Warning

 

Close

Confirm Action

Are you sure you wish to do this?

Confirm Cancel
BCM
User Panel

Page / 5
Link Posted: 9/27/2014 8:15:05 AM EDT
[#1]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Boo fucking hoo.

Now, let's see if this is just a joint ploy to make us all "believe" their really "encrypted"
View Quote

my first thought.

methinks they'll get a jump in the number of kiddie porn busts, which I'm okay with. by now, if not before, all people should realize that there isn't really internet anonymity, least of all on an iPhone.
Link Posted: 9/27/2014 8:19:12 AM EDT
[#2]

Discussion ForumsJump to Quoted PostQuote History
Quoted:





Ding, ding, ding!!



"I had to set up a password once, your honor, but I've been using my fingerprint since then. It seems the techs have reset my phone and my fingerprint no longer functions without the passcode which I cannot recall."
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:



Quoted:


Quoted:


Quoted:



Yep, but the government putting you in jail and saying "decrypt it or sit in jail" is exactly what compelling someone is.





Except it isn't clear that they can do that, as evidenced by the 11th Circuit case I posted which says "the government can't do that." I say "isn't clear" because some other, lower courts have said (in other cases with potentially differing facts) that the government can do that. But as a general proposition, the law is unsettled, and the idea that you'll be held (literally) in contempt until you fork over the key is not a foregone conclusion.




"Your Honor, my client can regretfully not recall the password to his smartphone"



What happens after that?



Ding, ding, ding!!



"I had to set up a password once, your honor, but I've been using my fingerprint since then. It seems the techs have reset my phone and my fingerprint no longer functions without the passcode which I cannot recall."




 
I am having memory problems since the police hit me in the head a few times during arrest.



Link Posted: 9/27/2014 8:21:37 AM EDT
[#3]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Well there must be some sort of backdoor, otherwise NSA would never allow it.
View Quote


That's for sure.  Does anyone really think that NSA doesn't have a backdoor to all of this?  I think this is just a bunch of dishonest whining to lead all of into a false sense that our information may be private and unreachable.
Link Posted: 9/27/2014 8:25:28 AM EDT
[#4]
LOL.
Link Posted: 9/27/2014 8:33:31 AM EDT
[#5]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


That's for sure.  Does anyone really think that NSA doesn't have a backdoor to all of this?  I think this is just a bunch of dishonest whining to lead all of into a false sense that our information may be private and unreachable.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Well there must be some sort of backdoor, otherwise NSA would never allow it.


That's for sure.  Does anyone really think that NSA doesn't have a backdoor to all of this?  I think this is just a bunch of dishonest whining to lead all of into a false sense that our information may be private and unreachable.

Where in the software release cycle for a new phone OS does the NSA get to approve or reject the design?
Link Posted: 9/27/2014 8:40:17 AM EDT
[#6]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Yawn.  

This is good justification for an expansion of capability in technical branches.  Now, they can easily justify far more advanced in-house capability that will enable more effective and timely searches that are less likely to be detected prior to execution by the susupect.  

In the end, this will change from serving a warrant to apple into walking downstairs with a warrant and having the tech guys exploit the device.  

 

All in all, not an issue.
View Quote

I'm glad you see the silver lining of empire building.  

Although in reality if properly designed there's little the boys in Langley could do to break it.  It's just math.
Link Posted: 9/27/2014 8:56:36 AM EDT
[#7]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
How did they track them down before smart phones and tablets?
Fuck em.
View Quote
Exactly this. Fuck the FBI, fuck BHO, and fuck all his appointees, "assistants", cronies, and "supporters".
Link Posted: 9/27/2014 9:03:48 AM EDT
[#8]
I forgot my password when you shot my dag.
Link Posted: 9/27/2014 9:07:42 AM EDT
[#9]

Discussion ForumsJump to Quoted PostQuote History
Quoted:





Where in the software release cycle for a new phone OS does the NSA get to approve or reject the design?
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:



Quoted:


Quoted:

Well there must be some sort of backdoor, otherwise NSA would never allow it.




