Maker Pro
Maker Pro

Apple vs the FBI

(*steve*)

¡sǝpodᴉʇuɐ ǝɥʇ ɹɐǝɥd
Moderator
Jan 21, 2010
25,510
Joined
Jan 21, 2010
Messages
25,510
ThatIsWhyMyAndroidPasswordIsVeryVeryLong!
 

Gryd3

Jun 25, 2014
4,098
Joined
Jun 25, 2014
Messages
4,098
That could be tricky i'm not into writing drivers :)

But for the purpose of recovering data, any old compatible rom i'm able to compile from source ...

Something that can not be done for iOS because it's closed source, so i guess the fbi probably has this covered already for android!
lol. I think you are missing the point that stock android devices are pretty solid. Couple that with android's "Remote Wipe" and your stuff is pretty damned safe unless you decide to strip away the safety mechanisms yourself before-hand. (Which does usually trigger an e-fuse that causes a notice to be displayed in the initial boot screen of the device)

ThatIsWhyMyAndroidPasswordIsVeryVeryLong!
Remote Wipe xD
Hammer, heavy foot, car tire. Lot's of things can be used to protect you data
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
 

Crystal Wizard

Feb 10, 2016
100
Joined
Feb 10, 2016
Messages
100
Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
How can you tell if encryption has been used for criminal activity, without bypassing the encryption?
 

BobK

Jan 5, 2010
7,682
Joined
Jan 5, 2010
Messages
7,682
Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
The mod required is to the operating system. No one outside of Apple should have access to it, and, if it is like anyplace I have worked, only a limited number of programmers inside Apple would have access to it.

Bob
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
Or respectful of people's right to privacy.

Or maintain their client base...
Do terrorists deserve privacy? I can see a need for a warrant, for sure. But I would like the FBI to have the tools to fight crime.
Do we have privacy if hackers develop the software? There is, in deed, a danger of it slipping out of the proper controls, but we have that danger of hackers developing it anyway.
Should gun salesmen sell guns to anybody regardless of criminal background because the constitution says we have a right to bear arms? Criminals do not get the same rights as others. Apple should not deliberately market to criminals. This is aiding and abetting the crime.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
The mod required is to the operating system. No one outside of Apple should have access to it, and, if it is like anyplace I have worked, only a limited number of programmers inside Apple would have access to it.

Bob

I can see the point of that.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
Make that ***convicted*** criminals. Note that in the US that is not a tautology.

ak

A nice thought but we can't wait until after the bombing and convict the remains of the bomber. To protect the public we need to investigate and act before the crime.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
How can you tell if encryption has been used for criminal activity, without bypassing the encryption?

If the meta data shows them calling known terrorists shouldn't that justify a warrant?
You don't need to encrypt a message to your mother.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
All some very good arguments for a very complex topic!!
It is just not as simple as any one side would have it.
Personally, I would support the needs of law enforcement to investigate. But them I am told I would be comfortable in Russia. :)
 

Crystal Wizard

Feb 10, 2016
100
Joined
Feb 10, 2016
Messages
100
If the meta data shows them calling known terrorists shouldn't that justify a warrant?
You don't need to encrypt a message to your mother.
Depends what I'm talking to my mother about! ;)

There are many legitimate uses of encryption.
"being in contact with a known (to the authorities, not necessarily to me) terrorist" is not a Criminal Offence.

Agreed, it is a very complex topic.
I think the balance of supporting law enforcement and supporting privacy is a tricky one, and will always, inherently, be flawed (mainly because there are people involved!). :(
 

AnalogKid

Jun 10, 2015
2,884
Joined
Jun 10, 2015
Messages
2,884
A terrorist walks into a bar...

But seriously, folks...a terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?

And - a known terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?

ak
 

Gryd3

Jun 25, 2014
4,098
Joined
Jun 25, 2014
Messages
4,098
Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
Herschel, I see where you are coming from, but there is a balance between security and privacy.
If you want absolute security, you have no privacy.
Where do you draw the line?

As far as Apple vs. the FBI is concerned, I would have hoped that the FBI would have the resources available to disassemble the device, clone the flash, the run aggressive techniques on the clones to decrypt it.

