Frankly, the security of your data is of no consequence to me if keeping it secure means innocent lives will be lost.
All bolding is mine.
Dial it down, please. You’re free to disagree and argue about it, but keep it civil.
and your opinion that somehow easing security will ‘save lives’ is of absolutely no value or consequence.
Have a pleasant day - I’m done dealing with your frightful levels of ignorance.
They want Apple to write the code so that it works for this phone only by checking for the phone’s unique ID. So even if this got out, it wouldn’t work on any other iPhone.
By that logic, you should be willing to scrap most of the Bill of Rights. I have no doubt that innocents have occasionally died because of many of the amendments therein - most notably the fourth and fifth amendments. If we allow unreasonable searches and seizures, I’m sure we could save a lot of lives, and if defendants are required to serve as witnesses for the prosecution, I’m sure we could save many more. You might want to ask former residents of East Germany and Soviet Russia for their impressions of life under such circumstances.
Are you unwilling to incur even an infinitesimal amount of risk to your life so that you can enjoy a life free from massive amounts of government interference?
One last point: is the security of your data of any consequence to you?
I’ll say it again - while that may be the request - that is not neccisarily hwo it wouold work or be implimented.
First - you ahve to get the phones Unique ID.
And as I also said earlier - the request, in order to get it past the judge to begin with, has to be ‘on the surface’ intended for only the specific device in question - that order does not take into account the technical feasiblitly of that.
Sigh, the amount of misinformation is staggering…
Which they have. It’s in the court’s order.
If it’s not technically feasible then Apple can object on those grounds. However, it almost certainly is. The consensus for those in the know is that this is a trivial task to accomplish.
Thanks. I am a programmer, although not for phones or anything like that.
I am assuming that the code to hack would integrate the unique ID more deeply than just
IF uniqueID eq ‘hardcodedvaluewegotfromthesearchwarrant’
THEN move HighValues to NumberOfPossibleRetriesBeforeErasing
END-IF
FOR I 1 to 9999
MOVE I to PassWord
PERFORM UnlockPhone(Password)
IF PhoneUnlocked
ESCAPE
END-IF
END-FOR
So that hackers who got hold of it couldn’t just comment out the first line.
Regards,
Shodan
No it’d be that simple. If the hackers can remove the ID check then they already have the keys to the kingdom. In other words, if they can disable this security check then they can disable the retry count as well.
Most of the Bill of Rights is reactionary and rooted in 18th century fears that aren’t relevant to this country in this century.
East Germany and Soviet Russia weren’t bad places to live because of mass surveillance - they were bad places to live because of what that mass surveillance was used for.
Surveillance poses no “interference” in my life. I’m not doing anything that would warrant being surveilled in the first place, and if I were, I wouldn’t know it was happening until I got caught doing something illegal, at which point I no longer have a right to not be “interfered” with anyway.
If my data is compromised, I trust that the government will make the people responsible pay. That’s their job.
Smapti just sent really big chills down by back. Egad.
Trust the government???
Even if the people responsible are some kids in a Chinese or Russian internet cafe? (which most likely is what it would be) How do you envision that working, exactly? Please just give a brief step-by-step process of how the US Government is going to “bring them to justice”, or whatever you envision.
this plus.
Haven’t looked at the GD thread yet, but so far it seems to me the core issue isn’t tech, its constitutional and social, the right to privacy, come on, do you really think this will be a one time thing if the gvt prevails in this case? And someone upthread mentioned slavery, government compulsion of an entity to do their work for them?
there are terrorists, there are Terrorists and then there is Government. the only difference imho is the thin skin of legitimacy afforded to Government.
Peeling back the synthskin to show the steel does tend to have that effect:
[QUOTE=Isaac Asimov]
“What is your definition of justice?”
“Justice, Elijah, is that which exists when all the laws are enforced.”
Fastolfe nodded. “A good definition, Mr. Baley, for a robot. The desire to see all laws enforced has been built into R. Daneel, now. Justice is a very concrete term to him since it is based on law enforcement, which is in turn based upon the existence of specific and definite laws. There is nothing abstract about it. A human being can recognize the fact that, on the basis of an abstract moral code, some laws may be bad ones and their enforcement unjust. What do you say, R. Daneel?”
“An unjust law,” said R. Daneel evenly, “is a contradiction in terms.”
[/QUOTE]
It was written based on basic human rights and privacy hasn’t changed one micron from the day the document was conceived.
I hope this is some satirical reference that I am just not getting. If not, I think you just showed quite well (to the rest of us at least) why we do have valid reasons to be fearful. I honestly didn’t think that any Americans had such a belief system in real life. Please tell me that you are joking for effect. If not, I agree that is probably the scariest thing you will ever write.
It’s not that simple.
You can’t load a version of iOS onto an iPhone unless it’s signed by Apple (or unless the phone is exploited/jailbroken).
If someone were to get ahold of the full source code of iOS, it would be pretty easy for them to remove various security features and build whatever they wanted. Even without the source code, developers of reasonable skill could probably disassemble the OS and disable various features. But it wouldn’t matter unless they had Apple’s private key to sign the build, because no iPhone would accept the update.
So, Apple could do something as simple as the above code, and the fact that it’s a single line to edit out (or a few instructions to patch over) wouldn’t really matter, as long as Apple’s private key stays secure.
The danger is not that whatever Apple might build here will directly leak out. The danger is that if the FBI can force Apple to make this hack for them for this case, then they can force it for any case. And so can the Chinese, and any other significantly powerful country. The question is: Do we want to live in a world where it’s possible to have effective personal security and encryption, or a world where every government (not just the “good guys”) gets to read all your private documents?