That's for sure.  Does anyone really think that NSA doesn't have a backdoor to all of this?  I think this is just a bunch of dishonest whining to lead all of into a false sense that our information may be private and unreachable.



Where in the software release cycle for a new phone OS does the NSA get to approve or reject the design?


They own Apple as part of a super-duper-secret umbrella corporation run by the NWO.  Didn't you know that?



 
Link Posted: 9/27/2014 9:12:22 AM EDT
[#10]
We bitch about phone privacy and then say nothing about being tracked by cameras almost everywhere we go. I have to admit that while sitting a red light I have fantasies of shooting out every camera I see.
Link Posted: 9/27/2014 9:15:45 AM EDT
[#11]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
We bitch about phone privacy and then say nothing about being tracked by cameras almost everywhere we go. I have to admit that while sitting a red light I have fantasies of shooting out every camera I see.
View Quote


Probably because we have a reasonable expectation of privacy in our phone communications and data contents, whereas anybody can see us while we're out driving?

It's not really a fair comparison. Although, I do see a problem with the massive, wholesale, systematic collection, storage, and analysis of the locations of EVERYONE (i.e., lots of people who are suspected of nothing at the time) via widespread, integrated systems of cameras and plate readers.
Link Posted: 9/27/2014 9:25:03 AM EDT
[#12]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
How ever did they solve crimes before cell phones?
View Quote


apparently they didnt.

Link Posted: 9/27/2014 9:27:23 AM EDT
[#13]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
JBTs sure are whiney cunts.
View Quote

Link Posted: 9/27/2014 9:35:48 AM EDT
[#14]
sorry
but my spidey senses are telling me that these new encrypted systems already have a NSA backdoor built in
Link Posted: 9/27/2014 9:45:43 AM EDT
[#15]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
They can get a warrant. F 'em.
View Quote


Won't do them any good.
Link Posted: 9/27/2014 9:46:03 AM EDT
[#16]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Well there must be some sort of backdoor, otherwise NSA would never allow it.
View Quote


NSA has no ability to "allow" or deny anything a company does.
Link Posted: 9/27/2014 9:49:38 AM EDT
[#17]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

This.

It's simply a public ploy to make people *think* that the FBI can't access them when they really want to...
 
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Boo fucking hoo.

Now, let's see if this is just a joint ploy to make us all "believe" their really "encrypted"

This.

It's simply a public ploy to make people *think* that the FBI can't access them when they really want to...
 


If you honestly believe the FBI's level of technical advancement is better than that of a third world country, I've got some news for you...  The FBI is the most backwards agency on the planet with respect to technology.  Federal LE, in my experience, lags about two decades behind the rest of the developed world.
Link Posted: 9/27/2014 9:56:49 AM EDT
[#18]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


I would bet ALL of them do, Apple , Blackberry, Galaxy etc....

The Black Phone is probably the only one that does not and is deliberaly made that way.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Blackberry has had full hardware encryption for YEARS now... But like always, when Apple finally does it, it's new, innovative, and different!
But does blackberry have a backdoor?  

Apple devices could be fully hardware encrypted, but apple used to maintain a backdoor.


I would bet ALL of them do, Apple , Blackberry, Galaxy etc....

The Black Phone is probably the only one that does not and is deliberaly made that way.



LOL

the black phone most likely is more vulnerable than either a stock Nexus or an iphone.

Link Posted: 9/27/2014 10:00:42 AM EDT
[#19]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Yes... Trust that your electronic devices are secure. Enter your most sensitive data into them. The FBI is incapable of accessing them.


I hope people aren't stupid enough to believe this clown. Anything can be cracked with enough time.
View Quote


First, that statement isn't true.  There are many types of encryption that actually cannot be "cracked with enough time".  

Second, the FBI really probably isn't capable of accessing anything that elcomsoft hasn't built a box for.  

Federal LE, especially the FBI, is about as incompetent as you can possibly get when it comes to technology.  If there's not a box that does it for them, they can't even comprehend the concepts required to analyze it.

