm PT
http://www.fool.com/investing/general/2015/11/15/apple-cash.aspx

("Source: SEC filings.")
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:38pm PT
locker

how is it that you see

looking sketchy there isn't looking very sketchy...
?

fill me in on the details
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 03:42pm PT
spiny Norman,

the keynoted source SEC filings would sound pretty good.

But isn't your source Motley Fool?
Escopeta

Trad climber
Idaho
Feb 21, 2016 - 04:12pm PT
Come on Werner. Get with the program.


Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 04:34pm PT
Escopeta,

Is the mtn ebike in site?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 04:48pm PT
Locker,

his responses appear to be based on actual knowledge of the law...

you say appear and I understand that word use as he has a very assertive skill in sounding like he has made a point but one sees in these innuendo remarks that he never puts the spike through the coffin when you follow him through his song and dance. He just makes another groundless assertion rather than stand and deliver. You can see how evasive he was on the subject of exponential growth. If that subject[exponential ] has nothing to do with the case as he later claims, why did he first present it?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 04:58pm PT
locker,

he appears to have gone where as you and I have hung around in these discussions through thick and thin.

And by the way your off the wall juxtapositions always get me laughing. And so the pun like comparison of sketchy.
Happiegrrrl2

Trad climber
Feb 21, 2016 - 05:10pm PT
exponential growth


...an argument which has squat to do with the topic. It's like arguing that someone misspelled a word; low quality debate. His point was quite clear, whether or not you agree with that point or not. If you cannot see his point for your forest of definitions....you might consider the fact that you're wound a little too tightly.
TradEddie

Trad climber
Philadelphia, PA
Feb 21, 2016 - 05:17pm PT
If those shooters had a safety deposit box and the bank refused to attempt to open the box, claiming that opening the box would cause them to lose their customers trust, or more outrageously, that opening the box would encourage thieves to break into their bank, would you all feel the same way?

If Apple's encryption is genuinely impossible or unduly difficult to break, they should be proud to say that. Otherwise, I can't see how they can simply refuse to help.

TE
Spiny Norman

Social climber
Boring, Oregon
Feb 21, 2016 - 05:24pm PT
spiny Norman,

the keynoted source SEC filings would sound pretty good.

But isn't your source Motley Fool?

If they disagreed with the broad consensus in the financial press, I might have more reason to doubt Motley Fool's reporting of the SEC filings. But they agree, so I don't.

If you don't think that's right, no one's stopping you from digging out the SEC numbers yourself.
Happiegrrrl2

Trad climber
Feb 21, 2016 - 05:29pm PT
If those shooters had a safety deposit box and the bank refused to attempt to open the box, claiming that opening the box would cause them to lose their customers trust, or more outrageously, that opening the box would encourage thieves to break into their bank, would you all feel the same way?

Not an applicable analogy.


Let me tell you that hackers the world over are currently working to put the feather in their cap of being the first to disable the encryption as we type.

Let us HOPE to hell they do not succeed, because if/when someone does, all your phone are belong to us(so to speak)
Chaz

Trad climber
greater Boss Angeles area
Feb 21, 2016 - 05:30pm PT
"San Bernardino County, who owned the iPhone... paid for but never installed a feature that would have allowed the FBI to easily and immediately unlock the phone..."

http://www.sbsun.com/general-news/20160221/common-software-would-have-let-fbi-unlock-terrorists-iphone




Easily and immediately. Wow. One S.B. County cubicle-tard could have probably handled it himself, without even setting foot outside of his government cubicle.

But no. If you're in government, YOU don't do the work - especially if it involves thinking ahead, or just thinking - you use force and coercion to make someone else, like Apple, do your work.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 05:33pm PT
Happiergrrrl2,

exponential growth


...an argument which has squat to do with the topic. It's like arguing that someone misspelled a word; low quality debate. His point was quite clear, whether or not you agree with that point or not. If you cannot see his point for your forest of definitions....you might consider the fact that you're wound a little too tightly.

It seems you are the one that is wound quite tightly to have been standing on the side lines and then jump into this topic and further show that you were not paying attention to the particular topic happening then. Rising Costs.

you dirty dog fighter

Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 05:59pm PT
Spiny Norman,

I have Conceded. Apple has quite a bit of money they could throw at this case if anything develops.
apogee

climber
Technically expert, safe belayer, can lead if easy
Feb 21, 2016 - 06:03pm PT
"Where Safety trumps Leaving No Trace"


Oh, brother.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 21, 2016 - 06:05pm PT
Locker,

are you saying we would have just as good of security with Samsung since nothing with them is traceable?

Play it Again Sam
zBrown

Ice climber
Feb 21, 2016 - 06:13pm PT
Holy Terrorism Batman


When does something cross the line into terrorism. Does it depend on having a cell phone?

41 men targeted but 1,147 people killed: US drone strikes – the facts on the ground


“Drone strikes have been sold to the American public on the claim that they’re ‘precise’. But they are only as precise as the intelligence that feeds them. There is nothing precise about intelligence that results in the deaths of 28 unknown people, including women and children, for every ‘bad guy’ the US goes after,” said Reprieve’s Jennifer Gibson, who spearheaded the group’s study.
WBraun

climber
Feb 21, 2016 - 07:04pm PT
Terrorists don't use iPhones.

You've been 0wned .......
Escopeta

Trad climber
Idaho
Feb 21, 2016 - 07:47pm PT
While we are on the topic of definitions and low quality debate. The proper term is "SAFE Deposit Box".

There is no such thing as a Safety Deposit Box.
fear

Ice climber
hartford, ct
Feb 21, 2016 - 09:30pm PT
"War on Drugs"

"War on Communism"

"War on Terrorism"

"It's for the children"

L-I-E-S

1984 was an instruction manual.

healyje

Trad climber
Portland, Oregon
Feb 22, 2016 - 03:33am PT
But no. If you're in government, YOU don't do the work - especially if it involves thinking ahead, or just thinking - you use force and coercion...

Exactly the sort of generic hyperbole which, while used to great effect over the past fifty years, just turned on the gop and ate it whole.
ECF

Big Wall climber
Ridgway CO
Feb 22, 2016 - 03:58am PT
I think it was Plato who said,
"Democracy is inherently flawed, as all opinion are not equal."

Benjamin Franklin said, "Those who would trade liberty for safety, deserve neither."

Do I need to add more, from Helen Keller, Josef Göebbels, Harry S. Truman, Noam Chomsky, etc.?

Or shall we just stick to the more modern great thinkers like W...
"If you're not with us, then you're against us."
"Fool me once, shame on you. Won't get fooled again."


Defend the constitution at all costs.
Anything else is treason.

But treason is the law of the land now, as we vote ourself more bread and circuses.
healyje

Trad climber
Portland, Oregon
Feb 22, 2016 - 05:10am PT
But treason is the law of the land now.

