But did he? Did he really??! Sounds like a work in progress...I knew there was a joke to be had there ... and you nailed it!
But did he? Did he really??! Sounds like a work in progress...I knew there was a joke to be had there ... and you nailed it!
Whaaaaat?! The SE looked worse than the 5!iPhone SE
Yes, I'm on a Jet Black now too. Second best looking iPhone ever, I think!That is and was still my favorite iPhone. I was an Android fangirl. That blue 5c was the first iPhone that ever caught my attention. I still have it. I've got a jet black 7+ now and it has a similar feel to the 5c.
As for using the backdoors, what did the FBI expect. We teach militants how to fire guns, then give them weaponry and they turn on us. The FBI uses some third party, potentially with hackers on the inside, and expect zero consequences?
How does the SE look worse or better than a 5 given that it's basically the same (short of the slate color option essentially).Whaaaaat?! The SE looked worse than the 5!
[doublepost=1486147102][/doublepost]
Yes, I'm on a Jet Black now too. Second best looking iPhone ever, I think!
If the 900GB of data was stolen in January and the unlock tool was extracted from that data already, that means they were not using very strong encryption, if any, to protect that tool from falling in the wrong hands. Not to mention that storing that tool on a web server (as it appears to be the case) is not a smart move.I don't think that's the case at all. I think this highlights that no matter what kind of security policies you have in place, given enough time if the target is important enough to someone it will be infiltrated.
Security is an ever evolving cat and mouse game, which just highlights how ******* stupid the FBI's proposals were. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:
https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/
If you have a master key, it WILL be compromised.
I suspect the current US administration to give the FBI and CIA what ever surveillance they want.
I suspect the current US administration to give the FBI and CIA what ever surveillance they want.
If so, that would certainly be no change whatsoever from the previous administration.
But did he? Did he really??! Sounds like a work in progress...![]()
If so, that would certainly be no change whatsoever from the previous administration.
No Administration Republican or Democrat can be trusted to protect our privacy.
Anyone didn't see this coming?
. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:
https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/
If you have a master key, it WILL be compromised.
So Apple can most likely study these tools heavily and patch their OS/go from there right? This is a good thing for the security of iOS no? As Apple now can look and study these tools
Well he nailed somethingI knew there was a joke to be had there ... and you nailed it!
Even that won't work as the third person will spill the beans out of remorse. Gotta kill all three, and hope no one left a diary.Which brings me back to brilliant Benjamin Franklin:
Three can keep a secret, if two of them are dead!
64 bit iOS devices are defitnetly a bit more secure then 32 bit ios devices yes(secure enclave, Touch ID, etc in 64 bit iOS devices) plus armv-8 which brings some security improvements over 32 bit chipsThere is a big difference from an A6 to an A7 in terms of data security. Has it been shown that there is a way in to the 64 bit devices?
Full ack! Preferably with a hammer...Thank you, anonymous hacker. Sometimes reality needs to be brought to certain people and organizations.
Their customer base probably consists vastly of people, ruling your or my country. THEY are the real problem, creating a market for these companies through demand.Huge thumbs down for greedy basturds Cell-out-brite...
How does the SE look worse or better than a 5 given that it's basically the same (short of the slate color option essentially).
Well, the 5c is different than 5.Now I have an SE as my iPhone but as far as I'm concerned, the cosmetics of the 5C > SE. By far. I kept the 5C to use as a WiFi only device and still prefer its look and feel (with the apple dots case) to the SE, even though I have a nice grippy case on the SE and am happy with its smaller size compared to the 6 etc.
I don't have anything "personal" on the 5C since I just use it for entertainment, but it does have my apple ID... wondering how exposed I am now if "anyone" can hack a 5C, since I rarely even have it connected to the net except when upgrading software.
On the Cellebrite hack(s): Tim Cook was right, and... one despairs at "customer data" of anyone actually being secure. Not least because corporate interest in "security" goes about as far as the first hint that anyone is inconvenienced while trying to conduct business. Security is not thought of as being a "real" part of business, just an obstacle course to run whenever time is short and something more tangible --in potential effect on the company's bottom line-- than "security" seems to be at stake.
You know something inappropriate is probably happening if a CEO asks a risk manager --also an officer-- to leave the room during some board meeting. But see it almost never gets that blatant with security managers, because they just get 3am phone calls from some senior VP to take down some fence or other long enough to "get this done already".
The average CIO never hears about this stuff unless the security manager feels like putting his job at risk by balking at an improper request from someone up the line... although once in awhile a CIO is terminated for apparently not having sold in security as a big enough deal to general managers (like after a breach that affects millions of people). It doesn't take a skilled hacker to get to a lot of stuff. It just takes greed and carelessness.
The FBI wasn't asking for a golden key. That would be a backdoor. They were asking for a tool to crack existing, non-backdoor'd iPhones. Apple, to save face and make people blame the FBI, called it a golden key when it's really a key anyone could make with enough effort.I don't think that's the case at all. I think this highlights that no matter what kind of security policies you have in place, given enough time if the target is important enough to someone it will be infiltrated.
Security is an ever evolving cat and mouse game, which just highlights how ******* stupid the FBI's proposals were. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:
https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/
If you have a master key, it WILL be compromised.
The FBI wasn't asking for a golden key. That would be a backdoor. They were asking for a tool to crack existing, non-backdoor'd iPhones. Apple, to save face and make people blame the FBI, called it a golden key when it's really a key anyone could make with enough effort.
It seems the tool that was used to open an iPhone 5c doesn't work with any newer phones anyway, starting with the iPhone 5s that was sold at the same time.So Apple can most likely study these tools heavily and patch their OS/go from there right? This is a good thing for the security of iOS no? As Apple now can look and study these tools