Guest views are now limited to 12 pages. If you get an "Error" message, just sign in! If you need to create an account, click here.

Jump to content
  • CRYPTO REWARDS!

    Full endorsement on this opportunity - but it's limited, so get in while you can!

Apple challenges 'chilling' demand to decrypt San Bernardino shooter's iPhone


umbertino
 Share

Recommended Posts

Tim Cook publicly attacks the US government for asking Apple to take an ‘unprecedented step which threatens the security of our customers’

 

 

Stuart Dredge and Danny Yadron

 

Wednesday 17 February 2016 09.17 GMT

 

 

 

Apple has hit back after a US federal magistrate ordered the company to help the FBI unlock the iPhone of one of the San Bernardino shooters, with chief executive Tim Cook describing the demand as “chilling”.

 

The court order focuses on Apple’s security feature that slows down anyone trying to use “brute force” to gain access to an iPhone by guessing its passcode. In a letter published on the company’s website, Cook responded saying Apple would oppose the order and calling for public debate.

 

“The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand,” he wrote.

 

While Cook took pains to stress that Apple was “shocked and outraged” by the San Bernardino shooting last December – “we have no sympathy for terrorists” – he said company is determined to push back against the court order.

 

Cook wrote that opposing the order “is not something we take lightly”.

 

“We feel we must speak up in the face of what we see as an overreach by the US government,” he added.

 

“Up to this point, we have done everything that is both within our power and within the law to help them. But now the US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone,” he wrote.

 

“Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation.”

 

Cook claimed that “in the wrong hands” this software could be used to unlock “any iPhone in someone’s physical possession”, and warned that Apple would not be able to guarantee that the software would only be used by the FBI in this case.

 

“The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals,” he wrote.

 

“The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe. We can find no precedent for an American company being forced to expose its customers to a greater risk of attack.”

 

FBI director James Comey has said that his agents are searching for evidence about the mass shooting on 2 December 2015 which killed 14, but have been locked out of one of the killers’ phone.

 

The investigators are trying to determine to what extent married couple Syed Farook and Tashfeen Malik were influenced by radical Islamic terrorist groups, as well as who they had been communicating with before the shootings. Investigators have been unable to access Farook’s iPhone 5C.

 

Sheri Pym, the federal judge, has ordered Apple not to turn off its encryption but to make it easier for federal agents to randomly guess the iPhone’s passcode. Apple has built a security feature into iPhones so that a phone slows down anyone trying to “brute force” his way into a phone by guessing passcode after passcode.

 

The built-in delay is so substantial that Apple said it would take someone 5 1/2 years to guess every possible code for a single device.

 

The court order requires Apple to circumvent that delay. “[Apple] will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred Apple hardware,” it reads.

 

The magistrate also wants Apple to turn off any “auto-erase” functions on the phone, if enabled. This will be done with a program Apple is ordered to write and will allow FBI agents to install it on the suspect’s phone at a federal or Apple facility, according to the order.

 

Apple is allowed to provide a cost estimate and rebuttal if it “believes that compliance with the Order would be unreasonably burdensome”. It also allowed Apple the option of coming up with another way to achieve the same result.

 

Some security experts believe it would be technically possible for Apple to comply with the court order because the phone in question is an older model, while it probably wouldn’t be possible on a newer iPhone due to improvements in security.

 

In his letter, Cook claimed that the FBI’s use of the All Writs Act of 1789 to justify its request also could have a knock-on effect. The 225-year-old law gives courts broad authority to ensure their orders are fulfilled.

 

“The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data,” he wrote.

 

“The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.”

 

Cook concludes: “We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

 

“While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.”

 

Digital-rights body the Electronic Frontier Foundation (EFF) has thrown its weight behind Apple’s stance, in a blog post written by its deputy executive director and general counsel, Kurt Opsahl.

 

“Essentially, the government is asking Apple to create a master key so that it can open a single phone. And once that master key is created, we’re certain that our government will ask for it again and again, for other phones, and turn this power against any software or device that has the audacity to offer strong security,” wrote Opsahl.

 

“The US government wants us to trust that it won’t misuse this power. But we can all imagine the myriad ways this new authority could be abused. Even if you trust the US government, once this master key is created, governments around the world will surely demand that Apple undermine the security of their citizens as well.”

 

 

 

 

http://www.theguardian.com/technology/2016/feb/17/apple-challenges-chilling-demand-decrypt-san-bernadino-iphone

 

 

  • Upvote 1
Link to comment
Share on other sites

I think in this particular case and this case alone......they should do all they can to get the information from that phone.  God help us after that.   :peace: 

 

GO RV, then BV

Grazie for your answer, Friend.

