umbertino Posted February 17, 2016 Report Share Posted February 17, 2016 Tim Cook publicly attacks the US government for asking Apple to take an ‘unprecedented step which threatens the security of our customers’ Stuart Dredge and Danny Yadron Wednesday 17 February 2016 09.17 GMT Apple has hit back after a US federal magistrate ordered the company to help the FBI unlock the iPhone of one of the San Bernardino shooters, with chief executive Tim Cook describing the demand as “chilling”. The court order focuses on Apple’s security feature that slows down anyone trying to use “brute force” to gain access to an iPhone by guessing its passcode. In a letter published on the company’s website, Cook responded saying Apple would oppose the order and calling for public debate. “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand,” he wrote. While Cook took pains to stress that Apple was “shocked and outraged” by the San Bernardino shooting last December – “we have no sympathy for terrorists” – he said company is determined to push back against the court order. Cook wrote that opposing the order “is not something we take lightly”. “We feel we must speak up in the face of what we see as an overreach by the US government,” he added. “Up to this point, we have done everything that is both within our power and within the law to help them. But now the US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone,” he wrote. “Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation.” Cook claimed that “in the wrong hands” this software could be used to unlock “any iPhone in someone’s physical possession”, and warned that Apple would not be able to guarantee that the software would only be used by the FBI in this case. “The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals,” he wrote. “The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe. We can find no precedent for an American company being forced to expose its customers to a greater risk of attack.” FBI director James Comey has said that his agents are searching for evidence about the mass shooting on 2 December 2015 which killed 14, but have been locked out of one of the killers’ phone. The investigators are trying to determine to what extent married couple Syed Farook and Tashfeen Malik were influenced by radical Islamic terrorist groups, as well as who they had been communicating with before the shootings. Investigators have been unable to access Farook’s iPhone 5C. Sheri Pym, the federal judge, has ordered Apple not to turn off its encryption but to make it easier for federal agents to randomly guess the iPhone’s passcode. Apple has built a security feature into iPhones so that a phone slows down anyone trying to “brute force” his way into a phone by guessing passcode after passcode. The built-in delay is so substantial that Apple said it would take someone 5 1/2 years to guess every possible code for a single device. The court order requires Apple to circumvent that delay. “[Apple] will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred Apple hardware,” it reads. The magistrate also wants Apple to turn off any “auto-erase” functions on the phone, if enabled. This will be done with a program Apple is ordered to write and will allow FBI agents to install it on the suspect’s phone at a federal or Apple facility, according to the order. Apple is allowed to provide a cost estimate and rebuttal if it “believes that compliance with the Order would be unreasonably burdensome”. It also allowed Apple the option of coming up with another way to achieve the same result. Some security experts believe it would be technically possible for Apple to comply with the court order because the phone in question is an older model, while it probably wouldn’t be possible on a newer iPhone due to improvements in security. In his letter, Cook claimed that the FBI’s use of the All Writs Act of 1789 to justify its request also could have a knock-on effect. The 225-year-old law gives courts broad authority to ensure their orders are fulfilled. “The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data,” he wrote. “The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.” Cook concludes: “We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications. “While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.” Digital-rights body the Electronic Frontier Foundation (EFF) has thrown its weight behind Apple’s stance, in a blog post written by its deputy executive director and general counsel, Kurt Opsahl. “Essentially, the government is asking Apple to create a master key so that it can open a single phone. And once that master key is created, we’re certain that our government will ask for it again and again, for other phones, and turn this power against any software or device that has the audacity to offer strong security,” wrote Opsahl. “The US government wants us to trust that it won’t misuse this power. But we can all imagine the myriad ways this new authority could be abused. Even if you trust the US government, once this master key is created, governments around the world will surely demand that Apple undermine the security of their citizens as well.” http://www.theguardian.com/technology/2016/feb/17/apple-challenges-chilling-demand-decrypt-san-bernadino-iphone 1 Quote Link to comment Share on other sites More sharing options...