More of the same...
fear

Ice climber
hartford, ct
Feb 22, 2016 - 06:30am PT
Terrorists don't use iPhones.

You've been 0wned .......

Exactly right... I believe the mafia (greatly funded by the "War on Alcohol") figured out a long time ago not to use phones.

The real criminals aren't discussing plans on I-thingies...
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 07:04am PT
Milktoast,

Brown Shirts
..............
all because they are scared.

And on the other side:

It seems the yellow shirts are quite scared of losing their P-R-I-V-A-C-Y in this matter.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 07:17am PT
Calls don't go through...


you probably don't know how to use them?
Reilly

Mountain climber
The Other Monrovia- CA
Feb 22, 2016 - 07:30am PT
I grew up in Chicago. Those guys weren't afraid of using phones.

"Vinny, let's talk! Meet me at Angelo's. We'll have some pasta."

Our favorite pizza joint had a back room with 'Employees Only' on the door. Saw a lotta guys
go through that door that didn't look like they made pizza for a living. Ya know what I mean?
WBraun

climber
Feb 22, 2016 - 07:48am PT
I lived in downtown Chicago too.

Rough town man.

You have fight to survive there ....
Norton

Social climber
Feb 22, 2016 - 09:18am PT
San Bernardino victims to oppose Apple on iPhone encryption

Some victims of the San Bernardino attack will file a legal brief in support of the U.S. government's attempt to force Apple Inc to unlock the encrypted iPhone belonging to one of the shooters, a lawyer representing the victims said on Sunday.

Stephen Larson, a former federal judge who is now in private practice, told Reuters that the victims he represents have an interest in the information which goes beyond the Justice Department's criminal investigation.

"They were targeted by terrorists, and they need to know why, how this could happen," Larson said.

http://www.reuters.com/article/us-apple-encryption-victims-exclusive-idUSKCN0VV00B
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 12:51pm PT
Apple vs. FBI: Feds Have More Support, Survey Says



http://www.nbcnews.com/storyline/san-bernardino-shooting/apple-vs-fbi-feds-have-more-support-tech-giant-survey-n523686

It is time to kick that $$middle man$$ giant in the ass.
the Fet

climber
Tu-Tok-A-Nu-La
Feb 22, 2016 - 02:37pm PT
If those shooters had a safety deposit box and the bank refused to attempt to open the box, claiming that opening the box would cause them to lose their customers trust, or more outrageously, that opening the box would encourage thieves to break into their bank, would you all feel the same way?

If Apple's encryption is genuinely impossible or unduly difficult to break, they should be proud to say that. Otherwise, I can't see how they can simply refuse to help

The analogy would be the safe deposit box has a fail safe to destroy all inside unless you use the only key. The fbi is forcing the manufacturer of the box to create a skeleton key that will open any box. And oh yeah every time the fbi has a skeleton key before it lost a copy and thieves ended up with it. And you have the account numbers and passwords to the accounts with your life savings in your safe deposit box.

Yes I'd feel the same way. I'm not going to give up my privacy for something that may or may not help in a single terrorism case. And terrorism in general has less of a chance of killing you than being hit by lightning. If you really want to reduce risk lets make the speed limit 45 mph nationwide. That would save about 20,000 Americans per year. Way more than have ever been killed by terrorists. Sound good?

Apples encryption IS impossible to break. The fbi wants them to create a new operating system that defeats the encryption. Experience has shown if this is done that special OS will be leaked and it will render apples encyption worthless.
blahblah

Gym climber
Boulder
Feb 22, 2016 - 02:53pm PT
Yes I'd feel the same way. I'm not going to give up my privacy for something that may or may not help in a single terrorism case. And terrorism in general has less of a chance of killing you than being hit by lightning. If you really want to reduce risk lets make the speed limit 45 mph nationwide. That would save about 20,000 Americans per year. Way more than have ever been killed by terrorists. Sound good?

You have no idea what the chances are being killed by a terrorist are unless you have access to classified information.
Just noting how many people have been killed by terrorists in the past doesn't necessarily give meaningful information as to what may happen in the future.
As they say, on the day before Thanksgiving, the turkey may think the odds of him being eaten by the nice man who gives him food are zero.
the Fet

climber
Tu-Tok-A-Nu-La
Feb 22, 2016 - 03:38pm PT
I have a very good idea of my chance of being killed by a terrorist are. EXTREMELY small. If you are worried about terrorism you are buying into the media sensastionalism and thinking exactly how the terrorists want you to think.

I suggest you take a basic statistics class blahblah. Even if there were a huge terrorist attack it would only slightly change the statistics. Compare that to 30,000 people killed in car crashes every year in America. What's the real danger?

And aren't you a climber? You take that risk but are worried about terrorism?

If the news covered all car crashes like they cover terrorism people would see where there real risks are and slow done / stop texting and driving / etc. and that would save WAY more lives than giving up privacy and freedom for terrorism.
madbolter1

Big Wall climber
Denver, CO
Feb 22, 2016 - 03:40pm PT
Just noting how many people have been killed by terrorists in the past doesn't necessarily give meaningful information as to what may happen in the future.

That sword cuts all ways, rendering all extrapolation from the past to the future irrelevant. Is that really how you want to argue?

Fet's point is well-taken, IMO. The USA is in a general panic over something incredibly unlikely to happen to any of us as individuals, which is just as stupid as millions of people getting into a froth about buying lottery tickets when the payout is high; their froth about it doesn't change the fact that again and again NONE of them are going to win (which is how the pay-out increases each "round").

Eventually somebody is going to win the lottery; eventually somebody is going to be killed in a terrorist act. But the odds of either are incredibly unlikely re. individuals.

The gubmint has gone far enough, in fact way too far, down the road of insisting on knowing every tiny and private detail of my life! Time to call a halt, Americans, and even march on Washington to tell the pricks to BACK OFF a LOT from where they already are. They don't get more; they get much less!
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 04:09pm PT
the Fet,

comparing auto deaths to death from terrorism? In auto deaths a high percentage of these people were the drivers of the crash vehicle or as killed passengers they consented to riding with the careless driver.

In death by terrorism 100% of these victims did not get to chose to not be a participant. They are pure victims without a choice.

The courts charges reflect this difference. Terrorists killing people are charged with 1st degree murder and a careless driver may get manslaughter.

It seems you guys suffer memory loss big time. An historical event is called 911. There could be more.

My private life must be boring -- the guy climbs on rock -- crazy man.

I don't need no stinkin privacy you Lilliputians cowards of data loss.

BASE104

Social climber
An Oil Field
Feb 22, 2016 - 04:19pm PT
I have a lot of affection for the 4th amendment. It is very clear, but court cases have constantly been reinterpreting it for ages.

Me? I will take the chance of dying from a terrorist than another which gives the government access to ALL of my data. Who knows what a guy like Trump would do with that data if he set his mind to it.

