Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
It was stupid of Apple to not do this for the FBI behind closed doors. If they simply had unlocked the phone owned by San Bernardino County and handed it back to the FBI -- it was a court order after all -- then the FBI wouldn't have ventured down the path they took.

Sewell testified under oath that the FBI wanted this new tool on a hard drive.
 
  • Like
Reactions: Glideslope
No, it was stupid for Apple because that phone was going to get unlocked one way or another. Now they have to live with the fact that it can be unlocked and they don't know how it was done. That sure doesn't help their sales pitch.

Additionally, what "right" were they standing up for? Was it the right to defy a court order? If it was, I'd like to be able to use that, too, some day if I ever need to. Doubt it works.
Everyone who has a clue knows exactly how this was done. It's a decades old technique (that gets modernized as architectures shrink) called de-capping. It's been used by every intelligence agency who needs to see what a chip does or what it contains for decades.

http://hackaday.com/2012/08/13/taking-a-look-at-decapped-ics/

Defcon 21 - Decapping Chips The Strike Easy ... - YouTube
[doublepost=1459272234][/doublepost]
The San Bernardino shootings were not far fetched. 14 people were killed and 22 injured.

Yeah, both sides can come up with ludicrous examples, like governments turning on cameras in phones to spy on people, or nuclear bombs placed on trains or in buildings. But the more realistic examples are the ones we have to worry about, such as those you mentioned, or the SB shooting. Between tight encryption and a fair judicial review process, I believe we can strike a middle ground somewhere.
There is no middle ground on encryption. There simply isn't and there will never be a technical ability to create an opening that can't be exploited. This is the security arms race that has been around since day one of encryption. Simply stating there should be (as the FBI and the no-nothing President have been doing) doesn't change reality.
 
  • Like
Reactions: Glideslope
What scares me about this is what I heard from congressmen and other officials about this issue while the investigation was going on.... most of them are CLUELESS about technology and how these things work. It was so frustrating to listen to some of them as they spouted off things that we're just plain wrong.

Besides, if they force a back door and now the terrorist know that they can get at information from a smart phone, what do you think the terrorists will do? Oh... yeah... stop using smart phones. Meanwhile, IMHO the real threat to everyone is cyberterrorism and that same backdoor will have a welcome mat on it for terrorist and criminals.

Yes, it is frustrating. That's exactly why the tech companies have to be involved. Most of the legislators are lawyers, so they think about these issues in terms of legal requirements (4th amendment protections, reasonable searches, etc.)

In the hearing a couple week back, Darrell Issa, who has a good background in the security business, really grilled Director Comey regarding how the FBI was doing it's analysis of the phone and what other methods they were trying. Issa is the kind of guy you want on this issue because he sees it from both sides.
 
  • Like
Reactions: dk001
just noticed how stark in contrast the apple logo and the DOJ/FBI logo are side by side per the article. i hadn't noticed until just now, but it speaks volumes in today's age.
 
There is no middle ground on encryption. There simply isn't and there will never be a technical ability to create an opening that can't be exploited. This is the security arms race that has been around since day one of encryption. Simply stating there should be (as the FBI and the no-nothing President have been doing) doesn't change reality.

Your view is part of the problem why this issue is so divisive. You want to be on one extreme end, but I don't see that as reasonable or possible. The FBI will be back, as Arnold has said:


I found this article enlightening.

https://www.lawfareblog.com/apple-v-fbi-shows-lawyers-and-tech-speak-different-language-privacy
 
just noticed how stark in contrast the apple logo and the DOJ/FBI logo are side by side per the article. i hadn't noticed until just now, but it speaks volumes in today's age.
Yep, the FBI took a bite out of that Apple.
 
Your view is part of the problem why this issue is so divisive. You want to be on one extreme end, but I don't see that as reasonable or possible. The FBI will be back, as Arnold has said:


I found this article enlightening.

https://www.lawfareblog.com/apple-v-fbi-shows-lawyers-and-tech-speak-different-language-privacy

It doesn't matter what you view as possible. Computer Science says it's not possible. Logic (by which I mean computer logic) says it's not possible. It's not ****ing possible to put an access vector into software that can't be exploited by anyone else who discovers it.

Lawyers views don't change anything about how computer code works. The FBI's view doesn't change anything about how computer code works. Your views don't change anything about how computer code works. Your problem is you refusing to acknowledge that any method put in place to access a phone that is encrypted can and will be exploited by bad actors.

