Close
Page 2 of 8 FirstFirst 1234567 ... LastLast
Results 11 to 20 of 74
  1. #11
    Gives a sh!t; pretends he doesn't HoneyBadger's Avatar
    Join Date
    Feb 2012
    Location
    C-Springs again! :)
    Posts
    14,803
    Blog Entries
    1

    Default

    Quote Originally Posted by Gman View Post
    I don't buy that for a second. They can't use the information without revealing that they can decrypt the phone. Getting permission allows the information to come forward while letting iPhone owners assume that their information is still secure.
    This is very plausible.
    My Feedback

    "When law and morality contradict each other, the citizen has the cruel alternative of either losing his moral sense or losing his respect for the law." -Frederic Bastiat

    "I am a conservative. Quite possibly I am on the losing side; often I think so. Yet, out of a curious perversity I had rather lose with Socrates, let us say, than win with Lenin."
    ― Russell Kirk, Author of The Conservative Mind

  2. #12
    Rebuilt from Salvage TFOGGER's Avatar
    Join Date
    Dec 2008
    Location
    Aurora
    Posts
    7,784

    Default

    Quote Originally Posted by cstone View Post
    Who owns the phone? If the owner is no longer alive, they have a diminished expectation of privacy. Evidence on the phone may provide leads on other known associates and conspirators involved in terrorist activity. Wouldn't you at least expect your government to pursue the evidence?
    I would expect the investigators to pursue all avenues to recover the data that are readily available. My concern is that they chose to apply for a court order to compel Apple to break an encryption technology that they(Apple) have previously stated was unbreakable, in essence to destroy or diminish the perceived value of one of their products. If they are successful in cracking the encryption, then it loses much of it's value in the marketplace, as well as casting doubts on their original claims of security, possibly opening them up to litigation from previous customers. The smart thing for them to do would be to fail, regardless of the possible value of the information on the phone.
    Light a fire for a man, and he'll be warm for a day, light a man on fire, and he'll be warm for the rest of his life...

    Discussion is an exchange of intelligence. Argument is an exchange of
    ignorance. Ever found a liberal that you can have a discussion with?

  3. #13
    Plinker
    Join Date
    Jul 2015
    Location
    Federal Heights
    Posts
    60

    Default

    Quote Originally Posted by WETWRKS View Post
    My understanding is that Apple has previously made public that they are not able to decrypt their own security. It will be interesting to see where this goes and what response they give to this.

    This right here. This is the key to this. Here's a link confirming this: http://www.macworld.com/article/2999...t-matters.html

    The government (on all sides) is slowly attacking encryption behind the guise of anti-terrorism efforts. This is just the erosion of free speech.

    Look at recent stories of college students getting expelled over "microaggressions" (hurting peoples feelings) over anonymous messaging services. (No relevant links because I'm lazy.)

    States are trying to pass laws to penalize phone manufacturers for selling devices that do not have back doors: http://www.zdnet.com/article/apple-i...d-smartphones/

  4. #14
    Machine Gunner th3w01f's Avatar
    Join Date
    Nov 2010
    Location
    Castle Rock, CO
    Posts
    1,626

    Default

    My understanding is that they're asking Apple to disable the failed attempt phone wipe, not decrypt the phone. Then they can brute force the code pretty quickly.

    Sounds like the phone was owned by the employer and they were terrorists so I don't have much of a problem with it. If it's possible I'd rather see Apple make the change, rather than give the .gov the tools to do it.

  5. #15
    The "Godfather" of COAR Great-Kazoo's Avatar
    Join Date
    Sep 2003
    Location
    Washboard Alley, AZ.
    Posts
    48,074

    Default

    The real question is.

    If the Feebs were able to unlock the phone. Would any of this have been made public?

    Would anyone have been the wiser for it, until after the investigation OR an unnamed source in the federal investigation, said anything?
    The Great Kazoo's Feedback

    "when you're happy you enjoy the melody but, when you're broken you understand the lyrics".

  6. #16
    A FUN TITLE asmo's Avatar
    Join Date
    May 2012
    Location
    Douglas County (Parker)
    Posts
    3,446

    Default

    Quote Originally Posted by Lars View Post
    I feel that once you take part in a terrorist act then you forfeit all rights and any and all means should be available, however we all know that the government will then use this as a precedent to do the same thing on other less high profile crimes. It's a sticky can of worms to open up.
    Yeah.. Screw that "innocent until proven guilty" thing.. That only matters for people you know, right?
    What is my joy if all hands, even the unclean, can reach into it? What is my wisdom, if even the fools can dictate to me? What is my freedom, if all creatures, even the botched and impotent, are my masters? What is my life, if I am but to bow, to agree and to obey?
    -- Ayn Rand, Anthem (Chapter 11)

  7. #17
    Gong Shooter Lars's Avatar
    Join Date
    May 2013
    Location
    Broomfield, co.
    Posts
    457

    Default

    Quote Originally Posted by Irving View Post
    Apple hasn't committed any terrorist acts though.
    I wasn't saying that Apple committed terrost acts. My point was that the owner of the phone committed the terrorists acts and therefore should no longer have the right to privacy. If the info contained in that phone leads to an accomplice or plans for another attack then the feds should be able to act on that. But like I said, that leads to a slippery slope of what cases that they will use this as a precedent for in the future.
    It is better to die on your feet then to live on your knees.

  8. #18
    Machine Gunner Martinjmpr's Avatar
    Join Date
    May 2014
    Location
    Pueblo
    Posts
    2,107

    Default

    The court order is essentially a search warrant for the phone. So from a legal standpoint, certainly they have the authority to do it. It's no different than a search warrant to search their property or their car or bank account information.

    Is someone going to argue that they don't have probable cause?

    The thornier question is whether Congress can pass a law that requires devices to have a "back door" to any encryption. From a strictly Constitutional standpoint I don't see why not but it would be interesting to see what would happen if they tried - I don't think it would go well for the government for a number of reasons.
    Martin

    If you love your freedom, thank a veteran. If you love to party, thank the Beastie Boys. They fought for that right.

  9. #19
    Zombie Slayer kidicarus13's Avatar
    Join Date
    Nov 2007
    Location
    Littleton
    Posts
    6,257

    Default

    Quote Originally Posted by asmo View Post
    Yeah.. Screw that "innocent until proven guilty" thing.. That only matters for people you know, right?
    Because we definitely know the shooter didn't kill innocent people.
    Lessons cost money. Good ones cost lots. -Tony Beets

  10. #20
    QUITTER Irving's Avatar
    Join Date
    Nov 2008
    Location
    Denver, CO
    Posts
    46,527
    Blog Entries
    1

    Default

    Quote Originally Posted by Lars View Post
    I wasn't saying that Apple committed terrost acts. My point was that the owner of the phone committed the terrorists acts and therefore should no longer have the right to privacy. If the info contained in that phone leads to an accomplice or plans for another attack then the feds should be able to act on that. But like I said, that leads to a slippery slope of what cases that they will use this as a precedent for in the future.
    My point was that Apple has not lost the right to not have a back door into the phone.
    "There are no finger prints under water."

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •