Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
The issue is, in each of those cases, the third party in question has records on hand or a key on a hanger to offer the gov the data the warrant requests. They just run a report and pass it to the gov representative. The warrant basically says show me the data you already have.

The Apple case is different in that they have no records on hand and no keys. They are asking to produce a key that doesn't exist and add risk to all other phone owners.

I respectfully disagree with your assessment. Even if the Feds are asking for the key, Apple could make the key, use it on the phone, and give the Feds the data without giving them the key. The fact that many people on here have such DISTRUST for the Feds with our data but complete TRUST in Apple with our data is a little upsetting to me.
 
I think Apple has been trying to balance security and end user convenience. I expect iOS 10 and the next iPhone release to really tighten the screws. I think Apple is even more motivated now.

It's not just Apple. You c an bet Microsoft, Facebook, Google and all the Android OEM's are watching this and likely to increase encryption protection moving forward.
 
I respectfully disagree with your assessment. Even if the Feds are asking for the key, Apple could make the key, use it on the phone, and give the Feds the data without giving them the key. The fact that many people on here have such DISTRUST for the Feds with our data but complete TRUST in Apple with our data is a little upsetting to me.

Inaccurate.

Apple has to create new software that creates a backdoor on the phone. That in turn is used to turn off the auto erase, auto time delay and create options for remote access to passcode entry. They give the phone back to the gov with the update applied, who then figures out how to open it.

Its not a key at all, but totally new software.
 
Inaccurate.

Apple has to create new software that creates a backdoor on the phone. That in turn is used to turn off the auto erase, auto time delay and create options for remote access to passcode entry. They give the phone back to the gov with the update applied, who then figures out how to open it.

Its not a key at all, but totally new software.

OK. So they install this software, get the data. The subpoena says that this work can be done at the Apple facility. Then when they do the data dump or whatever they can reinstall the original software and return the phone. Why wouldn't that work?
 
It's not just Apple. You c an bet Microsoft, Facebook, Google and all the Android OEM's are watching this and likely to increase encryption protection moving forward.

I wouldn't be surprised to find that iOS 10 includes some new security features, perhaps unadvertised and unsettable, that will preclude any further such backdoor activity.
[doublepost=1457715333][/doublepost]
OK. So they install this software, get the data. The subpoena says that this work can be done at the Apple facility. Then when they do the data dump or whatever they can reinstall the original software and return the phone. Why wouldn't that work?

That isn't what the FBI requested. They want the phone modified so they (FBI) can unlock it and get the data.

There is probably a chain of custody issue here too. Can the FBI use any data (in a legal sense) that might result if the device leaves their possession and is modified by people not part of the gov.
 
  • Like
Reactions: dk001
I think having the fear of my entire life being turned upside down thanks to a backdoor being opened up on my phone is a pretty legitimate fear, and not 'overblown.' But you're right FBI, what do I know?

I can't remember the last time our government has been so condescending to the people they're supposed to serve.
 
  • Like
Reactions: Benjamin Frost
...
There is no ignorance. When you deal with a State, State's laws are ruling. Apple made a deal with the Irish government. A legal deal.
What is wrong is the deal itself, because Ireland is playing dirty (not only with Apple but also with many big corporations like Google) with unfair competition with others european countries.

Look at the top 100 companies that deal in a global economy. A lot of them have offices in Ireland.
[doublepost=1457716383][/doublepost]
Following this, I'm really starting to get fed up with Apple trying so hard particularly when they clearly don't know what's on the table here:...

Plus as stated, the FBI doesn't need Apple's help,, They can crack AES on their own if they want... The fact they choose to get an order is because it's the right thing to do, and easy way out..
....

One of the aspects of using the AWA is that it is "used" only after all other means have been tried.
The FBI has not said this is in fact the case on their side. They only stated "all that will talk to us...".
The FBI is not saying who they have or have not talked too.
 
I respectfully disagree with your assessment. Even if the Feds are asking for the key, Apple could make the key, use it on the phone, and give the Feds the data without giving them the key.

Sure. Then it sets the precedent and the FBI goes after another phone in a criminal case against a living person. Then Apple is forced again to repeat this process. Then the defense attorney in that later case requires chain of custody information as part of the defense. Then the "key" is in the courts and part of public records.

I wanted to keep precedent out of the discussion becasue I felt that has been discussed rather accurately in the multitude of discussions on the subject. In fact, I think precedent is about the only thing the community (here on MR) has gotten right. People largely still seem to be calling this some sort of back door to be built into all iPhones, and that really isn't the case.

I don;t disagree about your statements on precedent at all. But if this does go through, that doesn't mean all of our phones are going to have some new and innate vulnerability that wasn't there before.