Shabibilicious Posted February 17, 2016 Report Share Posted February 17, 2016 I'm torn on how I feel about this. There's a Snowden type born everyday.......for sale to the highest bidder. GO RV, then BV 2 Quote Link to comment Share on other sites More sharing options...
umbertino Posted February 17, 2016 Author Report Share Posted February 17, 2016 I'm torn on how I feel about this. There's a Snowden type born everyday.......for sale to the highest bidder. GO RV, then BV But what do you really feel about this ( if I may ask)? Quote Link to comment Share on other sites More sharing options...
Shabibilicious Posted February 17, 2016 Report Share Posted February 17, 2016 But what do you really feel about this ( if I may ask)? I think in this particular case and this case alone......they should do all they can to get the information from that phone. God help us after that. GO RV, then BV 2 Quote Link to comment Share on other sites More sharing options...
umbertino Posted February 17, 2016 Author Report Share Posted February 17, 2016 I think in this particular case and this case alone......they should do all they can to get the information from that phone. God help us after that. GO RV, then BV Grazie for your answer, Friend. I plussed my own last post by mistake...please somebody even it up. Grazie I meant "even it down"...Grazie 2 Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 17, 2016 Report Share Posted February 17, 2016 ***/// Any company failing to put the welfare of entire The Republic that enabled them to succeed SO much before the 'privacy' of some KNOWN radical islamic terrorist assasin murderers does NOT deserve the great fortune they have attained at it's expense. Screw you APPLE TERROR SUPPORTERS. DO the RIGHT THING, Apple.... Protect the innocent from further barbarism by letting THE ENEMY know that YOU are NOT in cahoots with them and will NOT provide them SAFE HAVEN now or in the future! What you are doing is in essence is colluding with the enemy, providing them aid and assistance in their TERROR, and akin to giving them sanctuary thus ENABLING THEM... Oh, yuh, right... we forgot... you're one of those liberal p.o.s. entities that believes in Sanctuary Cities. why WOULD you be expected to DO THE RIGHT THING and defend The Republic. 1 Quote Link to comment Share on other sites More sharing options...
Bandit795 Posted February 18, 2016 Report Share Posted February 18, 2016 ”Those who give up their liberty for more security neither deserve liberty nor security.”Ben Franklin 3 Quote Link to comment Share on other sites More sharing options...
Shabibilicious Posted February 18, 2016 Report Share Posted February 18, 2016 ”Those who give up their liberty for more security neither deserve liberty nor security.” Ben Franklin Although I agree wholeheartedly with Ben.......the San Bernardino shooter already lost his life, so he doesn't need his liberty anymore. GO RV, then BV 2 Quote Link to comment Share on other sites More sharing options...
flatdawg Posted February 18, 2016 Report Share Posted February 18, 2016 <blockquote class='ipsBlockquote' data-author="SgtFuryUSCZ" data-cid="1620867" data-time="1455731047">SgtFuryUSCZ, on 17 Feb 2016 - 12:44 PM, said:<p>***/// Any company failing to put the welfare of entire The Republic that enabled them to succeed SO muchbefore the 'privacy' of some KNOWN radical islamic terrorist assasin murderers does NOT deserve thegreat fortune they have attained at it's expense. Screw you APPLE TERROR SUPPORTERS. DO the RIGHT THING, Apple.... Protect the innocent from further barbarism by letting THE ENEMY know thatYOU are NOT in cahoots with them and will NOT provide them SAFE HAVEN now or in the future! What you are doing is in essence is colluding with the enemy,providing them aid and assistance in their TERROR,and akin to giving them sanctuary thus ENABLING THEM... Oh, yuh, right... we forgot... you're one of those liberal p.o.s. entities that believes in Sanctuary Cities.why WOULD you be expected to DO THE RIGHT THING and defend The Republic. Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 18, 2016 Report Share Posted February 18, 2016 (edited) I think in this particular case and this case alone......they should do all they can to get the information from that phone. ...the San Bernardino shooter already lost his life, so he doesn't need his liberty anymore. ***/// Right and Right SHABS ! And besides, it's NOT EVEN THE TERRORIST'S PHONE ! It belongs to the County who had employed him prior to him slaughtering their other employees and their families and friends ! And, as the owners of the device, HAVE given their permission to apple to do it ! Look, if you buy one of these things from apple, and you forget your password and call their tech line to or go into their store to help you, are they going to tell YOU to go pound sand? Especially if you told them the info you have in there CAN SAVE LIVES...?! 'F' you apple, you liberal f***s ! And we call you that because only ignorant liberals behave like this because they are BRAINWASHED and thus DEVOID OF ALL COMMON SENSE !. . Edited February 18, 2016 by SgtFuryUSCZ 1 Quote Link to comment Share on other sites More sharing options...