I plussed my own  last post  by mistake...please somebody even it up. Grazie

I meant "even it down"...Grazie

  • Upvote 2
Link to comment
Share on other sites

***///

 

Any company failing to put the welfare of entire The Republic that enabled them to succeed SO much

before the 'privacy' of some KNOWN radical islamic terrorist assasin murderers does NOT deserve the

great fortune they have attained at it's expense.

 

 Screw you APPLE TERROR SUPPORTERS:angry:

 

DO the RIGHT THING, Apple.... Protect the innocent from further barbarism by letting THE ENEMY know that

YOU are NOT in cahoots with them and will NOT provide them SAFE HAVEN now or in the future!

 

What you are doing is in essence is colluding with the enemy,

providing them aid and assistance in their TERROR,

and akin to giving them sanctuary thus ENABLING THEM...  :angry:

 

Oh, yuh, right... we forgot... you're one of those liberal p.o.s. entities that believes in Sanctuary Cities.

why WOULD you be expected to DO THE RIGHT THING and defend The Republic<_<

  • Upvote 1
Link to comment
Share on other sites

<blockquote class='ipsBlockquote' data-author="SgtFuryUSCZ" data-cid="1620867" data-time="1455731047">SgtFuryUSCZ, on 17 Feb 2016 - 12:44 PM, said:<p>***/// Any company failing to put the welfare of entire The Republic that enabled them to succeed SO muchbefore the 'privacy' of some KNOWN radical islamic terrorist assasin murderers does NOT deserve thegreat fortune they have attained at it's expense.  Screw you APPLE TERROR SUPPORTERS:angry: DO the RIGHT THING, Apple.... Protect the innocent from further barbarism by letting THE ENEMY know thatYOU are NOT in cahoots with them and will NOT provide them SAFE HAVEN now or in the future! What you are doing is in essence is colluding with the enemy,providing them aid and assistance in their TERROR,and akin to giving them sanctuary thus ENABLING THEM...  :angry: Oh, yuh, right... we forgot... you're one of those liberal p.o.s. entities that believes in Sanctuary Cities.why WOULD you be expected to DO THE RIGHT THING and defend The Republic

Link to comment
Share on other sites

I think in this particular case and this case alone......they should do all they can to get the information from that phone. 

 

...the San Bernardino shooter already lost his life, so he doesn't need his liberty anymore.  

***///

Right and Right SHABS !   :twothumbs:

 

And besides, it's NOT EVEN THE TERRORIST'S PHONE !

 

 It belongs to the County who had employed him prior to him slaughtering their other employees and their families and friends !

 And, as the owners of the device, HAVE given their permission to apple to do it !   :confused2:

 

Look, if you buy one of these things from apple,

and you forget your password and call their tech line to or go into their store to help you,

are they going to tell YOU to go pound sand?

 Especially if you told them the info you have in there CAN SAVE LIVES...?! 

 

 'F' you apple, you liberal f***s !  <_< And we call you that because only ignorant liberals behave like this because they are BRAINWASHED and thus DEVOID OF ALL COMMON SENSE !.

 

 

 

 

.

Edited by SgtFuryUSCZ
  • Upvote 1
Link to comment
Share on other sites

God bless Tim Cook, a man that strongly believes in the IV Ammedment.

 

***///

 

Tim Cook is a tool for evil at this point.

4th Amendment our eye !  <_<

 

The living owner of the device - The County -

is VOLUNTARILY requesting apple unlock THEIR phone ! 

 

What part of THAT don't you get, FLATDAWG...?  Seriously, man !  Wow.... dude... !  :facepalm3:

Link to comment
Share on other sites

This isn't about apple unlocking the phone, this is the fascist govco wanting to end encryption. Govco wants a back door. Any back door will get out to any and every hacker in the world.

Such a shame that you can't see the forest for the trees.

Such a staunch conservative that wants more govco invasion into their lives... sheesh.

  • Upvote 1
Link to comment
Share on other sites

***///

 

FLATDAWG --- 

 

Your last post here is INCORRECT !

 

They (GOV) even said that apple could take the phone anywhere they wanted and just

give them the missing 18 minutes they need !  THAT IS ALL they requested.

 

Not the backdoor codes, access data, or even the other lie making the rounds -

that the GOV demanded they design a by-pass to the protective technology built therein... 

 

You are grossly misinformed !  WISE  UP !

Link to comment
Share on other sites

Wise up?

I'm not the one the believes the invasive and tyrannical government..

Maybe I've grown a bit cynical in my rapidly approaching middle age. I figure that's better than being ignorant in my old age.

