helloresolven
Member
I guess the NSA isn't that powerful if the government couldn't figure out how to do this without forcing Apple to do it.
It's off by default.I hope my iPhone doesn't do that. My friend tried to unlock mine to take a photo of me while I was playing soccer once, but she forgot the code. To think it could have wiped it!
Put me on the side of privacy at all costs, even if the crime is deemed terrorism. It's a slippery slope to force companies to break encryption, and in my opinion, the terrorist boogeyman isn't a good enough reason. You start moving into future-crime territory if every private detail of someone's life is accessible to government (even with a warrant)
No, in this case the company has the gps location of the boat to within a mile and the boat is full of children who may starve if not found.
GPS is licensed and regulated by the government. Completely different!No, in this case the company has the gps location of the boat to within a mile and the boat is full of children who may starve if not found.
have they tried, 1234? Just Sayin'
It's actually 5151. Upside-down it spells ISIS.
Why not 1515 then?It's actually 5151. Upside-down it spells ISIS.
Why not just use the dead guys finger to unlock it?
I guess the NSA isn't that powerful if the government couldn't figure out how to do this without forcing Apple to do it.
Why not 1515 then?
Why not 1515 then?
Believe the finger has to be warm and/or have a pulse going through it, don't think a cold dead finger unlocks it.
How many of those phones are key pieces of evidence in murder investigations? It'd be one thing if they asked Apple to do this remotely on people being monitored, it's another thing entirely when the phone has been entered into evidence and the accused is in custody. Again, the encryption is not being cracked here. Only, potentially, the ability to guess the encryption key.
Unlocking by printing a cast of of the fingerprint from photos has been proven to work:
http://www.ibtimes.com/hacker-demon...int-sensors-using-regular-photographs-1769408
Why not 1515 then?
Oh, so now the federal courts need something from Apple?
Yeah, I'm sure after the way the federal court handled the Samsung case and shamelessly railroaded them on the iBooks case with a prejudiced judge, Apple just can't wait to help them out...
LOL.
It's a slippery slope, and is exactly what Tim Cook has been talking about publicly. You provide a backdoor to get the bad guys, and that backdoor can also be used against everyone else. Apple is on the side of privacy first, of its customers first. I believe Apple is on the right side here. Making some criminal investigations harder is a fair tradeoff to protect individual privacy of all its customers, whether that protection be from criminals or from a government run amok.
People sometimes kinda fetishize information freedom. If you can't drop the indignation for a murder and terrorism investigation that would STILL require ridiculous brute force tech effort, then god forbid you ever meet the relative of a victim.
Slippery slope is a logical fallacy, btw. (Jack Random post above)
Oh, so now the federal courts need something from Apple?
Yeah, I'm sure after the way the federal court handled the Samsung case and shamelessly railroaded them on the iBooks case with a prejudiced judge, Apple just can't wait to help them out...
LOL.
I guess the NSA isn't that powerful if the government couldn't figure out how to do this without forcing Apple to do it.
The fuck? Had no idea this was a thing...
Hey FBI just try the birth MM/DD, DD/MM, or year. Like every other person uses.
Let's look at this as if it were not data, but a physical thing.
Apple builds a secure safe with a boobytrap mechanism that destroys the materials inside. The police confiscate this safe from criminals and believe there may be documents inside that may or may not have have information regarding other crimes. They get a court order for Apple to disarm the boobytrap to preserve the documents so that the police can force their way into the safe -- not for the key or how to crack the safe, just disarm the destruction mechanism.
I don't think most reasonable people would have an issue with this.
It's the same thing here. The slippery slope argument is overused -- that's why court oversight was required. It prevents the slide down that slope.
I don't really get the argument that a warrant for the data on a phone is less valid than a warrant to search someone's house.
Let's look at this as if it were not data, but a physical thing.
Apple builds a secure safe with a boobytrap mechanism that destroys the materials inside. The police confiscate this safe from criminals and believe there may be documents inside that may or may not have have information regarding other crimes. They get a court order for Apple to disarm the boobytrap to preserve the documents so that the police can force their way into the safe -- not for the key or how to crack the safe, just disarm the destruction mechanism.
I don't think most reasonable people would have an issue with this.
It's the same thing here. The slippery slope argument is overused -- that's why court oversight was required. It prevents the slide down that slope.
I don't really get the argument that a warrant for the data on a phone is less valid than a warrant to search someone's house.
BOOBEIS?What a waste of a guess. It's obviously going to be 5138008.
You'll still need the Apple ID password.Wouldn't it be an option to obtain all saved data (including encrypted data) from the phone, try it ten times, restore the data on the phone and try again? If there are only 10.000 combinations, this seems like a viable option and I don't see why you wouldn't be able to do that, afterall all data must be stored on the phone somehwere and given a few hardware buffs it shouldn't be a problem to copy all this data (though accessing it in a meaningful way would of course mean having to break the encryption, which would not be worth the effort if guessing the code 10.000 times is sufficient).
I don't really get the argument that a warrant for the data on a phone is less valid than a warrant to search someone's house.
They are only asking for being given the leeway of trying the code as often as they want though, no?You'll still need the Apple ID password.
Let's dispel with the fiction that Apple doesn't know exactly what we're doing on our phones. They know exactly what we're doing.
NSA does too. This is a sad piece of propaganda
Let's dispel with the fiction that you know anything about how encryption works.
You're right. You'll have to pardon my ignorance and my post was slightly in jest, but it's not like we have nothing to worry about:
http://www.forbes.com/sites/erikkai...has-total-access-to-your-iphone/#1565bf6a1604
Unlocking by printing a cast of of the fingerprint from photos has been proven to work:
http://www.ibtimes.com/hacker-demon...int-sensors-using-regular-photographs-1769408