Go Back   MacRumors Forums > News and Article Discussion > MacRumors.com News Discussion

Thread Tools Search this Thread Display Modes
Old May 13, 2013, 01:27 PM   #101
macrumors G3
charlituna's Avatar
Join Date: Jun 2008
Location: Los Angeles, CA
Originally Posted by gnasher729 View Post
There's also precedence that if they have a search warrant, you would have to supply the passcode anyway.
More recent precedence is that you can't be forced to tell the passcode as that would be self incriminating. All depends on the jurisdication you are in at this point. They can ask but if you say no, that is that. Which is why they are having to find other ways into the devices
charlituna is offline   0 Reply With Quote
Old May 13, 2013, 03:24 PM   #102
macrumors newbie
Join Date: Aug 2009
Should I goto Sony to get my decrypted data off my VIO?

'The ATF's Maynard said in an affidavit for the Kentucky case that Apple "has the capabilities'
The ATF's Maynard said "Apple has the capabilities"
Apple never said this
There is no direct quote from Apple in this article.

What about the privacy policy which states that apple may disclose the information to law enforcement?

The privacy policy that's referred to is about information you provide to Apple.
Not personal private information that's on your personal device.

There was talk about linking the passcode lock to iCloud
But I don't think Apple has done that yet.
That code is local on the device.
Apple or anyone would need to have possession of the device.
Any software encryption can be broken
It doesn't have to be done by the manufacturer.

What is the seven week delay for? and the waiting list?

Someone said that Apple said blah blah blah.
"according to a report from CNET" (on the MacRumors article).
and then "ATF says" )in the article from CNET)
not according to Apple
Apple didn't say anything about a 7 week delay.
Are you sure this isn't from Fox news?
This quote "bypass the security software" is from ATF
Apple would have to decrypt it just like anyone else.
They don't have a code to enter.
Apple doesn't have decryption software
but anyone could write it.
it's not Apple liability.
Apple didn't claim to be able to do that for anyone.

I developed a comparison to illustrate the misconception here.

if you bought a Sony VIO and stored all your personal data on it and encrypted it, and you are a terrorist, and the FBI finds your computer.
Is the FBI going to go to Sony to get the device decrypted?


They are going to have their own forensic people, or...
They are going to go to Disk Savers
So why put Apple in the spotlight?
it's just bad PR that's all, it's not even about the passcode lock, it's just bad PR.

Last edited by slickvicpxx; May 13, 2013 at 03:31 PM.
slickvicpxx is offline   0 Reply With Quote
Old May 13, 2013, 10:06 PM   #103
Rajani Isa
macrumors 65816
Rajani Isa's Avatar
Join Date: Jun 2010
Originally Posted by AppleMark View Post
There is a guy in my local mall who will do it for them for only 15...
Are you talking carrier unlocks? That's not what they're talking here.
Originally Posted by Rocketman View Post
I have concerns Apple is using the "if we determine that for purposes of . . ." portion of the text to assist authorities with bypassing security purchased with the device. Even if the justification is some sort of legal order, Apple is not required to extend special skills to that end. That is a choice.

The police may feel they are permitted, contrary to constitutional language, to have unlimited access to people's "papers and things", but that is not the case. Even court ordered requests to produce are limited to what is available and possible. Lots of production requests go unfilled because of intentional destruction of evidence, encryption, and many other means.

If that clause was used to help the police get access to data on a phone, I don't see them using it short of something where time is crucial and they don't yet have a warrant (missing children, for example).
Originally Posted by gnasher729 View Post
Of course not. You don't start with 0 0 0 0, you start with 1 2 3 4
I think I need to chagne the combo on my luggage.
Rajani Isa is offline   0 Reply With Quote
Old May 14, 2013, 06:30 AM   #104
macrumors 6502a
AppleMark's Avatar
Join Date: Jun 2009
Location: The CCTV Capital of the World
Originally Posted by Rajani Isa View Post
Are you talking carrier unlocks? That's not what they're talking here.
I know..
Although I may not always reply to negative comments, this will not necessarily mean that I concede the point.
AppleMark is offline   0 Reply With Quote
Old May 14, 2013, 10:03 AM   #105
Join Date: May 2013
Originally Posted by gnasher729 View Post
There is no backdoor. What Apple has is expertise that makes it possible for example to try out 10,000 possible four digit passcodes without the device erasing itself. Basically the information that some hacker or the police might figure out, Apple has it already because they built the device. The difference between police and Apple here is that the police didn't spend time figuring out how to do it, that's all.