Link Posted: 9/27/2014 10:06:02 AM EDT
[#20]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


Okay.  Anyway, they can legally compel you to decrypt.  That's where this started, and I bet Lavabit would agree with me.  
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:

Not sure what your point is - a NSL has the same inherent problem as a subpoena. It basically is a subpoena, just a secret one.


The FBI issued one to Lavabit, to force them to disclose encryption keys.  


Which is exactly what Apple is now "fixing" - Apple will no longer have them and, thus, their full and truthful response to such a subpoena or NSL will be "we have nothing responsive to your request."



Okay.  Anyway, they can legally compel you to decrypt.  That's where this started, and I bet Lavabit would agree with me.  


What do you not understand. Apple and Google have made the ability to compel them to decrypt useless. if the owner of the phone does not give up the password then even Apple and Google can't get in. No matter what super secret letter they have.
Link Posted: 9/27/2014 10:56:43 AM EDT
[#21]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


First, that statement isn't true.  There are many types of encryption that actually cannot be "cracked with enough time".  

Second, the FBI really probably isn't capable of accessing anything that elcomsoft hasn't built a box for.  

Federal LE, especially the FBI, is about as incompetent as you can possibly get when it comes to technology.  If there's not a box that does it for them, they can't even comprehend the concepts required to analyze it.

View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Yes... Trust that your electronic devices are secure. Enter your most sensitive data into them. The FBI is incapable of accessing them.


I hope people aren't stupid enough to believe this clown. Anything can be cracked with enough time.


First, that statement isn't true.  There are many types of encryption that actually cannot be "cracked with enough time".  

Second, the FBI really probably isn't capable of accessing anything that elcomsoft hasn't built a box for.  

Federal LE, especially the FBI, is about as incompetent as you can possibly get when it comes to technology.  If there's not a box that does it for them, they can't even comprehend the concepts required to analyze it.



They can always send it to someone who can (private sector and other Gov agencies)
Link Posted: 9/27/2014 5:59:11 PM EDT
[#22]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


I never get any of the cool stuff.


I'm glad you see the silver lining of empire building.  

Although in reality if properly designed there's little the boys in Langley could do to break it.  It's just math.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:
Does anyone really give a fuck what the FBI is happy about?


Quite a few members here will be very upset.  They like their chains and want heavier ones.

  Yes, but I still haven't received my junior ranger special agent web cam to install in my house to prove I am a good citizen.

As we all know, we shouldn't have any problem if we have nothing to hide.


I never get any of the cool stuff.

Quoted:
Yawn.  

This is good justification for an expansion of capability in technical branches.  Now, they can easily justify far more advanced in-house capability that will enable more effective and timely searches that are less likely to be detected prior to execution by the susupect.  

In the end, this will change from serving a warrant to apple into walking downstairs with a warrant and having the tech guys exploit the device.  

 

All in all, not an issue.

I'm glad you see the silver lining of empire building.  

Although in reality if properly designed there's little the boys in Langley could do to break it.  It's just math.


You assume FedDC's amoral twins in DHS haven't hacked Apple and stolen the base code already.
Link Posted: 9/27/2014 6:10:12 PM EDT
[#23]
Nothing in this will prevent people from hacking into female celebs phones to get their nekid selfies though, right?
Link Posted: 9/27/2014 6:34:16 PM EDT
[#24]
The real point to all of this is that the FBI wants to be able to go  to one company with one warrant (or whatever) and go through the data of millions of people at one fell swoop.

If they had to do this one-at-a-time with a separate search for each individual with today's system, they wouldn't be acting  so butthurt.