LotR, I believe I understand where you're coming from and the logic you're using, but I'm not sure all of us here agree with it, at least not 100%. The argument goes something like this:
(1) In order for Apple to load this version of software on this one phone requires some process of side loading it - through DFU or recovery mode or through whatever process would be required (I'm no expert on these mechanisms).
(2) This technique, once exposed and in "the public" {see above}, could also be used by whatever bad actors have the capability to recreate it - this might include hackers, terrorists, foreign governments, whomever...
(3) Even if physical custody of the phone is a requirement to implement the actual breaking-in part, there are several occasions that do not apply to all people but certainly do apply to some people where one must give up physical custody of one's phone. If it is during one of these occasions that the bad actor has access, then the hack might be implemented. Such occasions include such innocuous things as attending certain types of meetings, or taking a tech certification test as well as non-innocuous occasions like if someone is taken into custody, kidnapped, etc. or if the phone is simply stolen or lost. MOST of these occasions are not ones where the "victim" would be legally compelled to surrender their phone's info.

So while your fundamental point about this *not* being about a universally loaded back door that allows anyone with a passing interest to hack any phone anywhere in the world at any time is true, the scope *can* be much broader than just this phone, or even just the phones at question under legally issued warrants.

While I appreciate your trying to bring clarity to the discussion and keep it based on facts (as much as the future can yet be factual), which I too am endeavoring to do, and while I concede that many folks' impression of this risk is hyperbolic and not grounded well in real possibilities, I feel it important to point out in the same spirit that it is likewise hyperbolic to dismiss this as a "one time only" thing that could never fall into nefarious hands and put innocents at risk.
 
  • Like
Reactions: dk001
OK. So they install this software, get the data. The subpoena says that this work can be done at the Apple facility. Then when they do the data dump or whatever they can reinstall the original software and return the phone. Why wouldn't that work?

Because then every government will be able to force Apple to do the same for every phone.
[doublepost=1457718024][/doublepost]
Sure. Then it sets the precedent and the FBI goes after another phone in a criminal case against a living person. Then Apple is forced again to repeat this process. Then the defense attorney in that later case requires chain of custody information as part of the defense. Then the "key" is in the courts and part of public records.



LotR, I believe I understand where you're coming from and the logic you're using, but I'm not sure all of us here agree with it, at least not 100%. The argument goes something like this:
(1) In order for Apple to load this version of software on this one phone requires some process of side loading it - through DFU or recovery mode or through whatever process would be required (I'm no expert on these mechanisms).
(2) This technique, once exposed and in "the public" {see above}, could also be used by whatever bad actors have the capability to recreate it - this might include hackers, terrorists, foreign governments, whomever...
(3) Even if physical custody of the phone is a requirement to implement the actual breaking-in part, there are several occasions that do not apply to all people but certainly do apply to some people where one must give up physical custody of one's phone. If it is during one of these occasions that the bad actor has access, then the hack might be implemented. Such occasions include such innocuous things as attending certain types of meetings, or taking a tech certification test as well as non-innocuous occasions like if someone is taken into custody, kidnapped, etc. or if the phone is simply stolen or lost. MOST of these occasions are not ones where the "victim" would be legally compelled to surrender their phone's info.

So while your fundamental point about this *not* being about a universally loaded back door that allows anyone with a passing interest to hack any phone anywhere in the world at any time is true, the scope *can* be much broader than just this phone, or even just the phones at question under legally issued warrants.

While I appreciate your trying to bring clarity to the discussion and keep it based on facts (as much as the future can yet be factual), which I too am endeavoring to do, and while I concede that many folks' impression of this risk is hyperbolic and not grounded well in real possibilities, I feel it important to point out in the same spirit that it is likewise hyperbolic to dismiss this as a "one time only" thing that could never fall into nefarious hands and put innocents at risk.

So it goes through the courts and China presents a warrant asking to install this software on the phones belonging to every supporter of the Dali Lama (a terrorist in their eyes). Then what?

Or Pakistan or Iran or someone take it a stage further and ask for this software to be installed on every homosexuals phone - after all in those countries homosexuality is a death penalty/life imprisonment crime.
 
  • Like
Reactions: dk001
Does the phone company violate your trust when they receive a subpoena to give the government your phone records?
Does the bank violate your trust when they receive a subpoena to give the government your bank records?
Does your landlord violate your privacy when he receives a search warrant to search your apartment and he opens the door for the cops/feds/whatever?
The feds would still need to obtain a search warrant to use this "key" to get into your phone. So I don't see what the issue is.

It's phone records, not conversations.

The government already knows my income through IRS tax filings.

I don't have a landlord.
 
It's phone records, not conversations.

The government already knows my income through IRS tax filings.

I don't have a landlord.

The other thing is that physical searching is slow and boring. So if you only have a tiny chance of finding something you don't do it.

Additionally it is obvious and high profile so if you're a political dissident you can
use being searched illegally to further your cause.

Furthermore landlords can't search your house without a time delay.
 