The problem is that it isn't temporary. It is permanent. Once they get that data they have it forever. Hasn't anyone mentioned that massive storage facility about to open in Utah?

Screw the NSA. I love to write emails and in the middle drop key words that they must look for, like Dirty Bomb. Just to try to waste their time.

My friends are used to it.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 04:27pm PT
Who knows what a guy like Trump would do with that data if he set his mind to it.

Healyje would say, more hyperbole.


The Writs of Assistance were around before the 4 th Amendment and they seem to get equal footing to any other challenge.

Base 104 so you have stated having no choice in your death is not a problem for you and do you think such an assertion should therefore now be universal? Talk about narcissism.


Reilly

Mountain climber
The Other Monrovia- CA
Feb 22, 2016 - 04:37pm PT
A lot of you have a vastly inflated perception of the importance of you
and yer data, especially in comparison with the worth of yer fellow citizens'
lives. Yeah, those phone numbers and selfies are really important.
Happiegrrrl2

Trad climber
Feb 22, 2016 - 04:47pm PT
Perhaps they are like me - not so much concerned about my own self, but for those like a Martin Luther King or a Margaret Sanger; someone who puts themselves out there as an activist for change - change that some people don't want to see happening.

Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 04:49pm PT
you cowards: I would jump in a frozen lake to save a stranger but I would shed no tears for being a broken man with a stolen cell phone.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 04:54pm PT
Happiergrrl2,

there are plenty of other encryption devices out there for activists to use. Some would call Terrorist Activists and YOU?
Happiegrrrl2

Trad climber
Feb 22, 2016 - 05:01pm PT
I would consider a person who bombs an abortion clinic to be a terrorist; a despicable human being, and you're correct that there are those who would say they are Activist.

And if one such person was the deceased holder of the iphone in question, I would stand by my belief that Apple should not provide the the code that cracks the phone.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 05:15pm PT
Happiergrrrl2,

well you are entitled to chose your God.
Happiegrrrl2

Trad climber
Feb 22, 2016 - 05:17pm PT
What does THAT mean?

FWIW, I believe "God" is not a separate entity from us. We are all "God," as is all that is in existence.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 05:27pm PT
Pantheism:

I suppose those kinds of beliefs do make rational discrimination a little more difficult?
Ken M

Mountain climber
Los Angeles, Ca
Feb 22, 2016 - 05:32pm PT
You guys must live in a world of fear:

At any time, the FBI can access your bank deposit box, with a warrant.
They can take you into custody, with a warrant.
They can lock you up forever, with a trial.
They can take away your kids, with a court action.
They can access your work records, with a warrant.

OMG, we are so insecure, and to unsecure in our lives.....
the Fet

climber
Tu-Tok-A-Nu-La
Feb 22, 2016 - 05:43pm PT
I don't need no stinkin privacy

Millions of us do appreciate our civil liberties and the fact that thousands of people have died to ensure we have them.

And this case isn't just about the American government getting access to our data, it's about forcing a company to break their currently unbreakable security and the fact that the break will probably end up in the hands of thieves and foreign governments.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 22, 2016 - 05:43pm PT
I think I live in a world of Abundance.
One can always make money.

But don't call me Job!


t'is sleep that knits the ravelled sleeve of Care.

It been Entertaining: Good Night Irene
the Fet

climber
Tu-Tok-A-Nu-La
Feb 22, 2016 - 05:52pm PT
mañana
monolith

climber
state of being
Feb 22, 2016 - 06:36pm PT
Use an 11 digit random passcode and it will take on average 127 years for the fbi to crack if they get Apple to allow rapid retry access and no erasing the data after 10 failuresor so.

http://theintercept.com/2016/02/18/passcodes-that-can-defeat-fbi-ios-backdoor/

But who wants to key in 11 digits every time?

Might be useful under certain situations, but not everyday use.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 04:37am PT
A new twist:

Bill Gates Backs FBI in Battle Over Killer's iPhone

see

http://www.nbcnews.com/storyline/san-bernardino-shooting/bill-gates-backs-fbi-over-apple-san-bernardino-iphone-battle-n524031

Now here is a Stand UP Man.
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 05:20am PT
blahblah wrote: 'You have no idea what the chances are being killed by a terrorist are unless you have access to classified information.'

That's not the case:

http://www.start.umd.edu/pubs/START_AmericanTerrorismDeaths_FactSheet_Oct2015.pdf

There's loads out there that quantifies the relative likelihood of being a victim of terrorism over all the other risks. It is tiny.

Steve
fear

Ice climber
hartford, ct
Feb 23, 2016 - 06:54am PT
It's not an unwarranted fear.

Power corrupts, remember that adage?

Government is a cancer due to that fact, and unfortunately a necessary one. Ours began benignly enough but has, and will continue to progress into something far more dangerous. We're certainly not special as history is chock full of examples of when governments become empires, collapse, turn inward, and attack their hosts.

Human nature, cycles of empires.

Stupid people in large groups motivated by a lesser number of evil sociopaths.

Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 07:14am PT
Fear,

your lines are Mostly Hyperbole

Power corrupts

Such an adage would apply to Apple also.
fear

Ice climber
hartford, ct
Feb 23, 2016 - 07:15am PT
We can choose not to buy i-thingies.... If you choose not to pay your taxes, men with rifles come and take them from you.

Big difference.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 07:21am PT
Blakley,

the comparison needs to be innocent victims where you have no choice.

I believe this society lets people Base Jump since the act is a risk they chose. Not so with the victims of Terrorism and note part of Bill Gates argument is innocent victims.

Do you have no Compunctions or were you just trying to present some data?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 07:27am PT
fear,

We can choose not to buy i-thingies..
..

The problems arise with some of those that bought them. Your solution is worthless.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 07:29am PT
DMT,

you tell me if you get shot with guns are you an innocent victim?

There is no writ of assistance in this case having to do with guns. It is iphones.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 07:53am PT
DMT,

Bill Gates seems to think the system is not so complicated. He suggest the likings to having merely having tied a ribbon around the hard drive. And he suggest, The ribbon can easily be cut.

You, I and even the technocrats can speculate all we want as to how Apple did the security measure for the iphone. It seems the way it was done is Apple's proprietary system. And who might know what this involved?

Until Apple gets on the court deck and explains to other experts how such and such an opening is so impossible none of us will know if Apple even has a case of "unduly burdensome".
Reilly

Mountain climber
The Other Monrovia- CA
Feb 23, 2016 - 07:55am PT
So, to paraphrase Joni Mitchell, they can take yer home to put up a parking lot but they
can't take yer precious iPhone?
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 08:02am PT
DMT

you can declare anything you want suggesting the irrelevancy of Bill Gates but I along the same lines of consistency can reasonably ask why would your speculation would be even be 1/10 as good? Your view by that standard must be IRRELEVANT.