Essentially Apple took themselves out of the loop thereby removed the ability for the FBI to do sweeping searches.
Link Posted: 9/27/2014 6:48:55 PM EDT
[#25]
When you take something away from a child that has proved too immature to handle it properly they piss up a storm too.  Just the same kind of storm very often, lots of "sky is falling" bullshit.  
Link Posted: 9/27/2014 6:53:13 PM EDT
[#26]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
You assume FedDC's amoral twins in DHS haven't hacked Apple and stolen the base code already.
View Quote


The point of encryption without pointless backdoors is that having the "base code" public improves security, not decreases it. All the feds in the world can't magic away properly executed math.
Link Posted: 9/27/2014 6:54:41 PM EDT
[#27]
Yeah, I mean it's all about saving kids man. The FBI is just really, really worried about the children. Come on people.
Link Posted: 9/27/2014 7:15:25 PM EDT
[#28]
Grumpycatgood.jpeg
Link Posted: 9/27/2014 11:31:21 PM EDT
[#29]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


They can always send it to someone who can (private sector and other Gov agencies)
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Yes... Trust that your electronic devices are secure. Enter your most sensitive data into them. The FBI is incapable of accessing them.


I hope people aren't stupid enough to believe this clown. Anything can be cracked with enough time.


First, that statement isn't true.  There are many types of encryption that actually cannot be "cracked with enough time".  

Second, the FBI really probably isn't capable of accessing anything that elcomsoft hasn't built a box for.  

Federal LE, especially the FBI, is about as incompetent as you can possibly get when it comes to technology.  If there's not a box that does it for them, they can't even comprehend the concepts required to analyze it.



They can always send it to someone who can (private sector and other Gov agencies)


That still does not fix the physics issue.
Link Posted: 9/28/2014 9:18:22 AM EDT
[#30]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


That still does not fix the physics issue.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:
Yes... Trust that your electronic devices are secure. Enter your most sensitive data into them. The FBI is incapable of accessing them.


I hope people aren't stupid enough to believe this clown. Anything can be cracked with enough time.


First, that statement isn't true.  There are many types of encryption that actually cannot be "cracked with enough time".  

Second, the FBI really probably isn't capable of accessing anything that elcomsoft hasn't built a box for.  

Federal LE, especially the FBI, is about as incompetent as you can possibly get when it comes to technology.  If there's not a box that does it for them, they can't even comprehend the concepts required to analyze it.



They can always send it to someone who can (private sector and other Gov agencies)


That still does not fix the physics issue.



Yes, it does.  You don't attack the physics.
Link Posted: 9/28/2014 9:37:58 AM EDT
[#31]
I'm with you, all of the tech companies have been in bed with the NSA for years, all of a sudden they turn on them?

Discussion ForumsJump to Quoted PostQuote History
Quoted:
Boo fucking hoo.

Now, let's see if this is just a joint ploy to make us all "believe" their really "encrypted"
View Quote

Link Posted: 9/28/2014 9:38:59 AM EDT
[#32]
Link Posted: 9/28/2014 10:02:04 AM EDT
[#33]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

Yes, it does.  You don't attack the physics.
View Quote

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.
Link Posted: 9/28/2014 10:02:31 AM EDT
[#34]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
I'm with you, all of the tech companies have been in bed with the NSA for years, all of a sudden they turn on them?


View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
I'm with you, all of the tech companies have been in bed with the NSA for years, all of a sudden they turn on them?

Quoted:
Boo fucking hoo.

Now, let's see if this is just a joint ploy to make us all "believe" their really "encrypted"


It's  " possible" since it is well known that there has been a huge loss of business for US tech companies once it was known they had been in bed with the NSA, etc.
Link Posted: 9/28/2014 12:10:09 PM EDT
[#35]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  

Link Posted: 9/28/2014 12:19:17 PM EDT
[#36]
Discussion ForumsJump to Quoted PostQuote History
Quoted:



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  

View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  


You seem to be missing the point of this whole article.  Apple has removed their key leaving the only one left the user's.  If the user has fifth amendment protection from decrypting their information then what?
Link Posted: 9/28/2014 12:24:01 PM EDT
[#37]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
protecting your privacy puts you above the law.   Niiiiiiiice!
View Quote

Worth quoting!!!
Link Posted: 9/28/2014 12:29:54 PM EDT
[#38]
Discussion ForumsJump to Quoted PostQuote History
Quoted:


The NSA can do that anyway, assuming that they're all intercepted in transit and stored away in some massive data farm. Which is probably the case in one form or another.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Oh, so because I don't want the NSA reading my texts, I am operating above the law?