  • Like
Reactions: Benjamin Frost
source of 100% known good terror link.

We have what can be construed as a workplace violence scenario. The only aspect so far I know to give this a terrorism aspect is the shooters were followers of islam. Tenuous link really...not every minority who shoots someone is a gangsta. Not every white shooter is in a biker gang. And not every Italian criminal is cosa nostra related. They are just one off members of their race who decided to do horrible things to other people that day . No rhyme, no reason, no orders from the say head of a mob family.

Question for you...in any prior violence shooting when done by white people and non Islamic were these classified or looked at as possible terrorist in nature? No. I am sure one post office shooter or mass shooter in the past was Irish. Did we run out the dragnets looking for the IRA maybe looking for a new angle? Nope.

White guy flipped out of his mind (usually white males for this, won't dig deep to find the x percentage of non-whites or females...generalization used as well I am not writing a PhD here lol), goes to page 2 and 3 days later. Maybe used as a reference in gun legislation discussions there after.

Southern Cali drive by's and such....where is the 2000 hour investigation into it? There Is none. Crips shot bloods, civilians caught in x-fire. Tragic event that gets wrote off as gang violence Maybe the crips were closet black muslims...do we know? Nope. Gang violence the stamp on the case.

what this event is looking like more and more as the FBI and SB DA keeps on digging for new reasons. We don't even have say ISIS going see what we can do US...see what we can do. Nor any cell of any kind. These crews tend to claim damn near anything for their 15 minutes of fame.

If only to bust LE's balls with crank calls claiming the incident so it has to be investigated. We are the sect of the immortal cow level masters...we did this. (been playing a lot of diablo 3 recently...best I got atm). Sounds like a crackpot crank call...sure. One they have to follow up on though. We don't even have this. Not one anonymous tip even.

I agree.
Timothy McVey (sp?) and Terry Nichols were definitely terrorists along with the fools in Oregon.
[doublepost=1457719872][/doublepost]
I respectfully disagree with your assessment. Even if the Feds are asking for the key, Apple could make the key, use it on the phone, and give the Feds the data without giving them the key. The fact that many people on here have such DISTRUST for the Feds with our data but complete TRUST in Apple with our data is a little upsetting to me.
You still don't get it.
Apple can't make a key to unlock the phone.
The feds want the following:
1. Apple to make a version of IOS that does not honor a limit 10 password attempt and also adds no delay between password attempts except the required computing delay.
2. Create a way for that password to be entered remotely or over a lightening cable.
3. Test the software and make sure it works.
4. Figure out a way in the current configuration of the phone to load that software and create an updater to do it.

Nowhere in there is Apple creating a key.
They are creating a way to brute force the device.
The software required to do that is quite extensive and lots of testing on OTHER devices needs to be done to ensure they don't kill the target device when they attempt the same procedure there.

If this isn't simply turning over data when they get a warrant.
This is dangerous.
Also Apple does business all over the world. I can just see all the other governments lined up for the same thing.

You just don't get it. You don't have to trust Apple with your private data.
They have no access and they are trying to make sure nobody else has access either.
 
  • Like
Reactions: gigi1701 and dk001
Does the phone company violate your trust when they receive a subpoena to give the government your phone records?
Does the bank violate your trust when they receive a subpoena to give the government your bank records?
Does your landlord violate your privacy when he receives a search warrant to search your apartment and he opens the door for the cops/feds/whatever?
The feds would still need to obtain a search warrant to use this "key" to get into your phone. So I don't see what the issue is.

Hello Apple, This is the FBI and we have a warrant via the AWA to force you to create a "bypass" to allow to check out this terrorist's iPhone.
Assume the court finds in favor of the FBI...

Hello Google, This is the FBI and we have a warrant via the AWA to force you to create a "bypass" to allow to check out this terrorist's Android phone.

Hello Samsung, This is the FBI and we have a warrant via the AWA to force you to create a "bypass" to allow to check out this terrorist's Galaxy phone.

Hello Microsoft, This is the FBI and we have a warrant via the AWA to force you to create a "bypass" to allow to check out this terrorist's Windows phone.

Hello Apple, This is the FBI and we have a warrant via the AWA to force you to create a "bypass" to allow to check out this terrorist's iPhone remotely.

etc..., etc..., etc...,
That is one of the things so many are asking. Where does this stop? Even the NY judge asked in the case he found in favor of Apple. How would you enforce that stopping point.
This isn't about the data. It's about the how that data is accessed and the precedent (which the FBI stated under oath it is) that is set.
 
What did NASA do to you? or do you mean NSA?
NASA makes fake space videos. Air bubbles float up from masks and space ship parts and scuba divers can be seen in mask reflections and such.

They are fake, question is why are they faking? Has NASA gone to space, but fake the public image? Has NASA never been to space and it is all a money grab scam? Why? Why fake it?
 
