• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 21:46
CET 02:46
KST 10:46
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy7ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book19Clem wins HomeStory Cup 289
Community News
Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool48Weekly Cups (March 9-15): herO, Clem, ByuN win42026 KungFu Cup Announcement6BGE Stara Zagora 2026 cancelled12
StarCraft 2
General
Potential Updates Coming to the SC2 CN Server What mix of new & old maps do you want in the next ladder pool? (SC2) Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool Weekly Cups (March 16-22): herO doubles, Cure surprises Weekly Cups (August 25-31): Clem's Last Straw?
Tourneys
Sparkling Tuna Cup - Weekly Open Tournament World University TeamLeague (500$+) | Signups Open RSL Season 4 announced for March-April WardiTV Team League Season 10 KSL Week 87
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat Mutation # 516 Specter of Death
Brood War
General
Which mirror match you like most or least? How much money terran looses from gas steal? Gypsy to Korea BGH Auto Balance -> http://bghmmr.eu/ mca64Launcher - New Version with StarCraft: Remast
Tourneys
[ASL21] Ro24 Group C [ASL21] Ro24 Group B [Megathread] Daily Proleagues 2026 Changsha Offline Cup
Strategy
Fighting Spirit mining rates Simple Questions, Simple Answers Soma's 9 hatch build from ASL Game 2
Other Games
General Games
General RTS Discussion Thread Nintendo Switch Thread Stormgate/Frost Giant Megathread Path of Exile Dawn of War IV
Dota 2
Official 'what is Dota anymore' discussion The Story of Wings Gaming
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Five o'clock TL Mafia Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread Canadian Politics Mega-thread Russo-Ukrainian War Thread European Politico-economics QA Mega-thread Things Aren’t Peaceful in Palestine
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Req][Books] Good Fantasy/SciFi books Movie Discussion! [Manga] One Piece
Sports
Cricket [SPORT] 2024 - 2026 Football Thread Formula 1 Discussion Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
Laptop capable of using Photoshop Lightroom?
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
Unintentional protectionism…
Uldridge
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 4257 users

US Politics Mega-thread - Page 2952

Forum Index > Closed
Post a Reply
Prev 1 2950 2951 2952 2953 2954 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
m4ini
Profile Joined February 2014
4215 Posts
February 18 2016 05:47 GMT
#59021
On February 18 2016 14:07 Plansix wrote:
I am still conflicted. I think the judge should amend the order to Apple is required to unlock the phone, but not required to share the key with the FBI, and they should control it. Its weird that they are able to withhold information/access, but I can't deny a search warrant for my house.


If i understand correctly, that analogy is wrong.

I bet you could deny a warrant to give out every chevrolet car-key though. They're protecting their customers, because we both know (don't even try to deny it) that if apple agrees to give out the key or unlock the phone, not even 8 weeks later every iPhone will be an open book. So far, nobody knows how the encryption works, if they "unlock" the phone, that won't be the case anymore.

It's btw not just the US market that would be impacted, apple sells shit in europe too, who would've thought. And a phone that can be tapped at will by the US government certainly won't fly in europe. And i'd bet that the US gov would not be willing to pay reparations there, would they.

I might've had a different opinion on that matter, if it weren't for the fact that the US is constantly and persistently trying to force tech-companies to "cooperate" (enabling back-dooring on their devices). Going as far as the 90s, where they tried to force tech companies to add an actual CHIP to their devices for surveillance purposes. And that was before 9/11, so i don't buy that whole "crucial evidence in a major terrorist attack on us soil" bullshit either.

On track to MA1950A.
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 05:47 GMT
#59022
On February 18 2016 14:07 Plansix wrote:
I am still conflicted. I think the judge should amend the order to Apple is required to unlock the phone, but not required to share the key with the FBI, and they should control it. Its weird that they are able to withhold information/access, but I can't deny a search warrant for my house.

If we're going the analogy route, "unlock the phone" is not the same as "gain access to a house". It's not as simple as breaking a window or breaking down a door.