Apple still has no choice other than trying out all possible passcodes. With four digits, that's no big deal. With a password of 8 random letters and digits, it is basically impossible. Apple also has built-in some protection against brute force attacks like this by making the encryption so that trying each passcode takes considerable time (about a tenth of a second. More and users would complain that unlocking the phone with their passcode takes too long).
I think it is more Apple has a backdoor in.
There is nothing wrong with having a backdoor into something like the iPhone. It is pretty SOP for a lot of software. It comes in handy as a support tool as well. the software I work on we have backdoors to get into them. Now to use one of the back doors you require several other programs that are designed to work with it and you have to know how to active them in the device. Plus those other programs required also have several other things that must be present to work as well. AKA only a handful of us at the company can even use them and even then we do not see the customer passwords nor can access them. what we can do is create a new "admin" account. Very handy for resetting passwords or in dev land when one forgets what the account name was on said install. Or when one completely fries a current account.

back doors in and of themselves are fine and chances are Apple has them.
MegamanX is offline   0 Reply With Quote
Old May 14, 2013, 07:59 PM   #106
macrumors 603
Join Date: Jul 2003
Location: Silicon Valley
Originally Posted by Luscious View Post
If Apple can do it, somebody else can too. It's just a matter of time ....
Since Apple designed the last few Ax chips, they probably have the hardware tools to remove these chips from the package and debug these chips (similar to how Chipworks gets die photos). If the erase logic is on one logic chip and the data is on another flash memory chip, then these chips can be "debugged" separately, without one being able to erase the other. This process would likely be very slow, thus a possible number of weeks of delay.

So, yes, maybe anyone with the A6 ASIC logic diagrams, chip debug tools, and the capability of removing and disassembling the A6 package can do this. You got those?
firewood is offline   0 Reply With Quote
Old May 14, 2013, 09:38 PM   #107
macrumors 65816
OldSchoolMacGuy's Avatar
Join Date: Jul 2008
Originally Posted by coolspot18 View Post
The software may not be certified and may not hold up in court.
Software doesn't have to be certified to be OK in court. One just has to be able to show what the software does (how it goes about collecting the info) and have the results be verifiable with another product too in some cases.

NIST and FBI both have a certification process but the FBI one can take years. Generally they're a couple versions behind but that doesn't mean they don't run the current version out.


Originally Posted by mabhatter View Post
Proper computer forensic protocol says you don't "unlock" devices and just poke around. You run a program that dumps a perfect copy of storage to a HDD and run forensic tools against THAT data. That leaves the original device available to be searched by other teamed (like defense lawyers) if needed.
That use the be the case but we've seen plenty of live forensics in the past 5 or so years. As long as you can show what you changed in court, you're fine. Yes ideally you'd make a forensic image and work with it but in some cases that's not doable.
OldSchoolMacGuy is offline   0 Reply With Quote

MacRumors Forums > News and Article Discussion > MacRumors.com News Discussion

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Similar Threads
thread Thread Starter Forum Replies Last Post
Apple May Be Forced to Unlock 4G on All Compatible Belgian iPhones MacRumors iOS Blog Discussion 38 Apr 29, 2014 04:25 AM
Police Taser woman who tried to buy too many iPhones flameproof Current Events 1 Dec 16, 2012 08:33 AM
How does ATT factory unlock iPhones? h4lp m3 Jailbreaks and iOS Hacks 18 Jul 4, 2012 09:37 AM

Forum Jump

All times are GMT -5. The time now is 07:32 PM.

Mac Rumors | Mac | iPhone | iPhone Game Reviews | iPhone Apps

Mobile Version | Fixed | Fluid | Fluid HD
Copyright 2002-2015, MacRumors.com, LLC