Bill Gates was using metaphors and it seems wanted to communicate what he though the situation was to the non technical. He would likely know somewhat more than most technocrats about computer working and encryption.
Reilly

Mountain climber
The Other Monrovia- CA
Feb 23, 2016 - 08:07am PT
Since we all seem to be on our own high road do they ever intersect!
the Fet

climber
Tu-Tok-A-Nu-La
Feb 23, 2016 - 08:25am PT
^ that's a good question. Well Reilly's statement was. In this case could Apple break into the iPhone in question in a way that doesn't create a "skeleton key" that can break into any iPhone.

The way the fbi wants to do it causes a huge hole in their security. Maybe Apple could figure out another way to do it that is limited to that one phone.
the Fet

climber
Tu-Tok-A-Nu-La
Feb 23, 2016 - 08:27am PT
It's funny that a lot of the people who complain about a "nanny state" and government over each are okay with losing privacy to the government.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 08:39am PT
DMT,

more hyperbole
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 08:42am PT
Since we all seem to be on our own high road do they ever intersect!

There is no intersection for the paths of narcissism and caring.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 08:44am PT
No I explained why Gates used metaphors.

I meant babbling like this:

Maybe the Great Oz Gates can just cut that lil ole ribbon hisself!? File that in the talk is cheap round cabinet.

You can babble negatively all you want about Bill Gates but he is a recognized authority in computer encryption and YOU??
Lorenzo

Trad climber
Portland Oregon
Feb 23, 2016 - 08:51am PT
You can't make this stuff up.

In a new twist, the federal head of cyber security Donna Seymour resigned just before she was scheduled to testify before congress amid allegations that the data of 18 million federal employees was compromised by hackers.

Among the people who's phone security was breached was FBI Director James Comey.

http://www.nbcnews.com/news/us-news/opm-cybersecurity-chief-resigns-hearing-hack-federal-workers-n523941

The data was breached by negligence on the part of other employees and possibly Chinese hackers.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 09:01am PT
Lorenzo,

the reference you gave does not substantiate this statement:

Among the people who's phone security was breached was FBI Director James Comey.

The reference says:

FBI Director James Comey called the hacks an "enormous breach," saying his own data were stolen.


It would seem more factual if could leave a complete and accurate paper trail as I find no reference to his iphone.
blahblah

Gym climber
Boulder
Feb 23, 2016 - 09:11am PT
blahblah wrote: 'You have no idea what the chances are being killed by a terrorist are unless you have access to classified information.'

That's not the case:

http://www.start.umd.edu/pubs/START_AmericanTerrorismDeaths_FactSheet_Oct2015.pdf

There's loads out there that quantifies the relative likelihood of being a victim of terrorism over all the other risks. It is tiny.

Steve

So using "logic" such as this, our chances of being subject to a nuclear attack are essentially zero (it's never happened to the US, and only happened once in history), so the US government should spend essentially zero resources on nuclear non-proliferation? Why should we spend money on something when the "statistics" show the risk rounds down to zero?

Statistics don't necessarily shed much lights on risks in changing environments, and they don't tell you whether you're in a changing environment.

I believe the risks are being a terrorist victim are pretty low too, but I don't have access to classified information--if I did, maybe I'd consider the risks to be at least somewhat higher.
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 09:17am PT
Believe me you wouldn't!

You need to combine the stats, which are a fair representation of the facts with Common Sense.

Steve
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 09:24am PT
As to the nuclear thing, The likelihood is extremely low, the risks however (likelihood and consequences) are enormous - on a global scale, so it makes sense to either maintain a credible deterrent, pursue disarmament, or better both.

While a terrorist act is more likely to take place, the likelihood is small, similarly the consequences do not pose anything like an existential threat to the USA.

It's not the same, and I'm struggling to understand why you would draw comparison in your argument.

Steve


blahblah

Gym climber
Boulder
Feb 23, 2016 - 09:32am PT
As to the nuclear thing, The likelihood is extremely low, the risks however (likelihood and consequences) are enormous - on a global scale, so it makes sense to either maintain a credible deterrent, pursue disarmament, or better both.

While a terrorist act is more likely to take place, the likelihood is small, similarly the consequences do not pose anything like an existential threat to the USA.

It's not the same, and I'm struggling to understand why you would draw comparison in your argument.

OK I didn't think I needed to spell it out but apparently I do:
what if the terrorists get a nuke or another weapon of mass destruction?
How would any of us know what the likelihood of that is?
It should be obvious that there is a large group of well funded people who would like to attack the US--why are you so sure they'll fail?
I'd say on one of the few occasions when they really tried, they succeeded pretty well. They haven't followed up, yet.
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 09:53am PT
I'm losing the will to live.

Have you any idea about nuclear weapons. You can't just 'get' or 'make' a nuclear 'bomb' . Nation states spend billions trying to develop such devices and don't succeed. You can't make them in a cave in Syria.

The very fact that no groups have succeeded in doing so should tell you something......

Whilst there are alternatives out there, neither the bad guys, or you seem able to either understand how to get them, or use them, otherwise they probably would have by now.

Steve


Reilly

Mountain climber
The Other Monrovia- CA
Feb 23, 2016 - 10:03am PT
i have some street cred (maybe not here on Crankloon Way) re: the terrorism business and I
have to agree with Blah-Blah. Only the successful high-profile takedowns get publicized to
meet political or budgetary purposes. The vast majority don't and shouldn't see the light of
day and the potential threats are, as they should be, strictly on a need-to-know basis. You
limp-wristed hand-wringers, Blakey notably excepted, have no bloody clue and shouldn't, and
that particularly includes most of those retards in Congress who think they should.

And, yes, I do intend to piss on Charlie Wilson's grave if I get the chance.
WBraun

climber
Feb 23, 2016 - 10:07am PT
Blakey

You are sooooo deluded about nukes these days.

You can get suitcase nukes.

They are being used in Syria as we speak.

US controlled main stream media censors and waters down everything.

Americans are just plain stupid .....
C4/1971

Trad climber
Depends on the day...
Feb 23, 2016 - 10:09am PT
ahhhh Werner...

and on another front, the bid goes on.
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 10:25am PT
Werner,

Whilst I have the utmost admiration for both your climbing and rescue career, and indeed would be nothing but reassured should you be my rescuer; the majority of your internet utterances are at best obtuse and usually loopy. But then I'm definitely not in the same universe that you inhabit so perhaps should view them in that light.

Suitcase Nukes are so 1980s. Then every terrorist group had one, or wanted one.

So prolific were they that Chuck Norris was used to recover them from nasty Arab terrorists. There's loads of those movies on TV, so it must be real.

But we are digressing from the main thrust of the last few posts. My view is that for many US residents the ability to look at relative risk is severely compromised.

When I come to the US the threat of terrorism is the last thing on my mind, if at all and I can't understand why so many folks get fixated by it.

I'll let Werner have the last word. I can't wait....