Police can get a warrant to break open a high-security vault with all the tools available to them. The courts can't order the vault maker to create a master key that will open all safes that they make, and then say "we'll only use it for this case, promise".
Average means I'm better than half of you.
ticklishmusic
Profile Blog Joined August 2011
United States15977 Posts
February 18 2016 05:52 GMT
#59023
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.
(╯°□°)╯︵ ┻━┻
m4ini
Profile Joined February 2014
4215 Posts
Last Edited: 2016-02-18 06:09:12
February 18 2016 05:56 GMT
#59024
On February 18 2016 14:52 ticklishmusic wrote:
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.


The question is, is that technically even possible?

I assume apple is against it because chances are, that they can't do it without supervision. As i understand it, they need to write an update for the phone, which has to include that "secret key". If "government hackers" could reverse-engineer that, i'd decline too.

edit: same argument could btw be made for installing a security camera in every single household, garage and whatnot. Just make the government promise that they won't use them until "the situation calls for it". Would you?

edit2: just to point out the obvious though, it's kinda funny to see so many people in favor of forcing apple to hack that phone (which is unconstitutional), yet the second amendment is untouchable. Guess the constitution is only important if it suits you.
On track to MA1950A.
IgnE
Profile Joined November 2010
United States7681 Posts
Last Edited: 2016-02-18 05:57:39
February 18 2016 05:56 GMT
#59025
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.
The unrealistic sound of these propositions is indicative, not of their utopian character, but of the strength of the forces which prevent their realization.
Doublemint
Profile Joined July 2011
Austria8726 Posts
February 18 2016 06:08 GMT
#59026
On February 18 2016 14:56 IgnE wrote:
Show nested quote +
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.


because she understands the country and its fears. bernie would simply have to change his mind on that - at the latest when push comes to shove. NO us president can appear to be weak on terror. and the worst thing that could happen is that you are alienating the very people whose job it is to keep the country safe. you criticize and make changes in different channels.

that's also what oneofthem's point is mainly about. he is just trapped in his technocrat speak ^^

don't take my party pooping with agreement to opening phones to the feds. quite the contrary. just making inconvenient points.
Pride goeth before destruction, and an haughty spirit before the fall.
ticklishmusic
Profile Blog Joined August 2011
United States15977 Posts
Last Edited: 2016-02-18 06:14:46
February 18 2016 06:10 GMT
#59027
On February 18 2016 14:56 m4ini wrote:
Show nested quote +
On February 18 2016 14:52 ticklishmusic wrote:
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.


The question is, is that technically even possible?

I assume apple is against it because chances are, that they can't do it without supervision. As i understand it, they need to write an update for the phone, which has to include that "secret key". If "government hackers" could reverse-engineer that, i'd decline too.

edit: same argument could btw be made for installing a security camera in every single household, garage and whatnot. Just make the government promise that they won't use them until "the situation calls for it". Would you?


speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is... continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.

i meant i can see that particular argument's line of reasoning. not one that i agree with to make it clear.
(╯°□°)╯︵ ┻━┻
m4ini
Profile Joined February 2014
4215 Posts
Last Edited: 2016-02-18 06:19:40
February 18 2016 06:12 GMT
#59028
On February 18 2016 15:08 Doublemint wrote:
Show nested quote +
On February 18 2016 14:56 IgnE wrote:
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.


because she understands the country and its fears. bernie would simply have to change his mind on that - at the latest when push comes to shove. NO us president can appear to be weak on terror. and the worst thing that could happen is that you are alienating the very people whose job it is to keep the country safe. you criticize and make changes in different channels.

that's also what oneofthem's point is mainly about. he is just trapped in his technocrat speak ^^

don't take my party pooping with agreement to opening phones to the feds. quite the contrary. just making inconvenient points.