Hell, early eye witness account of this "terror attack" had three white men wearing black military fatigues doing the shooting, not two "Islamic extremist".

I tend to believe early eye witness accounts; the truth usually comes out before the Feds get there to tell about carrots and sticks.

Good luck ladies, you'll be needing it.

  • Upvote 1
Link to comment
Share on other sites

Wise up?

Good luck ladies, you'll be needing it.

***///

 

Let's put it in more personal terms you may be able to grasp, FLATDAWG ----

 

You're beloved and dear wife, mother, child, friend, Mom, Dad is/ are being held hostage by radical extremists....

 

they will only safely release them if you provide them with the combination to the safe where you have enough

money to secure their release.

 

You stored that combination to the safe in your apple phone.

 

You forgot your password to access that combination.

 

You're saying you'd  RATHER LET YOUR LOVED ONES DIE:shrug:

 

 

Think of us fellow Americans as your family and friends, because we are.  You say you want US dead...?  :confused2:

 

Be careful where and HOW you draw your self-righteous lines in the sand, friend.  <_<

Link to comment
Share on other sites

***///

 

And don't expect the safe company to open it either.... they can't invade privacy like that....

your safe contains private and personal info after all !  <_< JUST LIKE YOUR APPLE PHONE DOES....

HOW IRONIC.

 

And you tell them "BUT IT'S MY SAFE!"..... (just like The County is telling apple it is THEIR phone !)

and the safe company tells you "too bad....

won't do it .

No way,

WE DON'T CARE WHO DIES .... we're standing on principals of privacy here, pal..."

 

 

 

.

Edited by SgtFuryUSCZ
Link to comment
Share on other sites

I think in this particular case and this case alone......they should do all they can to get the information from that phone. God help us after that. :peace:

GO RV, then BV

I gotta stand with Shabs on this one.

And God help us all is always a good prayer!

Edited by Muleslayer
  • Upvote 2
Link to comment
Share on other sites

Ladies, speaking of safes, why don't you just give me the combination of yours to me?

I promise not to come clean it out while you're gone. Nor will I give it out to any crooks (hackers).

As for your latest scenirio, it has jack shiite to do with any current event. Nice try.

I'm not giving an inch on this one. I like my privacy, or the little that's left.

God bless Tim Cook, a man that understands our need for privacy.

  • Upvote 2
Link to comment
Share on other sites

Lets see if I got this straight

The FBI can’t find the hard drives to the terrorist’s computers

The two cell phones they did find were smashed to the point that no information can be extracted.

 

FBI finds one phone that is locked and encrypted they can’t get in.

According to the FBI if they can get into this phone they will be able to save the world for all mankind.

 

These terrorist’s made a hard drive disappear totally destroy two phones but was stupid enough to leave a phone with plan B and a company employee phone list for anyone to find.

Do you really believe that? 

 

Maybe you need to ask why did the FBI go to court were Apple was not allowed to be there.

Maybe you should ask why the judge made a decision without hearing Apples case.

 

Haven’t you ever noticed that when the government says this is one-time transgression

that in a very short time it’s that ship has sailed get over it.

 

             Compromise on any of your rights you lose liberty and freedom

 

 

                      No Surrender No Retreat and No COMPROMISE

 

 

 

 

  

 

 

Link to comment
Share on other sites

The CIA wants to spy on you Lets see if I got this straight

The FBI can’t find the hard drives to the terrorist’s computers

The two cell phones they did find were smashed to the point that no information can be extracted.

 

FBI finds one phone that is locked and encrypted they can’t get in.

According to the FBI if they can get into this phone they will be able to save the world for all mankind.

 

These terrorist’s made a hard drive disappear totally destroy two phones but was stupid enough to leave a phone with plan B and a company employee phone list for anyone to find.

Do you really believe that? 

 

Maybe you need to ask why did the FBI go to court were Apple was not allowed to be there.

Maybe you should ask why the judge made a decision without hearing Apples case.

 

Haven’t you ever noticed that when the government says this is one-time transgression

that in a very short time it’s that ship has sailed get over it.

 

             Compromise on any of your rights you lose liberty and freedom

 

 

                      No Surrender No Retreat and No COMPROMISE

 

 

 

 

  

 

 

through your TV: Agency director says it will 'transform' surveillance

·                            Devices connected to internet leak information

·                            CIA director says these gadgets will 'transform clandestine tradecraft'

·                            Spies could watch thousands via supercomputers

·                            People 'bug' their own homes with web-connected devices

By ROB WAUGH

PUBLISHED: 08:20 EST, 16 March 2012 | UPDATED: 08:55 EST, 16 March 2012

When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are.