Viewing this as a side vs side issue is again just simply ignoring to accept reality. Now you can be of the mind that we should take the risk and put the "door" in, but that doesn't change the technical reality that that "door" can and WILL be exploited.
 
I completely disagree. BTW... even though phones are secure in China, they run a walled garden for internet access and control what people can see and have access to their phone carriers. So, they really don't need to snoop on a phone to track or snoop on their people. They are already oppressed in other ways.

Except in the case of internal dissident like the Huygur and Falun Gong where they do need to monitor according to the CCP modus operandi. There is no right to privacy whatsoever in China and I wouldn't be surprised that Apple is complicit in making sure the CCP has access. If they don't they'll lose that lucrative market and China doesn't give a damn about bad publicity concerning human right.
 
Wow! You read an article about this case!? Bravo! Kudos to you!!!

IIRC, the govt said they were able to access SOME information. Regardless, Apple wasn't attempting the FBI from accessing the phone, in fact they have assisted the FBI on several occasions and were helping the FBI on this case specifically for several months. Their stance was threat they not be compelled to create a version of iOS that would break their encryption (simplified for brevity).

Here's the thing...yes...all Apple would need to do is create a process by which they could bypass security and allow the FBI access to the phone. Two things about that...it's a process that could be replicated 1000's of times. So not literal 'master key', but for all intents and purposes, it's figuratively a 'master key (process)'. You see, if apple can do it for one phone...then the process will work form all iPhones (with the same HW/W combo in this case; later phones have much stronger HW/SW encryption).

I think Apple took the right tone. The FBI took it to the streets and went on the attack after Apple spent months trying to assist. It was only after Apple refused their request that they began to make a big issue of it. This is similar to the Clipper chip issue in the 80's. Apple did the right thing by coming out strong against the FBI's statements. In the end it was the right thing to do because the FBI backed down.


If anything, it is your speculation. It does not matter whether government gets anything or not. I don't believe for a second that FBI is not capable hack into iPhone. You must be really naive to think iPhone is unbreakable.

If anything, this is FBI's experiment on how far they can push tech companies on privacy issue.

I was reading a article about this case. All Apllw need to is create special version of iOS that would loaded into phone. Apple could render that copy useless when Aplle stop signning that particular version.

Personally, I think whole thing is overblown by Apple and Apple used this as great PR opportunity.
 
This is actually great news. Apple can now refuse to comply with the 10-20 other cases where law enforcement is asking Apple for help. They can refer these cases to the FBI.

10-20?
Maybe 10-20 thousand....
Just two agency's here in Los Angeles have in excess of 400 of them. Start adding every other LEO agency (State + Federal) and you will have thousands.
 
Last edited:
Don't you know that people's beliefs override the truth these days....?

s/

It doesn't matter what you view as possible. Computer Science says it's not possible. Logic (by which I mean computer logic) says it's not possible. It's not ****ing possible to put an access vector into software that can't be exploited by anyone else who discovers it.

Lawyers views don't change anything about how computer code works. The FBI's view doesn't change anything about how computer code works. Your views don't change anything about how computer code works. Your problem is you refusing to acknowledge that any method put in place to access a phone that is encrypted can and will be exploited by bad actors.

Viewing this as a side vs side issue is again just simply ignoring to accept reality. Now you can be of the mind that we should take the risk and put the "door" in, but that doesn't change the technical reality that that "door" can and WILL be exploited.
 
  • Like
Reactions: eac25 and NT1440
I was citing a case that happened somewhere fairly recently, where a nutter went on a killing spree in a cinema. None of the audience had a gun to take him out, so they had to wait for the police. In the several minutes it took for the police to arrive, he shot dead dozens of people.

It is morally responsible to own and carry a gun. It is morally negligent not to do so.

Yes, understand that part. However when things like this happen, it tends to turn to pandemonium quite fast, and if many are armed and start firing it gets messy. You cant tell the good guys from the bad, and you are likely to have lots of friendly fire issues.

I'm not a gun person. I think the stats for home gun ownership are fairly clear, as its many times more likely to be used against a family member than an intruder.

I have no problem with those that want to own firearms. Its their choice. As long as they keep them secure, more power to them. However at least every month I read about some kid who shoots his brother when he finds a unsecured gun, or the kid in Walmart who shot his mom from the gun in her purse.
 