One could also see that as a proof that the next president will shit all over the constitution. Of course, as a presidential candidate you have to pander to the fears of the population, but somehow it seems to be overlooked that if one amendment can be broken, another one might be the next. Could be the second one. And how hilarious would it be to see the outcry then.

speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is...

i meant i can see that as a line of reasoning. not one that i agree with to make it clear.


No, they don't.

Dan Guido, an expert in hacking operating systems, said that to unlock the phone, the Federal Bureau of Investigation would need to install an update to Apple's iOS operating system so investigators could circumvent the security protections, including one that wipes data if an incorrect password is entered too many times.

He said only Apple could provide that software because the phones will only install updates that are digitally signed with a secret cryptographic key.

"That key is one of the most valuable pieces of data the entire company owns," he said. "Someone with that key can change all the data on all the iPhones.”


Now, they already declared the phone "a crucial piece of evidence", which pretty much means that apple won't get the phone to unlock it and send the data back. Technicians will go to whereever the phone is, and unlock it there under the eyes of whoever is there - and they will have to leave this piece of software on the phone, too. This piece of software can be re-engineered, and is pretty much the master key to all the other phones.

continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.


That's, uhm.. How to put it. Think about it a bit. If something can be "de-anonymized", it's not anonymized in the first place. To enable something "to pop up", it has to be monitored already.
On track to MA1950A.
Doublemint
Profile Joined July 2011
Austria8726 Posts
February 18 2016 06:15 GMT
#59029
On February 18 2016 15:12 m4ini wrote:
Show nested quote +
On February 18 2016 15:08 Doublemint wrote:
On February 18 2016 14:56 IgnE wrote:
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.


because she understands the country and its fears. bernie would simply have to change his mind on that - at the latest when push comes to shove. NO us president can appear to be weak on terror. and the worst thing that could happen is that you are alienating the very people whose job it is to keep the country safe. you criticize and make changes in different channels.

that's also what oneofthem's point is mainly about. he is just trapped in his technocrat speak ^^

don't take my party pooping with agreement to opening phones to the feds. quite the contrary. just making inconvenient points.


One could also see that as a proof that the next president will shit all over the constitution. Of course, as a presidential candidate you have to pander to the fears of the population, but somehow it seems to be overlooked that if one amendment can be broken, another one might be the next. Could be the second one. And how hilarious would it be to see the outcry then.


well... shitting on the constitution has been a sport for quite a while now. so there's nothing new really.
Pride goeth before destruction, and an haughty spirit before the fall.
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 06:18 GMT
#59030
On February 18 2016 15:10 ticklishmusic wrote:
Show nested quote +
On February 18 2016 14:56 m4ini wrote:
On February 18 2016 14:52 ticklishmusic wrote:
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.


The question is, is that technically even possible?

I assume apple is against it because chances are, that they can't do it without supervision. As i understand it, they need to write an update for the phone, which has to include that "secret key". If "government hackers" could reverse-engineer that, i'd decline too.

edit: same argument could btw be made for installing a security camera in every single household, garage and whatnot. Just make the government promise that they won't use them until "the situation calls for it". Would you?


speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is... continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.

i meant i can see that particular argument's line of reasoning. not one that i agree with to make it clear.

0FAFBB01BFE123FADDBA318FAE8D9FAA1935ABC310F

On a scale of "Hello" to "Imablowupaplane", how suspicious does that string look to you?
Average means I'm better than half of you.
m4ini
Profile Joined February 2014
4215 Posts
Last Edited: 2016-02-18 06:28:06
February 18 2016 06:20 GMT
#59031
On February 18 2016 15:18 WolfintheSheep wrote:
Show nested quote +
On February 18 2016 15:10 ticklishmusic wrote:
On February 18 2016 14:56 m4ini wrote:
On February 18 2016 14:52 ticklishmusic wrote:
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.


The question is, is that technically even possible?