Spies will no longer have to plant bugs in your home - the rise of 'connected' gadgets controlled by apps will mean that people 'bug' their own homes, says CIA director David Petraeus.

The CIA claims it will be able to 'read' these devices via the internet - and perhaps even via radio waves from outside the home.

 

 

 

Everything from remote controls to clock radios can now be controlled via apps - and chip company ARM recently unveiled low-powered, cheaper chips which will be used in everything from fridges and ovens to doorbells. 

The resultant chorus of 'connected' gadgets will be able to be read like a book - and even remote-controlled, according to CIA CIA Director David Petraeus, according to a recent report by Wired's 'Danger Room' blog.

Petraeus says that web-connected gadgets will 'transform' the art of spying - allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party. 

'Transformational’ is an overused word, but I do believe it properly applies to these technologies,' said Petraeus.

'Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -  all connected to the next-generation internet using abundant, low-cost, and high-power computing.'

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously  'dumb' home appliances such as fridges, ovens and lighting systems.

This week, one of the world's biggest chip companies, ARM, has unveiled a new processor built to work inside 'connected' white goods. 

The ARM chips are smaller, lower-powered and far cheaper than previous processors - and designed to add the internet to almost every kind of electrical appliance. 

It's a concept described as the 'internet of things'. 

 

The murderous computer Hal in 2001: But it seems that the danger of computers isn't villainous artificial intelligence - but the information they 'leak' about us

Privacy groups such as the Electronic Frontier Foundation have warned of how information such as geolocation data can be misused - but as more and more devices connect, it's clear that opportunities for surveillance will multiply. 

Link to comment
Share on other sites

Your Samsung SmartTV Is Spying on You, Basically

You may be loving your new Internet-connected television and its convenient voice-command feature—but did you know it’s recording everything you say and sending it to a third party?

Careful what you say around your TV. It may be listening. And blabbing.

A single sentence buried in a dense “privacy policy” for Samsung’s Internet-connected SmartTV advises users that its nifty voice command feature might capture more than just your request to play the latest episode of Downton Abbey.

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party,” the policy reads.

So be advised: If you’re too lazy to pick up the remote, you may want to keep your conversation with the TV as direct and non-incriminating as possible. Don’t talk about tax evasion, drug use. And definitely don’t try out your Violet Crawley impression.

Judging by the privacy policy, it seems Samsung is collecting voice commands mostly to improve the TV’s performance. “It looks like they are using a third-party service to convert speech to text, so that’s most of what is being disclosed here,” said Corynne McSherry, the intellectual property director at the Electronic Frontier Foundation.

So this may just be an effort to make your SmartTV smarter.

But, said McSherry, “If I were the customer, I might like to know who that third party was, and I’d definitely like to know whether my words were being transmitted in a secure form.” If the transmission is not encrypted, a SmartHacker could conceivably turn your TV into an eavesdropping device.

Samsung didn’t immediately respond to a request for comment. And the privacy policy doesn’t identify the third party that’s listening to you scream, “I said Abbey, goddamit! Not Annie! Your as deaf as my mother-in-law!”

This isn’t the first time Samsung’s too-clever-by-half TV has set off alarms among privacy experts. Writing in Salon in November 2014, Michael Price, counsel in the Liberty and National Security Program at the Brennan Center for Justice at the NYU School of Law, said the details in his new smart TV’s lengthy privacy policy made him “afraid to use it.” Price didn’t name the brand, but the wording matches exactly what’s contained in Samsung’s notice to its customers.

“I do not doubt that this data is important to providing customized content and convenience, but it is also incredibly personal, constitutionally protected information that should not be for sale to advertisers and should require a warrant for law enforcement to access,” Price wrote.

Samsung’s privacy policy notes that in addition to voice commands being transmitted, information about your device, “including device identifiers,” may also be beamed over the Internet to the third-party service, “or to the extent necessary to provide Voice Recognition features to you.”

McSherry called that bit of qualifying language “worrisome.”

“Samsung may just be giving itself some wiggle room as the service evolves, but that language could be interpreted pretty broadly,” she said.

UPDATE 2/6/15 1:59 PM: "Samsung takes consumer privacy very seriously. In all of our Smart TVs we employ industry-standard security safeguards and practices, including data encryption, to secure consumers’ personal information and prevent unauthorized collection or use," the company said in a statement to The Daily Beast. "Voice recognition, which allows the user to control the TV using voice commands, is a Samsung Smart TV feature, which can be activated or deactivated by the user. The TV owner can also disconnect the TV from the Wi-Fi network."

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.


×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.