Peace,

Steve
fear

Ice climber
hartford, ct
Feb 23, 2016 - 10:28am PT
The communists are coming. We must invade some small southeastern Asian countries to "save them".

The terrorists are coming. We must massively invade the ME more than we already have and kill/destroy some very bad guys over there.

"ISIS" magically appears out of the sand with billions of dollars and simultaneously attacks every major world power (except Israel).

Does that make sense? Anyone?

Always ask who benefits.
Curt

climber
Gold Canyon, AZ
Feb 23, 2016 - 10:35am PT
I think Apple's concern is legitimate. The software needed for them to "unlock" the iPhone in question does not exist and would need to be developed--according to Apple. Once this code exists, it could fall into the wrong hands, via hacking or other means--providing the universal "back door" access to all iPhones that is feared.

Another thing to consider (just my opinion) is that these San Bernadino shooters seemed fairly organized and thoughtful about their crime. They destroyed the hard drives on their computers and other cellphones. This was a work cellphone, and the fact it was not destroyed most likely means there is nothing of interest on it.

Curt
the Fet

climber
Tu-Tok-A-Nu-La
Feb 23, 2016 - 10:49am PT
This case must be about setting precedent.

Does anyone really think a couple of nut jobs acting alone in SoCal with likely some workplace grievance are really well connected to a global jihadist movement? If they were well supported and smart they could have killed a lot more people. There were more casualties in sandy hook from one deranged teenager.

Is there really anything of high value on that phone that justifies creating a backdoor that sacrifices privacy for all of us? No, it's about seeing how much power the government has to access our information.

I don't think the government has any nefarious purpose, I think they do want to get the bad guys, but as mentioned this backdoor will likely leak and bad guys will get it.
madbolter1

Big Wall climber
Denver, CO
Feb 23, 2016 - 10:50am PT
No, it's about seeing how much power the government has to access our information.

And there it is.
Happiegrrrl2

Trad climber
Feb 23, 2016 - 10:57am PT
One's fear of terrorists is in direct relationship to the amount of mass media news they consume without bothering to think about the ingredients it contains.

It's similar to what I encounter whenever I hitchhike from the cliffs to town at the Gunks. Used to do it 3-4 times week before I had a car and nowadays I still do it once or twice a month when low on funds and don't want to run out of gas before getting some more.

Now, I have never encountered anyone in all these rides that had me the slightest bit worried for my safety. The "worse" was the guy whose business was "private funding" who was offended when I said "Oh, like a loan shark?" He then went on to explain how it works and gave an example of a woman who inherited a nice home but wanted to sell it. The condition was not great and she would get a much better price with a little remodeling work, but she had no credit, and so she came to this guy. He made it seem like a no brainer, but the collateral was the mortgage on the house! But, no loan shark, he!

Anyway - so many of these people expressed horror at the idea I would hitchhike, and fear about picking me up. Had I been a guy, I was often told, they wouldn't have dared.

So many people, so sure that every hitchhiker is a bad person - all because the media says so.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 11:06am PT
Blackley,


When I come to the US the threat of terrorism is the last thing on my mind, if at all and I can't understand why so many folks get fixated by it.

and paraphrasing you: in brackets are mine

When I come to the US the threat of [loss of privacy] is the last thing on my mind, if at all and I can't understand why so many folks get fixated by it.
WBraun

climber
Feb 23, 2016 - 11:17am PT
Suitcase nukes, tactical nukes, and artillery nukes are all being used right now and in the past.

Terrorists all have them .....
Blakey

Trad climber
Sierra Vista
Feb 23, 2016 - 11:25am PT
^^^^^^^^^^

I rest my case......... :-O

Steve
monolith

climber
state of being
Feb 23, 2016 - 11:37am PT
Bill Gates disappointed by reports he backs FBI over apple.

http://www.bloomberg.com/news/articles/2016-02-23/bill-gates-disappointed-by-reports-he-backs-fbi-over-apple
John Duffield

Mountain climber
New York
Feb 23, 2016 - 11:45am PT
I think I could be more supportive of Apple, if this didn't fit a larger pattern of anti-USism, outsourcing jobs to other countries etc.
Ksolem

Trad climber
Monrovia, California
Feb 23, 2016 - 12:00pm PT
I was just chatting with someone I know who is on he high end of internet security. He says that Apple just released the info that the FBI has hit them with about a dozen similar requests, all of which they are protesting. He says that hacking one phone is doable, and not the issue here. The FBI is looking for precedent to be able to access encrypted information on a larger scale.

If what he tells me is true, and I believe it is, we had better hope that Apple prevails.
k-man

Gym climber
SCruz
Feb 23, 2016 - 12:02pm PT
It turns out, as the Justice Department acknowledged in its court filing, that the
passcode of shooter Syed Farook’s iCloud account had been reset by the San Bernardino
County Department of Public Health, “in an attempt to gain access to some information
in the hours after the attack… but that had the effect of eliminating the possibility
of an auto-backup.” A federal official familiar with the investigation confirmed
that investigators were indeed in possession of the phone when the reset occurred.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 12:19pm PT
Mono,

Gates said that the ongoing Apple case will be decided by the legal system, not in the court of public opinion — and that larger issues of tech and national security need to be addressed by lawmakers after debate.

"The courts are going to decide this, and I think Apple said that whatever the final court decision is, they'll abide by," Gates said on Bloomberg TV on Tuesday. "In the meantime, that gives us this opportunity to get the discussion — and these issues will be decided in Congress."

http://www.nbcnews.com/tech/tech-news/apple-fbi-feud-bill-gates-seeks-middle-ground-tech-dispute-n524261
monolith

climber
state of being
Feb 23, 2016 - 12:24pm PT
That's what Cook says as well, so I'm not sure what your point is.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 12:44pm PT
Mono,

your source says Gates was disappointed but my source of the same story? does not mention that Gate was disappointed. Just a chance to compare different reports. And maybe one story or the other story was a little out of context? It is hard to tell from the way they present the quotes.
Dingus McGee

Social climber
Where Safety trumps Leaving No Trace
Topic Author's Reply - Feb 23, 2016 - 01:09pm PT
DMT,

But the FBI is scary!



Hmm? Just how out of bounds are they? Are there a lot of innocent people shot, searched, arrested, questioned??

It sounds like you live in Fear?
John Duffield

Mountain climber
New York
Feb 23, 2016 - 02:06pm PT
Well Apple should be scared. The Feds have all kinds of artillery that any multinational should be worried by. They've been allowing a far more liberal interpretation of "Money Laundering" for starters. I've never read the Patriot Act in it's fullness either. Guessing we'll soon see what they carry in the way of Lawyers.
monolith

climber
state of being
Feb 23, 2016 - 02:15pm PT
your source says Gates was disappointed but my source of the same story? does not mention that Gate was disappointed. Just a chance to compare different reports. And maybe one story or the other story was a little out of context? It is hard to tell from the way they present the quotes.