I assume apple is against it because chances are, that they can't do it without supervision. As i understand it, they need to write an update for the phone, which has to include that "secret key". If "government hackers" could reverse-engineer that, i'd decline too.

edit: same argument could btw be made for installing a security camera in every single household, garage and whatnot. Just make the government promise that they won't use them until "the situation calls for it". Would you?


speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is... continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.

i meant i can see that particular argument's line of reasoning. not one that i agree with to make it clear.

0FAFBB01BFE123FADDBA318FAE8D9FAA1935ABC310F

On a scale of "Hello" to "Imablowupaplane", how suspicious does that string look to you?


I think you tried to order a hooker.

edit:

The phone requires two digital "keys" to unscramble the data: a passcode entered by the user when they want to use the device and a unique 256-bit AES key that is coded into the hardware during manufacture. The hardware key cannot be removed from the device, which prevents hackers from copying the contents of its hard drive and then cracking the passcode with the help of powerful computers.


And that is pretty much the reason why they won't and shouldn't do it.

The "encryption" is hardcoded, so they can't crack that one phone and then send an updated security key to all the others.
edit2: i lied, "all the others up to the iPhone 5C" would be correct.
On track to MA1950A.
Doublemint
Profile Joined July 2011
Austria8726 Posts
February 18 2016 06:28 GMT
#59032
On February 18 2016 15:20 m4ini wrote:
Show nested quote +
On February 18 2016 15:18 WolfintheSheep wrote:
On February 18 2016 15:10 ticklishmusic wrote:
On February 18 2016 14:56 m4ini wrote:
On February 18 2016 14:52 ticklishmusic wrote:
im with wolf here, i mean i could see the argument for "we need the key because we need to be able to hack in at any given moment because of a developing situation", but the dude's dead. just have apple crack open the phone and be done with it, if you need to set up some sort of agreement with apple for getting access to their stuff, do that separately.


The question is, is that technically even possible?

I assume apple is against it because chances are, that they can't do it without supervision. As i understand it, they need to write an update for the phone, which has to include that "secret key". If "government hackers" could reverse-engineer that, i'd decline too.

edit: same argument could btw be made for installing a security camera in every single household, garage and whatnot. Just make the government promise that they won't use them until "the situation calls for it". Would you?


speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is... continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.

i meant i can see that particular argument's line of reasoning. not one that i agree with to make it clear.

0FAFBB01BFE123FADDBA318FAE8D9FAA1935ABC310F

On a scale of "Hello" to "Imablowupaplane", how suspicious does that string look to you?


I think you tried to order a hooker.

edit:

Show nested quote +
The phone requires two digital "keys" to unscramble the data: a passcode entered by the user when they want to use the device and a unique 256-bit AES key that is coded into the hardware during manufacture. The hardware key cannot be removed from the device, which prevents hackers from copying the contents of its hard drive and then cracking the passcode with the help of powerful computers.


And that is pretty much the reason why they won't and shouldn't do it.

The "encryption" is hardcoded, so they can't crack that one phone and then send an updated security key to all the others.


apple's security measures are basically an overreaction to a previous overreaction(nsa scandal/causa snowden).
Pride goeth before destruction, and an haughty spirit before the fall.
ticklishmusic
Profile Blog Joined August 2011
United States15977 Posts
February 18 2016 06:29 GMT
#59033
On February 18 2016 15:12 m4ini wrote:
Show nested quote +
On February 18 2016 15:08 Doublemint wrote:
On February 18 2016 14:56 IgnE wrote:
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.


because she understands the country and its fears. bernie would simply have to change his mind on that - at the latest when push comes to shove. NO us president can appear to be weak on terror. and the worst thing that could happen is that you are alienating the very people whose job it is to keep the country safe. you criticize and make changes in different channels.

that's also what oneofthem's point is mainly about. he is just trapped in his technocrat speak ^^

don't take my party pooping with agreement to opening phones to the feds. quite the contrary. just making inconvenient points.