Go fuck yourself agent man!


The NSA can do that anyway, assuming that they're all intercepted in transit and stored away in some massive data farm. Which is probably the case in one form or another.

Time to go back to US mail or passenger pigeon.
Link Posted: 9/28/2014 12:33:45 PM EDT
[#39]
To live Above The Law, you must be honest.....Bob Dylan

Can government lie to you?....Sure.
Can you lie to government.....No
Link Posted: 9/28/2014 12:46:03 PM EDT
[#40]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

Time to go back to US mail or passenger pigeon.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Oh, so because I don't want the NSA reading my texts, I am operating above the law?

Go fuck yourself agent man!


The NSA can do that anyway, assuming that they're all intercepted in transit and stored away in some massive data farm. Which is probably the case in one form or another.

Time to go back to US mail or passenger pigeon.

Or use Textsecure
Link Posted: 9/28/2014 4:44:49 PM EDT
[#41]
Discussion ForumsJump to Quoted PostQuote History
Quoted:



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  

View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  





There isn't always a key, certainly not one available to you.

If the key exists solely in the head of your target, how are you going to get it?  

And the FBI doesn't know jack shit when it comes to technology.  

Link Posted: 9/28/2014 6:09:02 PM EDT
[#42]
Discussion ForumsJump to Quoted PostQuote History
Quoted:




There isn't always a key, certainly not one available to you.

If the key exists solely in the head of your target, how are you going to get it?  

And the FBI doesn't know jack shit when it comes to technology.  

View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  





There isn't always a key, certainly not one available to you.

If the key exists solely in the head of your target, how are you going to get it?  

And the FBI doesn't know jack shit when it comes to technology.  




You must be right.  The agency that rolls up soviet spies, conducts hugely complex counter intelligence operations involving nation state level encryption, and operates a global network of secure communications...that same agency is thwarted by your IPhone.

I bet you actually believe that.
Link Posted: 9/28/2014 6:10:38 PM EDT
[#43]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Good. Fuck them.

Carry on.
View Quote

Link Posted: 9/28/2014 6:22:36 PM EDT
[#44]
Discussion ForumsJump to Quoted PostQuote History
Quoted:



You must be right.  The agency that rolls up soviet spies, conducts hugely complex counter intelligence operations involving nation state level encryption, and operates a global network of secure communications...that same agency is thwarted by your IPhone.

I bet you actually believe that.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  





There isn't always a key, certainly not one available to you.

If the key exists solely in the head of your target, how are you going to get it?  

And the FBI doesn't know jack shit when it comes to technology.  




You must be right.  The agency that rolls up soviet spies, conducts hugely complex counter intelligence operations involving nation state level encryption, and operates a global network of secure communications...that same agency is thwarted by your IPhone.

I bet you actually believe that.


So, remind me, when was the last time the FBI rolled-up a Soviet spy?
Link Posted: 9/28/2014 6:24:22 PM EDT
[#45]
Discussion ForumsJump to Quoted PostQuote History
Quoted:
At this point on the tyranny curve, I am of the opinion if it makes the FBI unhappy, I am good with that.
View Quote


I have friends who agree with this statement.
Link Posted: 9/28/2014 6:47:52 PM EDT
[#46]
Discussion ForumsJump to Quoted PostQuote History
Quoted:



You must be right.  The agency that rolls up soviet spies, conducts hugely complex counter intelligence operations involving nation state level encryption, and operates a global network of secure communications...that same agency is thwarted by your IPhone.

I bet you actually believe that.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:
Quoted:
Quoted:
Quoted:
Quoted:

Yes, it does.  You don't attack the physics.

Go ahead and explain to us technical folk just what the FBI will attack to access an encrypted file system.



How do you defeat a lock?  

Use the key.

There is always a key.  You just have to know where and who.  

You act like this is a new issue.  

Surely you know that the FBI is the Agency doing the bulk of The CI work in the US.  If they can do that against peer nation espionage agencies, your IPhone isn't a problem.  