It's not hard to tell. The Bloomberg interview has audio of him saying he was misrepresented by the media reports that came out early this morning.

Your source represents the media reports Gates says misrepresented him. It came well before the Bloomberg interview.

You got some logical cognitive issues going on there, Dingus.
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 03:17am PT


The original story had reference to Comey's phone being breached.

Another story substantiates this.

http://www.washingtontimes.com/news/2015/jul/9/james-comey-fbi-chief-says-his-own-info-was-hacked/
healyje

Trad climber
Portland, Oregon
Feb 25, 2016 - 03:39am PT
"ISIS" magically appears out of the sand with billions of dollars and simultaneously attacks every major world power (except Israel).

ISIS did not 'magically' appear out of the sand and didn't and doesn't have billions of dollars. Where do you get this sort of nonsense from? Have you really been following along with events in the ME for the past twenty years? If you had it wouldn't be any sort of mystery how ISIS came into being.
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 08:03am PT

Topic Author's Reply - Feb 23, 2016 - 09:01am PT
Lorenzo,

the reference you gave does not substantiate this statement:

Among the people who's phone security was breached was FBI Director James Comey.

The reference says:

FBI Director James Comey called the hacks an "enormous breach," saying his own data were stolen.


It would seem more factual if could leave a complete and accurate paper trail as I find no reference to his iphone.

It was in the first publishing of the first article version I saw, afterwards deleted in the link I gave.

But Comey did say so when it happened, as this screen shot shows, including the part about the "enormity " of the breach.
Give me your home address and I'll see if the Washington Post will send you the paper copy you want COD.


Trashman

Trad climber
SLC
Feb 25, 2016 - 08:16am PT
So in response to this Apple is apparently working on a feature in its next OS to have the "secure enclave" ignore any over rides/updates. As one story called it, a software that's been told to ignore all external inputs.

And that, kids, is how we got skynet.
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 08:20am PT
And that, kids, is how we got skynet.

No doubt the FBI will sue it, too.

If only Sara Connor hadn't forgotten her passcode...
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 08:26am PT
It's an election year.

There is plenty of demand for mass hysteria.
healyje

Trad climber
Portland, Oregon
Feb 25, 2016 - 11:02am PT
And that, kids, is how we got skynet.

You either don't have firm grasp on what is being described by apple or a poor understanding of skynet. It's all a pretty simple proposition:

A) you're for your phone being hackable

or

B) you'd prefer what's on your phone to be private

Where it's not so simple is if someone's phone has information on it regarding a small nuke with a gps trigger buried in the stacks of an unknown container ship bound for a dock in Los Angeles or Newark.
Spiny Norman

Social climber
Boring, Oregon
Feb 25, 2016 - 11:12am PT
Here's a good article on why the FBI's position is dangerous overreach.
Ken M

Mountain climber
Los Angeles, Ca
Feb 25, 2016 - 12:11pm PT
Where I get lost, is where no one explains how much more secure and safe we are today, than we were 10 years ago, when such encryption did not exist?

I don't feel safer. Most people don't.

I think I fear the big companies a lot more than our gov't.

But then, I think Apple already has a backdoor. No business entity gives up such power totally, and permanently. Also, there is no way to know what the Hacktivist Community might come up with.....they just extorted money from a hospital here in LA, where they shut down their computer system, and the only way to recover was to pay, so they did, and the system was restored.

Why not do the same thing with your phone.....and Apple could do....nothing, same as the hospital system. Would Apple leave themselves open to that????

Would you?
healyje

Trad climber
Portland, Oregon
Feb 25, 2016 - 01:12pm PT
A) I think Apple already has a backdoor.

B) No business entity gives up such power totally, and permanently.

C) Also, there is no way to know what the Hacktivist Community might come up with....

A) Apple doesn't have a backdoor - that's the whole point.

B) Generic, power-related memes are pretty irrelevant to the conversation.

C) The hacktivist community, the NSA and apple are all bound and constrained by the same mathematical realities as everyone else. So unless they can come up with magical fairie dust which allows someone to guess the right passcode in under ten tries then they're all sh#t out of luck.
Ken M

Mountain climber
Los Angeles, Ca
Feb 25, 2016 - 01:27pm PT
A) Apple doesn't have a backdoor - that's the whole point.

B) Generic, power-related memes are pretty irrelevant to the conversation.

C) The hacktivist community, the NSA and apple are all bound and constrained by the same mathematical realities as everyone else. So unless they can come up with magical fairie dust which allows someone to guess the right passcode in under ten tries then they're all sh#t out of luck.

A) I think they do. I think they told Federal officers that they did not, and if they do, they have committed a felony.

B)?

C) Yes they are, which is why I would never create a product that I could not access very secretly "just in case". The point is, you don't know what you don't know. People are creative, particularly in this field.
Ken M

Mountain climber
Los Angeles, Ca
Feb 25, 2016 - 01:39pm PT
Dingus, thanks for the thoughtful response.

I would point out that in this specific case, the owner of the phone is not being protected, the owner wants the phone opened. Someone OTHER than the owner used the phone in a commission of a terrorist assault, and the owner wants the info out there.

Most of the things that you talk about fearing happening, is by the very companies that you are working to protect. Those companies now have a tool that will protect them from ANY regulators or courts trying to deal with abuse.

Take insider trading, which is one of the greatest dangers of manipulation of the markets, with the ability to crash our economy. We have now handed to insiders, the ability to hide the activity. No feds involved in this stealing of your money. No warrant can find the evidence, which is a simple phone call.

Your discussion of security of medical records misses the entire issue---it is the CORPORATIONS that are doing the abuses, NOT the gov't.

This entire process GIVES MORE POWER TO CORPORATIONS, not TO THE GOVT.

Gov't access by way of courts only takes us back to the state of things 10 years ago. I am largely satisfied with the process of giving the gov't the power to look at things by way of court orders. I am NOT happy about anything that empowers corporations beyond the ability of gov't to regulate. History tells me that corporations will ALWAYS abuse that power.
Ken M

Mountain climber
Los Angeles, Ca
Feb 25, 2016 - 02:14pm PT
History tells me government will always abuse that power, too. Where does that leave us?

Richard Nixon, the executive officer of the Gov't, said that his personal recordings were his own property, and could not be heard by anybody else.

The Supreme Court held (9-0), that he was wrong.

the gov't TRIED to abuse the power, but the power of the courts protected us.
Today, all a president would have to do is put the info on a phone, and YOU would be SOL.

So it leaves us with a system with a relatively objective arbiter: The courts.

It is not an infallible system, but it protects everybody.
JEleazarian

Trad climber
Fresno CA
Feb 25, 2016 - 02:23pm PT
This case presents a great number of legal conundrums (conundra?). Apple's arguments involve concerns that benefit its business, but they wrap them around issues that really do affect the public generally. The irony, to me, remains that the government screwed up when it recovered the iphone, so now they're trying to compel Apple to fix their problem.