One could also see that as a proof that the next president will shit all over the constitution. Of course, as a presidential candidate you have to pander to the fears of the population, but somehow it seems to be overlooked that if one amendment can be broken, another one might be the next. Could be the second one. And how hilarious would it be to see the outcry then.

Show nested quote +
speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is...

i meant i can see that as a line of reasoning. not one that i agree with to make it clear.


No, they don't.

Show nested quote +
Dan Guido, an expert in hacking operating systems, said that to unlock the phone, the Federal Bureau of Investigation would need to install an update to Apple's iOS operating system so investigators could circumvent the security protections, including one that wipes data if an incorrect password is entered too many times.

He said only Apple could provide that software because the phones will only install updates that are digitally signed with a secret cryptographic key.

"That key is one of the most valuable pieces of data the entire company owns," he said. "Someone with that key can change all the data on all the iPhones.”


Now, they already declared the phone "a crucial piece of evidence", which pretty much means that apple won't get the phone to unlock it and send the data back. Technicians will go to whereever the phone is, and unlock it there under the eyes of whoever is there - and they will have to leave this piece of software on the phone, too. This piece of software can be re-engineered, and is pretty much the master key to all the other phones.

Show nested quote +
continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.


That's, uhm.. How to put it. Think about it a bit. If something can be "de-anonymized", it's not anonymized in the first place. To enable something "to pop up", it has to be monitored already.


It sounds like the FBI is really trying to just get the key, so screw them in this particular case.

My idea was to have apple set it up so the communications from different devices accounts are just tagged with a random code and have no personal identifying information, provide the data like that to the fbi and then if the fbi spots troubling things they present it to the court then apple provides actual details on the person if the court issued a warrant.

As far as random gibberish goes... Well there's gonna be a lot of noise and such but I figure the fbi can build their own ibm Watson to parse things.
(╯°□°)╯︵ ┻━┻
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 06:33 GMT
#59034
On February 18 2016 15:29 ticklishmusic wrote:
Show nested quote +
On February 18 2016 15:12 m4ini wrote:
On February 18 2016 15:08 Doublemint wrote:
On February 18 2016 14:56 IgnE wrote:
On February 18 2016 13:58 oneofthem wrote:
this is stuff that need not be publicized.


lolwat?

Hillary supports giving the FBI access to any iphone.


because she understands the country and its fears. bernie would simply have to change his mind on that - at the latest when push comes to shove. NO us president can appear to be weak on terror. and the worst thing that could happen is that you are alienating the very people whose job it is to keep the country safe. you criticize and make changes in different channels.

that's also what oneofthem's point is mainly about. he is just trapped in his technocrat speak ^^

don't take my party pooping with agreement to opening phones to the feds. quite the contrary. just making inconvenient points.


One could also see that as a proof that the next president will shit all over the constitution. Of course, as a presidential candidate you have to pander to the fears of the population, but somehow it seems to be overlooked that if one amendment can be broken, another one might be the next. Could be the second one. And how hilarious would it be to see the outcry then.

speaking from a position of technical ignorance, it seems like apple should definitely have a way to get at your data as-is...

i meant i can see that as a line of reasoning. not one that i agree with to make it clear.


No, they don't.

Dan Guido, an expert in hacking operating systems, said that to unlock the phone, the Federal Bureau of Investigation would need to install an update to Apple's iOS operating system so investigators could circumvent the security protections, including one that wipes data if an incorrect password is entered too many times.

He said only Apple could provide that software because the phones will only install updates that are digitally signed with a secret cryptographic key.

"That key is one of the most valuable pieces of data the entire company owns," he said. "Someone with that key can change all the data on all the iPhones.”


Now, they already declared the phone "a crucial piece of evidence", which pretty much means that apple won't get the phone to unlock it and send the data back. Technicians will go to whereever the phone is, and unlock it there under the eyes of whoever is there - and they will have to leave this piece of software on the phone, too. This piece of software can be re-engineered, and is pretty much the master key to all the other phones.

continuing to speak from my place of ignorance, wouldnt it be possible to set up a system that trawls anonymized data and if something suspicious pops up the gov can go to a judge, present their case and get it de-anonymized or something like that? Can't be that easy though, in likely dunning Kruger-ing.