  • Like
Reactions: You are the One
NASA makes fake space videos. Air bubbles float up from masks and space ship parts and scuba divers can be seen in mask reflections and such.

They are fake, question is why are they faking? Has NASA gone to space, but fake the public image? Has NASA never been to space and it is all a money grab scam? Why? Why fake it?

please tell me you're joking
 
  • Like
Reactions: SirCheese
I always find car analogies difficult, but I will say that I wonder if the manufacturer can be Compelled to provide said key or remote control unlocking device by the courts. We aren't really talking about the installation of a monitoring device in this smartphone case (nor would we need to be for a vehicle).

Yeah, I agree. Bad analogy. I guess in the whole key idea, it would be not to provide a key. But to create one that bypasses all security and locks in the car.
 
please tell me you're joking
No I'm not, I wish I was. It took me a bit to believe it. There are a lot of good YouTube-ers ripping NASA's videos and then highlighting the mistakes they make. Just go to YouTube and search for "Fake NASA" or "NASA's lies" it will blow your mind.

You will find videos ripped straight from NASA and you will see air bubbles and scuba divers. You will also see the earth not spinning in the background of the space station or cable holding up the people in the space station. You will also see that every single image from NASA is fake. It is all Photoshopped... Why? Why are they lying?

Now they are lying about wanting to get into that phone. Why, Why so much deception? I have never been a conspirist person, but after these past few months of researching my mind has been openined up and I have seen so much evicance that shows huge deceptions by our governemnt.

Take the red pill my friend.... Once you do you'll never look at the US the same again!
 
  • Like
Reactions: You are the One
Fair points. In the interest of discussing this case though, I don't believe anyone is in trial. Moving forward, these are fair points. Right now the discussion is unlocking the phone of a dead man. There is no presumption of innocence. I imagine this particular case is exactly why that stepping stone is in place. Who's rights are being violated here? Nobody living.

True, but even the director of FBI admitted to congress that there are now dozens of cases pending this new government OS and that is just from FBI. NY, CA, and a lot of other states already stepped forwarding saying we also have phones we need to use this OS on. Any of these hundreds of not thousands of cases will and probably are in court right now.
 
No I'm not, I wish I was. It took me a bit to believe it. There are a lot of good YouTube-ers ripping NASA's videos and then highlighting the mistakes they make. Just go to YouTube and search for "Fake NASA" or "NASA's lies" it will blow your mind.

I won't keep up with such ignorance.
Read the manuals, and the science behind it instead of looking at a youtuber.
No I'm not, I wish I was. It took me a bit to believe it. There are a lot of good YouTube-ers ripping NASA's videos and then highlighting the mistakes they make. Just go to YouTube and search for "Fake NASA" or "NASA's lies" it will blow your mind.

You will find videos ripped straight from NASA and you will see air bubbles and scuba divers. You will also see the earth not spinning in the background of the space station or cable holding up the people in the space station. You will also see that every single image from NASA is fake. It is all Photoshopped... Why? Why are they lying?

Now they are lying about wanting to get into that phone. Why, Why so much deception? I have never been a conspirist person, but after these past few months of researching my mind has been openined up and I have seen so much evicance that shows huge deceptions by our governemnt.

Take the red pill my friend.... Once you do you'll never look at the US the same again!

I am sorry for your ignorance.
 
  • Like
Reactions: SirCheese
Interesting. Was the chain of evidence broken when they screwed-up the phone by trying to reset it in the first place. Before they contacted Apple? Whoops.

LOL. It does feels like a cover up for the most part. Forgot who, but one of the congressmen asked Comey if this was FBI looking to fix their mistakes, but he responded, the court did not think so.
[doublepost=1457725330][/doublepost]
That's what I mean by 3. The remotely part is the key. They mention means like Bluetooth and others. They want it electronic not manual touch.

"for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol.."

Ahh gotcha. Sorry misunderstood!! Makes sense now that I read it again in that context.
 
  • Like
Reactions: JamesPDX
No I'm not, I wish I was. It took me a bit to believe it. There are a lot of good YouTube-ers ripping NASA's videos and then highlighting the mistakes they make. Just go to YouTube and search for "Fake NASA" or "NASA's lies" it will blow your mind.

You will find videos ripped straight from NASA and you will see air bubbles and scuba divers. You will also see the earth not spinning in the background of the space station or cable holding up the people in the space station. You will also see that every single image from NASA is fake. It is all Photoshopped... Why? Why are they lying?

Now they are lying about wanting to get into that phone. Why, Why so much deception? I have never been a conspirist person, but after these past few months of researching my mind has been openined up and I have seen so much evicance that shows huge deceptions by our governemnt.

Take the red pill my friend.... Once you do you'll never look at the US the same again!
You are nuts.
 
  • Like
Reactions: yaxomoxay
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.