It reminds me of a sign that I used to see at the clerk's office of the local Bankruptcy Court: "Poor planning on your part does not constitute an emergency on our part." Normally, to obtain an injunction, the plaintiff must show more than mere irreparable injury. The plaintiff must also demonstrate that it comes to court with "clean hands." While I'm not sure that the government is subject to the clean hands doctrine, this self-inflicted wound makes me wonder how the court would balance the equities.

I, too, have wondered whether Apple really has a "back door," but if Apple lacked that back door, why is it fighting so hard? It could simply say that what the government requests is impossible, and let the government try to prove that Apple is wrong.

I'm always skeptical when a defendant claims to be acting on behalf of the general public, and this case is no different. Nonetheless, the legal issues are so interesting, I find it irresistable to follow the developments with bated breath.

John
JEleazarian

Trad climber
Fresno CA
Feb 25, 2016 - 02:31pm PT
Richard Nixon, the executive officer of the Gov't, said that his personal recordings were his own property, and could not be heard by anybody else.

The Supreme Court held (9-0), that he was wrong.

The inherent problem with limited government is that the limits ultimately depend on voluntary adherence to the law by those in power. Nixon, for all his flaws, allowed the SCOTUS to decide the issue of the custody of the tapes in a meaningful way, and chose to abide by that decision.

in contrast, Hillary Clinton and the IRS have done everything possible to inhibit Congress in seeking to recover information to which Congress has a clear right under U.S. v. Nixon. It's rather like Andrew Jackson when the Supreme Court ruled against his administration in favor of Native Americans "The Supreme Court made its decision. Now let them [try to] enforce it."

The law is only as good as its government's obedience to it. Too many countries have governments where the words of the law mean only what those in power say they mean.

John
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 03:44pm PT
Here's a good article on why the FBI's position is dangerous overreach.

Good article, Spiny.

The All Writs act as interpreted by the FBI is basically
" if we want something, you gotta provide it."

Democracy in action.
TradEddie

Trad climber
Philadelphia, PA
Feb 25, 2016 - 03:55pm PT
Just because I borrow a brief case from you, put some of my personal files in it, and then lock it... doesn't mean for a microsecond that you own my content and have a right to it however you may please. That's my position on this cell phone - it is a digital container, as a briefcase is a paper container. The data on my phone is mine. Its not Apple's. Its not Verizons. Its not the credit card company's. Its not my internet provider's. Its not my medical provider's. Its not the police's data. Its not the court's data. Its my data. It is a part of who I am, in this modern world and I am entitled to protect it.

Cheers
DMT

But if I loan (or sell) you my briefcase, then you go out and shoot dozens of people, possibly leaving evidence of unidentified accomplices in that briefcase, you can bet your bottom dollar that I'd give police the spare key, I'd let them turn my whole house upside down looking for it, screw your privacy.

I think Apple is afraid to admit how easy it would be for them to break this supposedly secure phone. Their argument is a business decision, the public interest angle is bogus. The idea that their secret software would somehow fly itself to Russia or China would suggest a complete absence of basic corporate security.

I have some concerns about the misuse of uncrackable encryption, but I have huge concerns about mandated backdoors pre-installed into software. Those are both red-herrings in this case, since neither is involved.

TE



golsen

Social climber
kennewick, wa
Feb 25, 2016 - 04:45pm PT
The cell service company collects info on phone numbers called and texted to and from. Aside from that, on the phone itself, there could be a history of texts, but not recorded calls. There could be contacts as well, but that would also be evident from the cell provider. In other words, unless the culprit was an idiot, the cell provider can provide most of the meaningful info.

I don't see why the FBI really needs the phone except for they want it all.

Check this thread out on the ATT forum:
https://forums.att.com/t5/Wireless-Account-Questions/Does-the-AT-amp-T-phone-statement-show-which-numbers-you-ve/td-p/2790431


healyje

Trad climber
Portland, Oregon
Feb 25, 2016 - 06:28pm PT
A) I think they do.

You can have all the conspiratorial wonderment you like, but not having a back donor is the whole point of apple's current security efforts. They avoid an ocean of legal problems and costs by the simple approach they've taken and that is based on there being no back doors.

And the Feds aren't asking for a backdoor, they're asking for passcode try limit to be disabled so they can try to brute force the code.
thebravecowboy

climber
The Good Places
Feb 25, 2016 - 07:02pm PT
Apple don't like that backdoor actchin
zBrown

Ice climber
Feb 25, 2016 - 07:22pm PT
Unlock, sheeeeit, in San Diego they just require folks to give up the password.


Does digital privacy extend to criminals on probation?

The moral of this story: Don't get put on probation.

http://www.sandiegouniontribune.com/news/2016/jan/15/court-waiver-cellphone-passwords-search-privacy/



EDIT:

From the article.

The document distributed to San Diego judges indicates it would apply only in cases in which the defendant is also subject to a Fourth Amendment waiver, meaning that person can be stopped and searched by law enforcement at any time without a warrant. Fourth Amendment waivers are common in cases in which a defendant, who is convicted of crime, is placed on probation or mandatory supervision instead of being sent to prison.

“Even though there is a difference of opinion among opposing parties, we expect it to be clarified and decided by the appellate courts.”
Lorenzo

Trad climber
Portland Oregon
Feb 25, 2016 - 08:02pm PT
Does digital privacy extend to criminals on probation?


No. You waive constitutional rights while on probation. You do have the option to just serve your time if you don't like it.

http://www.nolo.com/legal-encyclopedia/probation-search-conditions.html
JEleazarian

Trad climber
Fresno CA
Feb 25, 2016 - 10:25pm PT
The idea that their secret software would somehow fly itself to Russia or China would suggest a complete absence of basic corporate security.

Basic corporate security is probably at least as tight as government security. Right now, I'm dealing with identity theft caused by the IRS data breach. Some genius who probably bought my SSN and employment information decided he or she could file an unemployment claim under my name. The crook was apparently unaware that the EDD ( The California Employment Development Department, that is responsible for collecting the State unemployment tax from employers and distributing unemployment benefits) actually checks with the employer to make sure the person's story about why they're no longer employed checks out.

What really frosts me, however, is the rather cavalier attitude the EDD has taken in this mess. This is the second time this happened to me. I've filed police reports here and fraud reports with the EDD, and both times my employer and I both told the EDD I'm still employed, but this was the first time I ever heard anything back from them.

The only reason I got the call was that they were trying to call the crook, to tell them there was a problem with the application, and couldn't reach them on the phone number given. They called my employer to see if they had the correct number. My employer, no dummy, transferred the call to me.

I tried to get as much information as was put on the application, in the hope of giving the police here a lead on catching the thief, but the EDD wouldn't even disclose the address on the application, showing where to send my alleged unemployment benefits. Privacy concerns, they said. For a thief!