flatdawg Posted February 18, 2016 Report Share Posted February 18, 2016 (edited) God bless Tim Cook, a man that strongly believes in the IV Ammedment. Edit for correction of Roman numerals. Edited February 18, 2016 by flatdawg 2 1 Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 18, 2016 Report Share Posted February 18, 2016 God bless Tim Cook, a man that strongly believes in the IV Ammedment. ***/// Tim Cook is a tool for evil at this point. 4th Amendment our eye ! The living owner of the device - The County - is VOLUNTARILY requesting apple unlock THEIR phone ! What part of THAT don't you get, FLATDAWG...? Seriously, man ! Wow.... dude... ! Quote Link to comment Share on other sites More sharing options...
flatdawg Posted February 18, 2016 Report Share Posted February 18, 2016 This isn't about apple unlocking the phone, this is the fascist govco wanting to end encryption. Govco wants a back door. Any back door will get out to any and every hacker in the world. Such a shame that you can't see the forest for the trees. Such a staunch conservative that wants more govco invasion into their lives... sheesh. 1 Quote Link to comment Share on other sites More sharing options...
Shabibilicious Posted February 18, 2016 Report Share Posted February 18, 2016 Okay okay.....so what about the info in the phone? Just let it go? GO RV, then BV Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 18, 2016 Report Share Posted February 18, 2016 ***/// FLATDAWG --- Your last post here is INCORRECT ! They (GOV) even said that apple could take the phone anywhere they wanted and just give them the missing 18 minutes they need ! THAT IS ALL they requested. Not the backdoor codes, access data, or even the other lie making the rounds - that the GOV demanded they design a by-pass to the protective technology built therein... You are grossly misinformed ! WISE UP ! Quote Link to comment Share on other sites More sharing options...
umbertino Posted February 18, 2016 Author Report Share Posted February 18, 2016 Apple vs. the FBI: Inside the Battle Snowden Calls "The Most Important Tech Case in a Decade" February 18, 2016 http://www.democracynow.org/2016/2/18/apple_vs_the_fbi_inside_the Quote Link to comment Share on other sites More sharing options...
flatdawg Posted February 18, 2016 Report Share Posted February 18, 2016 Wise up? I'm not the one the believes the invasive and tyrannical government.. Maybe I've grown a bit cynical in my rapidly approaching middle age. I figure that's better than being ignorant in my old age. Hell, early eye witness account of this "terror attack" had three white men wearing black military fatigues doing the shooting, not two "Islamic extremist". I tend to believe early eye witness accounts; the truth usually comes out before the Feds get there to tell about carrots and sticks. Good luck ladies, you'll be needing it. 1 Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 19, 2016 Report Share Posted February 19, 2016 Wise up? Good luck ladies, you'll be needing it. ***/// Let's put it in more personal terms you may be able to grasp, FLATDAWG ---- You're beloved and dear wife, mother, child, friend, Mom, Dad is/ are being held hostage by radical extremists.... they will only safely release them if you provide them with the combination to the safe where you have enough money to secure their release. You stored that combination to the safe in your apple phone. You forgot your password to access that combination. You're saying you'd RATHER LET YOUR LOVED ONES DIE. Think of us fellow Americans as your family and friends, because we are. You say you want US dead...? Be careful where and HOW you draw your self-righteous lines in the sand, friend. Quote Link to comment Share on other sites More sharing options...
