Canada Kicks Ass
Apple to fight order to help FBI

REPLY

Previous  1  2  3  4



Thanos @ Mon Feb 22, 2016 10:06 am

Turns out the phone was issued to the terrorist by the county health agency he worked for, and wasn't his own private phone that he bought and paid for with his own money, which totally obliterates the idea of privacy reigning in this issue. If it doesn't then the civil liberties purists can knock themselves out explaining that an employer can now do nothing at all to prevent or punish an employee from loading up their work-issued materials like computers and phones with everything ranging from porn to partisan political items to love letters to ISIS.

   



DrCaleb @ Mon Feb 22, 2016 10:28 am

Thanos Thanos:
Turns out the phone was issued to the terrorist by the county health agency he worked for, and wasn't his own private phone that he bought and paid for with his own money, which totally obliterates the idea of privacy reigning in this issue. If it doesn't then the civil liberties purists can knock themselves out explaining that an employer can now do nothing at all to prevent or punish an employee from loading up their work-issued materials like computers and phones with everything ranging from porn to partisan political items to love letters to ISIS.


The two do not have to be opposites. A company might own the handset, but the data on it is still protected.

The idea of 'privacy' also still holds. If Apple makes a utility to unlock this phone, then they can unlock all phones. And the utility won't remain with Apple for very long. The State of New York has said they have hundreds of iPhones they cannot access, and want this ability. Once the utility is in the hands of people outside Apple and the FBI, how long before it ends up on the dark web for sale? Then how long before Google and Microsoft are compelled to do the same things with their phones and operating systems?

A backdoor for one is a backdoor for all.

   



andyt @ Mon Feb 22, 2016 10:32 am

your first point - if the company owns the phone, imo they can request it be unlocked. Same as you can have no expectation of privacy on your work computer.

Second point tho is the sticky one, ie a valid concern. My question is where else is date encrypted like this except phones. Ie where else do you have the ability to truly hide data besides these new phones?

   



DrCaleb @ Mon Feb 22, 2016 10:41 am

andyt andyt:
your first point - if the company owns the phone, imo they can request it be unlocked. Same as you can have no expectation of privacy on your work computer.


The Company, if it issued the passcode, can control data on the computer. On a phone, it doesn't issue the passcode, therefore only controls the data it synchronizes with it's own servers. I do however have an expectation of privacy on my phone.

The Company can wipe the phone clean and regain access to it, but the data gets lost in the process.

My Blackberry, for example, has my work email on it. The company doesn't know my passcode, and there is no way to retrieve it if I forget it. But I can wipe my phone, reload it and regain use of it. Meanwhile, all my email and contacts are still on the company servers, and they can retrieve it effortlessly.

andyt andyt:
Second point tho is the sticky one, ie a valid concern. My question is where else is date encrypted like this except phones. Ie where else do you have the ability to truly hide data besides these new phones?


Everywhere. Your personal computer has the ability to encrypt individual folders, or the entire computer if that is your preference. Tablets have apps that encrypt data. That ability has been around for decades, on the PC. Computer security has been a critical task since the computer filled up entire floors of a building.

   



Public_Domain @ Mon Feb 22, 2016 2:15 pm

:|

   



PluggyRug @ Mon Feb 22, 2016 2:29 pm

DrCaleb DrCaleb:


Computer security has been a critical task since the computer filled up entire floors of a building.



True. Back in the eighties I worked for a British company who made hardware encryption devices, primarily for the British armed forces. All the components were made unidentifiable including resistor and capacitor values. Subtle hardware changes were made to each pair of devices so only these two would communicate with each other. There was no hackable software, just a basic simple OS on an EEPROM.
After testing and verification they were encased in 1/4" high carbon steel plate which was then welded shut.

   



BartSimpson @ Mon Feb 22, 2016 5:39 pm

Thanos Thanos:
Turns out the phone was issued to the terrorist by the county health agency he worked for, and wasn't his own private phone that he bought and paid for with his own money, which totally obliterates the idea of privacy reigning in this issue.


Not at all. There was a ruling sometime back that when an employee is entrusted with a vehicle that the authorities still have to go through due process even if the employer gives them permission to search the car.

This is because civil rights follow the person who is in legal possession of the car, house, apartment, or phone.

Also, the idiots who issued the phone have a mobile device management (MDM) software that they could have used but they were too damned lazy to deploy it to all of their staff because it takes time to install and configure.

I suppose after this they'll take the time. At least for a while.

