Apple engineers may have the last word

They chain of custody gets compromised anyway, since the phone contents can be (indeed will be) changed by the update. The updated software could also change the encrypted content once the correct PIN is found. It could also just make it appear that incriminating information is in the encrypted file system, even if it isn't.

Any competent defence attorney would highlight that possibility. Apple employees would have to be called to give evidence on the matter. A jury might still be left wondering (and hence having reasonable doubt).

Not that the above matters so much if the phone contents is to be used for intelligence purposes rather than as evidence in a prosecution.

Sylvia.

Reply to
Sylvia Else
Loading thread data ...

On Sat, 19 Mar 2016 11:00:49 +0200, snipped-for-privacy@downunder.com Gave us:

snip

Only against a live suspect/perpetrator. For use as evidence in anti-terrorism actions, it would be fine.

The problem is that the assholes cannot be trusted to not simply erase it and claim it was unrecoverable.

The real stupid shit in all this is that the rotten bastards DO have backdoors into ALL of their devices and the operating systems on them. Don't let them fool you.

Reply to
DecadentLinuxUserNumeroUno

Can and will? It's already happened

formatting link

Mark

Reply to
makolber

The federal gov't wouldn't have the resources. They're too committed to diligently tracking down Hillary's and the IRS' deleted e-mails, and prosecuting no one.

Cheers, James Arthur

Reply to
dagmargoodboat

Indeed.

What the FBI and the feds want is access to billions of mobile devices.

formatting link

"AUSTIN, Texas (Reuters) - U.S. President Barack Obama on Friday made a passionate case for mobile devices to be built in such a way as to allow government to gain access to personal data if needed to prevent a terrorist attack or enforce tax laws."

All your data are belong to us.

In Orwell's 1984 there was a screen on your living room wall that monitored you. Now it's in your pocket. And it tracks your friends, too.

We've been solving crimes and catching criminal for centuries without that.

The federal government is a far greater threat, both potential and real. Imagine what a U.S. gone rogue could do.

"Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." --Benjamin Franklin, reply to the Governor, Nov. 11, 1755

Cheers, James Arthur

Reply to
dagmargoodboat

You obviously haven't been paying attention. They're asking Apple to elimin ate the iOS code that erases the encryption keys after 10 unsuccessful syst em password login attempts, and this will be done through an authentic iOS update the phone is designed to accept. From there on, the forensics can b rute force hack the password.

Reply to
bloggs.fredbloggs.fred

er

t.

4--finance.html

ed

Technically speaking, your mobile phone doesn't monitor you. It does know w here you are - which is technically essential to any cellular telephone sys tem, otherwise how can your calls get to you? This isn't the kind of "monit oring" that Orwell had in mind.

t.

Not all that effectively.

As a potential threat, any government has to be taken seriously. If you wan t to tout them as a real and actual threat, you do need evidence that they are doing something wrong - not wrong in the sense of collecting taxes and redistributing some of the money they collect to the poor, no matter how mu ch that sets your teeth on edge, but wrong in the sense of being illegal an d destructive.

Invade Irak on the pretext of non-existent weapons of mass destruction? Fom ent a military takeover in Chile or Iran? It doesn't take much imagination to conjure up some pretty horrifying possibilities.

I suppose that if Trump got into power he could manage something even more stupid and damaging to the long term interests of the US, but considering w hat Republican presidents have gotten up to in the past - even the sainted Reagan was selling arms to Iran to pay right-wing terrorist in Central Amer ica - he'd be merely conforming to a rather unfortunate tradition.

y
o

As a fan of the radical enlightenment (which you are not) Franklin probably didn't entirely share your idea of what constitutes liberty, which involve s - for you - rather more of the rich being free to get even richer at ever ybody else's expense than most rational observers would endorse.

--
Bill Sloman, Sydney
Reply to
bill.sloman

Since they are manufactured in China, the Chinese government might have everything they need to order a Chinese company to reverse-engineer it.

Reply to
Tom Del Rosso

The issue at hand is specifically the US. The US is a _little_ different in that we're supposed to have this thing called the "Constitution". There is no "fourth amendment" in most of the world, nor a first, for that matter. Apparently, many (and *most* lefties) don't want them here, either.

Reply to
krw

Do you think there is anyone in China who can? No one *can* reverse engineer it. That's the whole point of encryption (digital signatures).

Reply to
krw

It would appear that neither you or john understand the case. The government is *not* asking Apple to break into any phones to retrieve data. They are asking Apple to make a tool that would allow the government to break into the phone in question, which would also allow them to break into every similar phone.

John seems to be resisting an understanding of reality with both fists. What's your reason for not getting it?

--

Rick
Reply to
rickman

They don't really need the phone for evidence. They need it for links to co-conspirators.

Reply to
krw

English 101:

...neither you NOR john...

Reply to
John S

The owner of the phone, Syed Rizwan Farook, is dead, so his defense is not involved.

This controversy is partly head-butting between Cook and the FBI. He has pretty much said so.

--

John Larkin         Highland Technology, Inc 

lunatic fringe electronics
Reply to
John Larkin

On Friday, March 18, 2016 at 9:24:47 PM UTC-4, Lasse Langwadt Christensen w rote:

to carry out a government-mandated task.

the FBI do about it? Can it demand that Tim Cook fire any employee who dec lines to participate? If so, under what enumerated power?

sh

one

rced

o

I think it's closer to: they've opened the safe, grabbed the (digital) contents, but all they found inside were some cryptic writings.

Or 40% of your productive time to support others :-), but your point is well-taken.

y

Yes. Or, just having the plain text and the cipher text, they might crack it and not have to ask. In the future they might just automatically download it.

If the American founders tried to have their revolution today, the feds would just use their cellphone contacts to round them all up. No America.

Cheers, James Arthur

Reply to
dagmargoodboat

I'm sure that Apple could work out a reasonable arrangement with the courts, something that would allow them to modify that single phone to get around the password block, but not release the mods into the wild. The owner of the phone is dead, so his rights aren't compromised.

Apple doesn't want to. More people could die.

--

John Larkin         Highland Technology, Inc 

lunatic fringe electronics
Reply to
John Larkin

Right. It probably wouldn't be evidence, it would be leads to other terrorists. Lives might be saved.

--

John Larkin         Highland Technology, Inc 

lunatic fringe electronics
Reply to
John Larkin

You forget that Bill Ayers and Bernardine Dohrn could be given letters of marque and reconstitute the privateer army from Chicago and Bay area leftist radicals and vegans referred to in popular youtubes as the Weather Underground.

--
Grizzly H.
Reply to
mixed nuts

Ah yes, Comrade Barry's consorts might be endangered.

The only way to avoid that is for Glorious Leader to fit us all with data loggers and public restroom cameras. It's the only solution.

Cheers, James Arthur

Reply to
dagmargoodboat

Maybe. ...at the cost of runaway government.

Reply to
krw

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.