SgtFuryUSCZ Posted February 19, 2016 Report Share Posted February 19, 2016 (edited) ***/// And don't expect the safe company to open it either.... they can't invade privacy like that.... your safe contains private and personal info after all ! JUST LIKE YOUR APPLE PHONE DOES.... HOW IRONIC. And you tell them "BUT IT'S MY SAFE!"..... (just like The County is telling apple it is THEIR phone !) and the safe company tells you "too bad.... won't do it . No way, WE DON'T CARE WHO DIES .... we're standing on principals of privacy here, pal..." . Edited February 19, 2016 by SgtFuryUSCZ Quote Link to comment Share on other sites More sharing options...
leanonme Posted February 19, 2016 Report Share Posted February 19, 2016 Oh the poor "disgruntled worker." Quote Link to comment Share on other sites More sharing options...
Muleslayer Posted February 19, 2016 Report Share Posted February 19, 2016 (edited) I think in this particular case and this case alone......they should do all they can to get the information from that phone. God help us after that. GO RV, then BV I gotta stand with Shabs on this one.And God help us all is always a good prayer! Edited February 19, 2016 by Muleslayer 2 Quote Link to comment Share on other sites More sharing options...
flatdawg Posted February 19, 2016 Report Share Posted February 19, 2016 Ladies, speaking of safes, why don't you just give me the combination of yours to me? I promise not to come clean it out while you're gone. Nor will I give it out to any crooks (hackers). As for your latest scenirio, it has jack shiite to do with any current event. Nice try. I'm not giving an inch on this one. I like my privacy, or the little that's left. God bless Tim Cook, a man that understands our need for privacy. 2 Quote Link to comment Share on other sites More sharing options...
Sentinel7 Posted February 19, 2016 Report Share Posted February 19, 2016 Lets see if I got this straight The FBI can’t find the hard drives to the terrorist’s computers The two cell phones they did find were smashed to the point that no information can be extracted. FBI finds one phone that is locked and encrypted they can’t get in. According to the FBI if they can get into this phone they will be able to save the world for all mankind. These terrorist’s made a hard drive disappear totally destroy two phones but was stupid enough to leave a phone with plan B and a company employee phone list for anyone to find. Do you really believe that? Maybe you need to ask why did the FBI go to court were Apple was not allowed to be there. Maybe you should ask why the judge made a decision without hearing Apples case. Haven’t you ever noticed that when the government says this is one-time transgression that in a very short time it’s that ship has sailed get over it. Compromise on any of your rights you lose liberty and freedom No Surrender No Retreat and No COMPROMISE Quote Link to comment Share on other sites More sharing options...
Sentinel7 Posted February 19, 2016 Report Share Posted February 19, 2016 The CIA wants to spy on you Lets see if I got this straight The FBI can’t find the hard drives to the terrorist’s computers The two cell phones they did find were smashed to the point that no information can be extracted. FBI finds one phone that is locked and encrypted they can’t get in. According to the FBI if they can get into this phone they will be able to save the world for all mankind. These terrorist’s made a hard drive disappear totally destroy two phones but was stupid enough to leave a phone with plan B and a company employee phone list for anyone to find. Do you really believe that? Maybe you need to ask why did the FBI go to court were Apple was not allowed to be there. Maybe you should ask why the judge made a decision without hearing Apples case. Haven’t you ever noticed that when the government says this is one-time transgression that in a very short time it’s that ship has sailed get over it. Compromise on any of your rights you lose liberty and freedom No Surrender No Retreat and No COMPROMISE through your TV: Agency director says it will 'transform' surveillance· Devices connected to internet leak information · CIA director says these gadgets will 'transform clandestine tradecraft' · Spies could watch thousands via supercomputers · People 'bug' their own homes with web-connected devices By ROB WAUGH PUBLISHED: 08:20 EST, 16 March 2012 | UPDATED: 08:55 EST, 16 March 2012 When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are. Spies will no longer have to plant bugs in your home - the rise of 'connected' gadgets controlled by apps will mean that people 'bug' their own homes, says CIA director David Petraeus. The CIA claims it will be able to 'read' these devices via the internet - and perhaps even via radio waves from outside the home. Everything from remote controls to clock radios can now be controlled via apps - and chip company ARM recently unveiled low-powered, cheaper chips which will be used in everything from fridges and ovens to doorbells. The resultant chorus of 'connected' gadgets will be able to be read like a book - and even remote-controlled, according to CIA CIA Director David Petraeus, according to a recent report by Wired's 'Danger Room' blog. Petraeus says that web-connected gadgets will 'transform' the art of spying - allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party. 'Transformational’ is an overused word, but I do believe it properly applies to these technologies,' said Petraeus. 'Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters - all connected to the next-generation internet using abundant, low-cost, and high-power computing.' Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously 'dumb' home appliances such as fridges, ovens and lighting systems. This week, one of the world's biggest chip companies, ARM, has unveiled a new processor built to work inside 'connected' white goods. The ARM chips are smaller, lower-powered and far cheaper than previous processors - and designed to add the internet to almost every kind of electrical appliance. It's a concept described as the 'internet of things'. The murderous computer Hal in 2001: But it seems that the danger of computers isn't villainous artificial intelligence - but the information they 'leak' about us Privacy groups such as the Electronic Frontier Foundation have warned of how information such as geolocation data can be misused - but as more and more devices connect, it's clear that opportunities for surveillance will multiply. Quote Link to comment Share on other sites More sharing options...
