Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
https://www.yahoo.com/tech/fbi-might-crack-san-bernardino-iphone-153654726.html

Great....and Apple can't do about it. Another word: game over, Tim.

It's just a way for them to save face. After realising they don't stand a chance in court they back away. As mentioned earlier the are scared to make a precedent out of loosing this particular battle.

They need the public opinion or it will be fail. So a bigger better false flag is the only option.

The idea they have a way to get in is ********. Wait some weeks and see if all the phones lined up everywhere are unlocked. Not a chance.

So no, not game over yet, they need to blow up something bigger and kill more people and to be really sure the POTUS need to declare a state of emergency. Then it doesn't matter much, then y'all royaly ****ed anyway.
 
Last edited:
  • Like
Reactions: pat500000
I still don't get why the FBI can't just clone the 5C and have a super computer run the possible encryption codes through all the clones. I doubt that there isn't a way to copy over the encrypted data and attempt it ... and It's pretty clear they should have the resources ... If you have something in your hands nothing is unhackable especially with those kinds of resources
 
I still don't get why the FBI can't just clone the 5C and have a super computer run the possible encryption codes through all the clones. I doubt that there isn't a way to copy over the encrypted data and attempt it ... and It's pretty clear they should have the resources ... If you have something in your hands nothing is unhackable especially with those kinds of resources

My understanding is that there is a hardware chip on the phone that holds part of the encryption key, and nobody knows what is on that chip, including Apple. You need the key from this chip + the passcode to decrypt the data. There is a technology to clone the hardware chip, but you only get one go at it, and if it doesn't work then the chip is gone and the data is lost forever.
 
They are the deep state. In Europe, after WW2, an organisation was created to counter a possible Soviet invasion. It's also called a stay-behind organisation and got the name Operation Gladio.

This organisation was used to change undesired political developments through terror events and have over the years been accused of many horrible bombings and murders.

The most recognised expose on Gladio is written by the historian Daniele Ganser at the University of St. Gallen, Switzerland. It's called NATO's Secret Armies and Terrorism in Western Europe, you can read it here.

Running the deep state are the people with the real power, those that own and control the worlds central banks, media, politicians and corporations. Those that finance both sides of wars and make huge money on them. They are the ones behind every major terror attack you have heard of, the motive is very simple. Scare the **** out of people so they willingly surrender to draconian laws of surveillance and the creations of totalitarian police states. The script running today is straight out of Orwells 1984.

The people that do this is a psychopathic racket of zionist criminals. If you are interested there is an abundance of information regarding them on the net.

*UPDATE* Found an article explaining the banking connections and history. It explains from where the real powers in the world originate.

Untold Truth: Vatican is behind world’s top banks, governments, global companies & your mortgage!
 
Last edited:
If the UUID (i'm guessing that's what their talking about when they say Unique) is tied to the phone, why does Apple need to see what the FBI did ? If the FBI gets it via other methods, privacy is still safe if its unique.... Or it it just because Apple wants to know as information only ?

We like the word 'Postponed'
 
If the UUID (i'm guessing that's what their talking about when they say Unique) is tied to the phone, why does Apple need to see what the FBI did ? If the FBI gets it via other methods, privacy is still safe if its unique.... Or it it just because Apple wants to know as information only ?

Apple did make it hard to decrypt iPhones by giving each device a unique key. But a method that works to defeat the unique key on one device would work to defeat all keys, or else it wouldn't work at all.

It's like, say, you have a safe with a very complicated lock. Each safe has a unique lock, and you need to have the right key to open the safe. But if someone comes up with a drill that can drill through the safe door, it no longer matters that each safe had a unique lock. All safes are equally vulnerable to drilling.
 
Apple did make it hard to decrypt iPhones by giving each device a unique key. But a method that works to defeat the unique key on one device would work to defeat all keys, or else it wouldn't work at all.

It's like, say, you have a safe with a very complicated lock. Each safe has a unique lock, and you need to have the right key to open the safe. But if someone comes up with a drill that can drill through the safe door, it no longer matters that each safe had a unique lock. All safes are equally vulnerable to drilling.

So is there a way to defeat the key?

I thought the whole point of Apple doing this was to NOT have a key that you could defeat.

As for safes... if you've got a drill bit with a tip stronger than the metal on the safe... you can likely drill into the safe and gain access to it.

Safes are in the physical world. You can drill into a safe or even put a safe into a giant crusher and slowly bend the case. Eventually the door will pop open.

But we're talking about math here. And math is EXTREMELY secure. I don't want to be the guy who has to break 256-bit AES encryption.
 
So is there a way to defeat the key?

I thought the whole point of Apple doing this was to NOT have a key that you could defeat.

From what I understand, the method FBI is supposedly trying sounds more like bypassing the key. To go back to the safe analogy, defeating the key would be analogous to picking the lock. But drilling a hole bypasses the lock entirely.

Also, keep in mind that the phone in question here is a 5c. It has older encryption technology than more recent models, like the 6/6+/6s/6s+. Those recent models would be harder to beat.
 
Who is "they"?

Since you asked and I referred to Deep State. Here is an interesting interview with Mike Lofgren, author of "The Deep State: The Fall of the Constitution and the Rise of a Shadow Government"

Particularly interesting is a reference to the link between Silicon Valley and NSA, starting at 14.20, although the full interview is well worth watching.


Here is Ron Paul doing an interview with Mike Lofgren on the same topic. "Anatomy Of The Deep State: An Open Conspiracy"
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.