What the FBI wants is an 'easy button' to get into the iPhone, and if you don't see any problems with that then I suggest you go make a copy of all of your keys, and write down all of your user-names and passwords and drop them off at a local police depot.
Remember that the FBI, police, government, etc. are all Human beings just like you and me. What would make you trust an individual with an FBI job more than an individual working construction?


A nice thought but we can't wait until after the bombing and convict the remains of the bomber. To protect the public we need to investigate and act before the crime.
You do realize they made a movie based on this right? Minority Report... and although they don't investigate 'tech' and 'trends' they still attempt to pre-emptively act. Would you want human beings to analyse your actions, or a computer program? And before you answer, keep in mind that google has accidentally classified a group of humans incorrectly as apes...
 

BobK

Jan 5, 2010
7,682
Joined
Jan 5, 2010
Messages
7,682
And - a known terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?

ak
No, but if he steals the loaf of bread I will pursue him for the rest of my life.

Inspector Javert
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
Herschel, I see where you are coming from, but there is a balance between security and privacy.
If you want absolute security, you have no privacy.
Where do you draw the line?

As far as Apple vs. the FBI is concerned, I would have hoped that the FBI would have the resources available to disassemble the device, clone the flash, the run aggressive techniques on the clones to decrypt it.

What the FBI wants is an 'easy button' to get into the iPhone, and if you don't see any problems with that then I suggest you go make a copy of all of your keys, and write down all of your user-names and passwords and drop them off at a local police depot.
Remember that the FBI, police, government, etc. are all Human beings just like you and me. What would make you trust an individual with an FBI job more than an individual working construction?



You do realize they made a movie based on this right? Minority Report... and although they don't investigate 'tech' and 'trends' they still attempt to pre-emptively act. Would you want human beings to analyse your actions, or a computer program? And before you answer, keep in mind that google has accidentally classified a group of humans incorrectly as apes...

The FBI should have the talent????
Now there is an idea. :) That little lady on NCIS does it all the time. :)
So many devices. So many programs. So many versions of each.

Does the industry need to be well regulated like the casino gaming industry? Before a product can be released the software needs to be authorized by the Gaming Commission. There are no secrets in programming in this industry.
There's a dangerous thought.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
A terrorist walks into a bar...

But seriously, folks...a terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?

And - a known terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?

ak

Good questions. If you rent an apartment to a person and in doing a background check you find out they are wanted for murder are you obligated to call the cops?

So many good questions on this topic.


ood
 

Gryd3

Jun 25, 2014
4,098
Joined
Jun 25, 2014
Messages
4,098
The FBI should have the talent????
Now there is an idea. :) That little lady on NCIS does it all the time. :)
So many devices. So many programs. So many versions of each.

Does the industry need to be well regulated like the casino gaming industry? Before a product can be released the software needs to be authorized by the Gaming Commission. There are no secrets in programming in this industry.
There's a dangerous thought.
I think you are confusing things here...
The issue here isn't a code audit, it's installing a back-door. You do that in any machine in the gambling industry and heads will roll.
You should see the security in the gaming industry... using that is a horrible example of 'the right way to do things' when you compare the situation with Apple or other phone manufacturers.
To be honest, I would feel much much safer if the code was audited to the same scrutiny that the gaming industry is. We have far to many hacks, root-kits and virii in our Apple, Android, Windows, and *Nix devices.

I can see that you are arguing with emotion though, and there is no logical way to debate that.
 

Herschel Peeler

Feb 21, 2016
401
Joined
Feb 21, 2016
Messages
401
I think you are confusing things here...
The issue here isn't a code audit, it's installing a back-door. You do that in any machine in the gambling industry and heads will roll.
You should see the security in the gaming industry... using that is a horrible example of 'the right way to do things' when you compare the situation with Apple or other phone manufacturers.
To be honest, I would feel much much safer if the code was audited to the same scrutiny that the gaming industry is. We have far to many hacks, root-kits and virii in our Apple, Android, Windows, and *Nix devices.

I can see that you are arguing with emotion though, and there is no logical way to debate that.

Emotion?
I guess I should have taken more time in expressing my idea. If phone manufacturers had to turn over the design software (source code) to the FCC, or some such office, there would be no problem, well less of a problem, for the FBI to modify the software themselves.
What does Russia do?
 
Top