And you wonder why people don't trust the government to keep information it collects secure?

John
Escopeta

Trad climber
Idaho
Feb 26, 2016 - 06:06am PT
As a group, yes.

Absolutely.

Heck the feds don't even follow half the level of security they mandate to many of the financial institutions and fintech providers. Just as an example.

There is a reason banks won't turn over account lists and names to their Fed auditors. And it has nothing to do with privacy or patriotism. Its because the Feds don't protect it well.

Heck, I'd trust my data with Iron Mountain more than I trust the Feds and most IM employees are a bunch of GED mouth breathers.
Reilly

Mountain climber
The Other Monrovia- CA
Feb 26, 2016 - 09:25am PT
And you wonder why people don't trust the government to keep information it collects secure?

Criminals are people, too! Especially in the eyes of the gubmint. You would not believe the
exchange of paperwork I had with the EDD because I overpaid on an employee's account.
Did I mention that it was for

WAIT






FOR







IT....




//less than TEN CENTS!?!?!?!
Reilly

Mountain climber
The Other Monrovia- CA
Mar 1, 2016 - 10:46am PT
Was it Judge Judy?
StahlBro

Trad climber
San Diego, CA
Mar 1, 2016 - 10:55am PT
It is not really unlocking the phone, it is disabling the auto destruct feature that erases all the data after 10 failed login attempts. Once that is done, the password will be found through a brute force routine that the FBI already has.

monolith

climber
state of being
Mar 4, 2016 - 04:51pm PT
San Bernardino DA says shooters iphone could harbor 'dormant cyber pathogen'

I say nuke it from space, it's the only way to be sure.

http://www.macrumors.com/2016/03/04/iphone-dormant-cyber-pathogen-claim-attorney/
thebravecowboy

climber
The Good Places
Mar 4, 2016 - 09:07pm PT
it's gonna be a bunch of dick pics on that phone.
fear

Ice climber
hartford, ct
Mar 5, 2016 - 07:53am PT
Dormant-cyber-pathogens....

I'm sure.

The best these losers could do was shoot up unarmed innocent people at a work related Christmas party. Oh.... and then come back to the scene of the crime.

But in his spare time this rocket-scientist was developing super-secret cyber pathogens.
Jaybro

Social climber
Wolf City, Wyoming
Mar 5, 2016 - 09:06am PT
I'm with Dingus(!) But not with Dingus, who is just trolling, and doesn't care about this stuff in the first place, on this one!
zBrown

Ice climber
Mar 11, 2016 - 04:58pm PT
Govt. run amuck!

The government yesterday hinted that it may demand that Apple hand over the iOS source code and the encryption key the Cupertino, Calif. company uses to sign updates if it won't comply with a court order to help authorities unlock an iPhone.


In a footnote in a Thursday brief, the Department of Justice (DOJ) said it would be happy to have Apple's source code and digital signing key.

"For the reasons discussed above, the FBI cannot itself modify the software on Farook's iPhone without access to the source code and Apple's private electronic signature," the footnote read. "The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers."

...

Oddly, elsewhere in the DOJ's brief, government lawyers argued that, even if the FBI had the iOS source and Apple's signing key, it would still demand that Apple cooperate further.

"Even if the Court ordered Apple to provide the government with Apple's cryptographic keys and source code, Apple itself has implied that the government could not disable the requisite features because it 'would have insufficient knowledge of Apple's software and design protocols to be effective,'" the brief stated.

A hearing on Apple's objections and the government's response is slated for March 22 before a federal magistrate.



http://www.computerworld.com/article/3043502/apple-ios/government-hints-it-may-demand-ios-source-code-signing-key.html


More relevant to the ultimate outcome of the case is the government’s targeted attack on a central legal argument made by Apple: that in order to prevent the iPhone from being erased, the court is breaking new ground by trying to force Apple to write new programs. In its March 10 filing, the government points to a 36-year-old case, “Mountain Bell”, in which a corporation was forced to “program” computers as part of government order to trace calls through a telephone facility. California’s top federal court, the 9th circuit court of appeals, sided with the government in the case. The government cites another case from New York that it says also shows corporations have previously been forced to create new programs to comply with court orders in criminal cases.
pyro

Big Wall climber
Calabasas
Mar 28, 2016 - 06:55pm PT
GAME OVER!
WBraun

climber
Mar 28, 2016 - 07:18pm PT
Yeah games over!

The govt. already unlocked the so called phone and dropped its suit against Apple.
Chaz

Trad climber
greater Boss Angeles area
Mar 28, 2016 - 07:29pm PT
Unlocked, my ass.

The dumbshit S.B. Sheriff Dept employee who changed the old password probably just now remembered where he wrote down the new password.
pyro

Big Wall climber
Calabasas
Mar 28, 2016 - 07:30pm PT
Wbraun if you ever give me a lift in the helicopter to go climb the yosemite big wall i promise when you drop me off to give you the big fat MIDDLE Finger
As a token of my respect to you..
Lol welcome back..
Curt

climber
Gold Canyon, AZ
Mar 28, 2016 - 08:26pm PT
Yeah games over!

The govt. already unlocked the so called phone and dropped its suit against Apple.

...and that's the last we're likely to ever hear about it. Because there's nothing of interest on it. Duh.

Curt
Spiny Norman

Social climber
Boring, Oregon
Mar 28, 2016 - 10:01pm PT
What evidence (beyond the FBI's bald assertion) is there that the gov't actually broke in?
rbord

Boulder climber
atlanta
Apr 21, 2016 - 04:14pm PT
Just saw the latest that the FBI paid over $1.3 million for a tool to hack the iPhone, and that the court case had "stimulated a bit of a marketplace around the work that didn't exist before then."

Kind of interesting. I guess it's perfectly legal to create (and use) a tool to overcome security and encryption systems like that, and I wonder what the market value for a tool like that is? Will the company offer it for sale to others? Other countries?

Kind of a Pandora's box for Apple? Or business as usual? It's like the government is competing with Apple and driving their costs of business up. But a self-inflicted wound given Apple's noncooperation.
monolith

climber
state of being
Aug 23, 2016 - 08:35am PT
NSA hacked and it's tools released to the highest bidder. This is why Apple didn't want to build the tools like this in the first place.

http://www.macrumors.com/2016/08/22/privacy-advocates-link-nsa-hack-apple-fight-fbi/

thebravecowboy

climber
The Good Places
Aug 23, 2016 - 05:56pm PT
^agreed. what could be wrong with a superduper secret supersnooping Motherland Security Bureau? besides, uh, no oversight other than by our block-bought and sold politicians.
Messages 1 - 301 of total 301 in this topic
Return to Forum List
 
Our Guidebooks
spacerCheck 'em out!
SuperTopo Guidebooks

guidebook icon
Try a free sample topo!

 
SuperTopo on the Web

Recent Route Beta