Sentinel7 Posted February 19, 2016 Report Share Posted February 19, 2016 Your Samsung SmartTV Is Spying on You, BasicallyYou may be loving your new Internet-connected television and its convenient voice-command feature—but did you know it’s recording everything you say and sending it to a third party? Careful what you say around your TV. It may be listening. And blabbing. A single sentence buried in a dense “privacy policy” for Samsung’s Internet-connected SmartTV advises users that its nifty voice command feature might capture more than just your request to play the latest episode of Downton Abbey. “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party,” the policy reads. So be advised: If you’re too lazy to pick up the remote, you may want to keep your conversation with the TV as direct and non-incriminating as possible. Don’t talk about tax evasion, drug use. And definitely don’t try out your Violet Crawley impression. Judging by the privacy policy, it seems Samsung is collecting voice commands mostly to improve the TV’s performance. “It looks like they are using a third-party service to convert speech to text, so that’s most of what is being disclosed here,” said Corynne McSherry, the intellectual property director at the Electronic Frontier Foundation. So this may just be an effort to make your SmartTV smarter. But, said McSherry, “If I were the customer, I might like to know who that third party was, and I’d definitely like to know whether my words were being transmitted in a secure form.” If the transmission is not encrypted, a SmartHacker could conceivably turn your TV into an eavesdropping device. Samsung didn’t immediately respond to a request for comment. And the privacy policy doesn’t identify the third party that’s listening to you scream, “I said Abbey, goddamit! Not Annie! Your as deaf as my mother-in-law!” This isn’t the first time Samsung’s too-clever-by-half TV has set off alarms among privacy experts. Writing in Salon in November 2014, Michael Price, counsel in the Liberty and National Security Program at the Brennan Center for Justice at the NYU School of Law, said the details in his new smart TV’s lengthy privacy policy made him “afraid to use it.” Price didn’t name the brand, but the wording matches exactly what’s contained in Samsung’s notice to its customers. “I do not doubt that this data is important to providing customized content and convenience, but it is also incredibly personal, constitutionally protected information that should not be for sale to advertisers and should require a warrant for law enforcement to access,” Price wrote. Samsung’s privacy policy notes that in addition to voice commands being transmitted, information about your device, “including device identifiers,” may also be beamed over the Internet to the third-party service, “or to the extent necessary to provide Voice Recognition features to you.” McSherry called that bit of qualifying language “worrisome.” “Samsung may just be giving itself some wiggle room as the service evolves, but that language could be interpreted pretty broadly,” she said. UPDATE 2/6/15 1:59 PM: "Samsung takes consumer privacy very seriously. In all of our Smart TVs we employ industry-standard security safeguards and practices, including data encryption, to secure consumers’ personal information and prevent unauthorized collection or use," the company said in a statement to The Daily Beast. "Voice recognition, which allows the user to control the TV using voice commands, is a Samsung Smart TV feature, which can be activated or deactivated by the user. The TV owner can also disconnect the TV from the Wi-Fi network." 1 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.