Don't you know that people's beliefs override the truth these days....?

s/
Thanks for the info on the Clipper chip, I had forgotten the name of that scandal and couldn't find anything when looking for it. Unfortunately the NSA has gotten far more nefarious these days. They intercept shipments to install hardware backdoors, but I'm afraid they've gone much further than that. They are involved in the actual development of many upcoming encryption standards (meaning they design a vulnerability right in), and beyond that no one is stopping them from infiltrating the Intel's and ARM's of the world to just etch the damn circuitry right in where no one will see it unless they've personally traced all billion transistors on a given chip design.

The surveillance apparatus that the USA operates is beyond anything anyone could have fathomed during the Cold War.
[doublepost=1459274319][/doublepost]
Here's speculation that the FBI found a zero-day exploit. The article isn't clear as to whether this possible exploit is particular to the iPhone 5c or whether it could be achieved on any iPhone:

http://www.eweek.com/security/fbi-exploits-zero-day-on-ios-to-hack-terrorists-iphone.html
I wonder if they simply shopped around for it, or if they went the de-capping route.
 
Your view is part of the problem why this issue is so divisive. You want to be on one extreme end, but I don't see that as reasonable or possible. The FBI will be back, as Arnold has said:


I found this article enlightening.

https://www.lawfareblog.com/apple-v-fbi-shows-lawyers-and-tech-speak-different-language-privacy

It's only divisive to someone that's viewing this from an emotional or visceral standpoint. The unequivocal fact, which cannot be argued logically, is that you either have encryption or you do not. Encryption that is weakened to become ineffective at obfuscating apprehension by anyone other than the author and the intended recipients, irrespective of who said party is or their reason, ceases by definition to be functional encryption.

Even if one assumes the general benignity, beneficence and justness of a government is absolute, or even reasonably probable, one must also assume that said government alone will possess the means; financial, technological and intellectual; to circumvent the weakened encryption and that more malevolent parties will possess neither the means nor the desire to do so as well. With encryption guarding financial transactions and lucrative secrets, only an utter idiot would assume this to be the case.

Will strong, even realistically unbreakable, encryption protect unknown predators, criminals, terrorists, etc? Yes, absolutely. I, and I must presume many other advocates of privacy and digital security, do not care. We come to the entirely logical and reasonable understanding that for every one of those deplorable people the technology protects, there are hundreds of thousands of decent people that are protected by the same technology. I do not accept that sacrificing the good of those hundreds of thousands is a reasonable price for one person, or fourteen, or twenty-two or however many.
 
  • Like
Reactions: HEK and duffman9000
Obviously just another False Flag high profile publicity stunt. Aims:

1. Make Apple appear to be "The People's Friend"
2. Create fear amongst device users
3. Publicise reductions on personal privacy
4. etc.
5. I am now bored with the matter so please don't respond if you don't understand my points.
6. Thanks.
Yeah. Nice to see how you try to mute any other opinion than your paranoia before it is even written.
What you do is to look for simple answers to difficult questions. That almost never pays out.
 
Love how you always reframe something to try to be right...

A backdoor is not "a way to instantly bypass normal authentication". You were almost right. Of the varying definitions, the one from Wikipedia is the most succinct: "A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. "

So a backdoor is a process (a synonym for method) for access. That process can be easy and instantaneous (as you implied) or it can be more involved...such as the backdoor the FBI was requesting. But that's semantics really.

While involved, the FBI was trying to force Apple to perform this process (create/access this backdoor) on this phone as a proof of concept...a precedent. If they can force Apple to do this for them this once...they can force Apple to do it again and again regardless of the HW/SW encryption changes on later iPhones.

As you mentioned, malicious actors still need the Apple signed certs to access the device. But why should apple be compelled to create it in the first place? Would it be accessible because of the signature? Probably not. But tech and security don't stand still. IF it were to get out (and it's a big if) it wouldn't be useful as you said. But why open yourself up to yet another possible avenue of approach? It's only a matter of time before someone figures out how to crack that.

I'll go back to this: Apple should be not be legally compelled to write code for the govt to sidestep it's own security.


A backdoor is a way to instantly bypass normal authentication. In the case of the FBI request, authentication remained in play. The real passcode was still required. In fact, if the guy had used a strong passcode, brute force could still take a half decade.

I'm talking about the requirements for each doing it each time, and how Apple overhyped the possible consequences of doing so, in an attempt to stir up fear.

The FBI did not ask that a universal backdoor be built into public versions, nor that they be given it.

Apple was even free to create a device specific version, which they said they could do.

Most importantly, no outside device could load even a non-device-specific version anyway, since Apple's public facing update servers would not sign it. Without that, a leaked version would be as little use to anyone, as versions are now to anyone trying to downgrade to an iOS that is no longer signed.
 