   



BartSimpson @ Mon Feb 22, 2016 5:41 pm

Public_Domain Public_Domain:
Forcing Apple/Google/Microsoft to develop backdoors because of terrorists = Logical choice for our national security

Anything about anything with guns, like making safeties more difficult to disengage = Rediculous and a violation of our rights

America, where your liberties are just a matter of perspective.


Apple is going to win this one.

   



DrCaleb @ Tue Feb 23, 2016 7:14 am

PluggyRug PluggyRug:
DrCaleb DrCaleb:


Computer security has been a critical task since the computer filled up entire floors of a building.



True. Back in the eighties I worked for a British company who made hardware encryption devices, primarily for the British armed forces. All the components were made unidentifiable including resistor and capacitor values. Subtle hardware changes were made to each pair of devices so only these two would communicate with each other. There was no hackable software, just a basic simple OS on an EEPROM.
After testing and verification they were encased in 1/4" high carbon steel plate which was then welded shut.


I used to work with IBM AS/400s, and they were designed from the ground up with unbreakable encryption. They contained a board which had the sole purpose of encrypting all data that went through memory, disk or the processor. Each chip was a little bit unique, so no two systems were identical. You couldn't take the disk out of one and read it on another, because the encryption was not the same between two systems. IBM also made a little 'controller' that encrypted data traffic between bank branches and a main office. It was basically a hand soldered collection of discreet parts on a bunch of circuit boards. I still see many of them in use, 40 years after deployment, because they just work.

These systems are still the pinnacle of security, and most banks are leery of moving away from them. To date, there has never been a security breach that I know of - remote or on the console - of an AS/400.

   



BRAH @ Tue Feb 23, 2016 7:42 am

Bill Gates backs FBI in battle with Apple over San Bernardino killer's phone

http://www.theguardian.com/technology/2016/feb/23/bill-gates-fbi-apple-san-bernardino-killer-phone

_________________

$1:
“This is a specific case where the government is asking for access to information. They are not asking for some general thing, they are asking for a particular case,” Gates said.

R=UP
Bill Gates gets it.

   



DrCaleb @ Tue Feb 23, 2016 9:09 am

The FBI is perfectly capable of going 'oldschool' and performing the time tested method of 'capping' the phone's CPU and manually reading the unlock code directly from memory.

Bill Gates isn't one to talk, given Microsoft track record of invading people's privacy without their consent.

   



PluggyRug @ Tue Feb 23, 2016 10:21 am

DrCaleb DrCaleb:
PluggyRug PluggyRug:
DrCaleb DrCaleb:


Computer security has been a critical task since the computer filled up entire floors of a building.



True. Back in the eighties I worked for a British company who made hardware encryption devices, primarily for the British armed forces. All the components were made unidentifiable including resistor and capacitor values. Subtle hardware changes were made to each pair of devices so only these two would communicate with each other. There was no hackable software, just a basic simple OS on an EEPROM.
After testing and verification they were encased in 1/4" high carbon steel plate which was then welded shut.


I used to work with IBM AS/400s, and they were designed from the ground up with unbreakable encryption. They contained a board which had the sole purpose of encrypting all data that went through memory, disk or the processor. Each chip was a little bit unique, so no two systems were identical. You couldn't take the disk out of one and read it on another, because the encryption was not the same between two systems. IBM also made a little 'controller' that encrypted data traffic between bank branches and a main office. It was basically a hand soldered collection of discreet parts on a bunch of circuit boards. I still see many of them in use, 40 years after deployment, because they just work.

These systems are still the pinnacle of security, and most banks are leery of moving away from them. To date, there has never been a security breach that I know of - remote or on the console - of an AS/400.


The AS400, solid as a rock. Did some insurance claim work in Ontario. One company put in a claim for lightening storm damage. After checking numerous desktops, printers, ethernet hubs etc, the only hardware still undamaged was a AS400. The UPS the AS400 was plugged into was also damaged.
Go figure.

   



martin14 @ Tue Feb 23, 2016 10:34 am

BartSimpson BartSimpson:
Public_Domain Public_Domain:
Forcing Apple/Google/Microsoft to develop backdoors because of terrorists = Logical choice for our national security

Anything about anything with guns, like making safeties more difficult to disengage = Rediculous and a violation of our rights

America, where your liberties are just a matter of perspective.


Apple is going to win this one.



Not if Hillary wins the election.

   



REPLY

Previous  1  2  3  4