There isn't always a key, certainly not one available to you.

If the key exists solely in the head of your target, how are you going to get it?  

And the FBI doesn't know jack shit when it comes to technology.  




You must be right.  The agency that rolls up soviet spies, conducts hugely complex counter intelligence operations involving nation state level encryption, and operates a global network of secure communications...that same agency is thwarted by your IPhone.

I bet you actually believe that.


I bet you actually believe the FBI has done any of that bullshit you just posted.

Just a couple of years ago the FBI did not even have a network of any kind, let alone a global one.  Perhaps they've progressed since then, but I doubt they've progressed much.  You may be confusing them with the NSA, who actually does do the things you listed above (w/ the exception of rolling up soviet spies, that's not really in their lane, but the FBI doesn't do that very much either -- as I recall their CI program was thoroughly penetrated by a soviet spy up to a couple of years ago).

Link Posted: 9/30/2014 7:33:53 PM EDT
[#47]
Some more quotes

“This is a very bad idea,” said Cathy Lanier, chief of the Washington Metropolitan Police Department, in an interview. Smartphone communication is “going to be the preferred method of the pedophile and the criminal. We are going to lose a lot of investigative opportunities.”
View Quote

“It’s a significant issue for law enforcement,” Soiles, a deputy chief of operations at the Drug Enforcement Administration, said. “As long as we are doing it with court orders, there shouldn’t be any reason to keep us from it. We want to attack command-and-control structures of drug organizations, and to do that we have to be able to exploit their communication devices.”
View Quote

“They have created a system that is a free-for-all for criminals,” said Weissmann, a law professor at New York University. “It’s the wrong balancing act. Having court-ordered access to telephones is essential to thwart criminal acts and terrorist acts.”
View Quote

LINKS
Link Posted: 9/30/2014 10:59:19 PM EDT
[#48]

Discussion ForumsJump to Quoted PostQuote History
Quoted:
The point of encryption without pointless backdoors is that having the "base code" public improves security, not decreases it. All the feds in the world can't magic away properly executed math.
View Quote View All Quotes
View All Quotes
Discussion ForumsJump to Quoted PostQuote History
Quoted:



Quoted:

You assume FedDC's amoral twins in DHS haven't hacked Apple and stolen the base code already.





The point of encryption without pointless backdoors is that having the "base code" public improves security, not decreases it. All the feds in the world can't magic away properly executed math.


Yep.  Right now there is a LOT of interest in the geek community in locking things down, new tools are being written to examine code bases for vulnerabilities and exploits, with the express intention of making sure the government or other hostile actors don't have back doors into systems.  Of course, work requires that my work laptop be encrypted, my phone can be encrypted right now, it's just the next release of Android, out later this year, turns encryption ON by default.



 
Link Posted: 10/1/2014 3:33:37 PM EDT
[#49]
Eric Holder weighs in:
"It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy,” Holder said during a Tuesday speech before the Global Alliance Against Child Sexual Abuse Online conference. “When a child is in danger, law enforcement needs to be able to take every legally available step to quickly find and protect the child and to stop those that abuse children. It is worrisome to see companies thwarting our ability to do so."

"Recent technological advances have the potential to greatly embolden online criminals, providing new methods for abusers to avoid detection. In some cases, perpetrators are using cloud storage to cheaply and easily store tens of thousands of images and videos outside of any home or business—and to access those files from anywhere in the world. Many take advantage of encryption and anonymizing technology to conceal contraband materials and disguise their locations."

LINK
View Quote
Link Posted: 10/1/2014 3:37:36 PM EDT
[#50]
Discussion ForumsJump to Quoted PostQuote History
Quoted:

lol
View Quote



Yeah.   Fuck that.   If the rule of law exercised some limiting restraint there wouldn't be demand for this
Page / 5
Close Join Our Mail List to Stay Up To Date! Win a FREE Membership!

Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!

You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.


By signing up you agree to our User Agreement. *Must have a registered ARFCOM account to win.
Top Top