Yeah, both sides can come up with ludicrous examples, like governments turning on cameras in phones to spy on people, or nuclear bombs placed on trains or in buildings. But the more realistic examples are the ones we have to worry about, such as those you mentioned, or the SB shooting. Between tight encryption and a fair judicial review process, I believe we can strike a middle ground somewhere.
Strong encryption for our personal data IS the middle ground between having no digital footprint at all and having every aspect of our digital lives subject to scrutiny.

Much of what we do online leaves a trail that law enforcement officials (or bad actors) can follow. We have far less privacy in our lives than our grandparents had. Where I am sitting right now eating lunch, I can see four video cameras watching me. But there are places I can go where there are no cameras, like my bedroom. You are saying there must be a middle ground between not having cameras in my bedroom, and having them.
 
  • Like
Reactions: dk001
It's only divisive to someone that's viewing this from an emotional or visceral standpoint. The unequivocal fact, which cannot be argued logically, is that you either have encryption or you do not. Encryption that is weakened to become ineffective at obfuscating apprehension by anyone other than the author and the intended recipients, irrespective of who said party is or their reason, ceases by definition to be functional encryption.

Even if one assumes the general benignity, beneficence and justness of a government is absolute, or even reasonably probable, one must also assume that said government alone will possess the means; financial, technological and intellectual; to circumvent the weakened encryption and that more malevolent parties will possess neither the means nor the desire to do so as well. With encryption guarding financial transactions and lucrative secrets, only an utter idiot would assume this to be the case.

Will strong, even realistically unbreakable, encryption protect unknown predators, criminals, terrorists, etc? Yes, absolutely. I, and I must presume many other advocates of privacy and digital security, do not care. We come to the entirely logical and reasonable understanding that for every one of those deplorable people the technology protects, there are hundreds of thousands of decent people that are protected by the same technology. I do not accept that sacrificing the good of those hundreds of thousands is a reasonable price for one person, or fourteen, or twenty-two or however many.

So, in a nutshell, your position is: I would rather have people die than sacrifice my security and privacy.

Sorry, but that's an untenable position, and, I might add, a morally derelict one.
[doublepost=1459276713][/doublepost]
It doesn't matter what you view as possible. Computer Science says it's not possible. Logic (by which I mean computer logic) says it's not possible. It's not ****ing possible to put an access vector into software that can't be exploited by anyone else who discovers it.

Lawyers views don't change anything about how computer code works. The FBI's view doesn't change anything about how computer code works. Your views don't change anything about how computer code works. Your problem is you refusing to acknowledge that any method put in place to access a phone that is encrypted can and will be exploited by bad actors.

Viewing this as a side vs side issue is again just simply ignoring to accept reality. Now you can be of the mind that we should take the risk and put the "door" in, but that doesn't change the technical reality that that "door" can and WILL be exploited.

I understand all this, believe me I do. But as I said, it works both ways for the good guys and the bad guys. Let me ask you this: How would law enforcement do its job with encryption and security at the levels you propose? Is there a way?


I'm all for privacy and security, but since it can also be used against us, there needs to be a way for law enforcement to do its job and not be frustrated by super high level encryption. My position is that with the right mix of legal protections and technology, a reasonable balance can be achieved. Maybe not perfect on either side, but a reasonable, workable balance.
 
Last edited:
  • Like
Reactions: hudson1
So, in a nutshell, your position is: I would rather have people die than sacrifice my security and privacy.

Sorry, but that's an untenable position, and, I might add, a morally derelict one.

You may want to explain that one to our first US Postmaster General and author of the US Declaration of Independence. He had the same position that you criticize as 'derelict and untenable'.

BL.
 
Yep, the FBI took a bite out of that Apple.

meh. one could view it that way if one really wanted to. i was more inferring their design/aesthetics speaks to their core principles, behaviors, ethos.. i get it that some people want to gloat about apple being 'inhibitors of justice' and all that, but i fail to see cause for celebration - other than to 'celebrate' the fact they'll certainly be upping their game from here on out.
 
This is probably not the last we've heard about this issue. I hope Apple's attempts for even stronger protections come to fruition sooner than later!
On the other hand, it might be better from a PR POV if Apple leaves the Icloud hole open so that they can continue to claim they are being helpful to the court. If both the iPhone and icloud data cannot be provided, the court/government will continue to claim that Apple is blocking their investigations.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.