That's, uhm.. How to put it. Think about it a bit. If something can be "de-anonymized", it's not anonymized in the first place. To enable something "to pop up", it has to be monitored already.


It sounds like the FBI is really trying to just get the key, so screw them in this particular case.

My idea was to have apple set it up so the communications from different devices accounts are just tagged with a random code and have no personal identifying information, provide the data like that to the fbi and then if the fbi spots troubling things they present it to the court then apple provides actual details on the person if the court issued a warrant.

As far as random gibberish goes... Well there's gonna be a lot of noise and such but I figure the fbi can build their own ibm Watson to parse things.

I think you missed the point of the random gibberish.

That's what encryption does. It turns everything into gibberish. You can't parse it unless you have the encryption key, or a powerful enough computer to brute force it.
Average means I'm better than half of you.
Silvanel
Profile Blog Joined March 2003
Poland4744 Posts
Last Edited: 2016-02-18 07:56:25
February 18 2016 07:48 GMT
#59035
This "hardware key" which is needed from Apple (+update of course) is like licenses key for Windows. Its unique to device (and even sesion) the same key wouldnt work on different device. FBI is asking for one key, not key genaration mechanism. When microsoft gives out their licenses key (after You buy Windows) they are not compromizing other licenses. Same with this hardwere key, unless its really stupid - knowing one key would not give You s way to genarte more keys.


TLDR: One key =/= key generation mechanism.
Pathetic Greta hater.
m4ini
Profile Joined February 2014
4215 Posts
Last Edited: 2016-02-18 09:35:11
February 18 2016 09:22 GMT
#59036
On February 18 2016 16:48 Silvanel wrote:
This "hardware key" which is needed from Apple (+update of course) is like licenses key for Windows. Its unique to device (and even sesion) the same key wouldnt work on different device. FBI is asking for one key, not key genaration mechanism. When microsoft gives out their licenses key (after You buy Windows) they are not compromizing other licenses. Same with this hardwere key, unless its really stupid - knowing one key would not give You s way to genarte more keys.


TLDR: One key =/= key generation mechanism.


Sorry to be blunt, but that's bullshit.

It's NOT like the windows key for iPhones before 6. After 6, even if apple wanted, they couldn't unlock it, because they don't know the "user id" which came in form of something called "Security Enclave". Which is an extra chip, working together with a UNIQUE (which is new for iPhone 6 and up, making 5 and before inherently NOT unique) user ID that apple doesn't even know. It's basically an extra computer in your phone, which purely is there to prevent breaching into your phone. Even by apple.

edit:

Ah, i was right.

As a remedy, the FBI has asked for Apple to perform the following actions on their behalf:
[Provide] the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (“SIF”) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory (“RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory. The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The SIF will be loaded via Device Firmware Upgrade (“DFU”) mode, recovery mode, or other applicable mode available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowed the government to conduct passcode recovery analysis.


On track to MA1950A.
Danglars
Profile Blog Joined August 2010
United States12133 Posts
February 18 2016 09:46 GMT
#59037
On February 18 2016 18:22 m4ini wrote:
Show nested quote +
On February 18 2016 16:48 Silvanel wrote:
This "hardware key" which is needed from Apple (+update of course) is like licenses key for Windows. Its unique to device (and even sesion) the same key wouldnt work on different device. FBI is asking for one key, not key genaration mechanism. When microsoft gives out their licenses key (after You buy Windows) they are not compromizing other licenses. Same with this hardwere key, unless its really stupid - knowing one key would not give You s way to genarte more keys.


TLDR: One key =/= key generation mechanism.


Sorry to be blunt, but that's bullshit.

It's NOT like the windows key for iPhones before 6. After 6, even if apple wanted, they couldn't unlock it, because they don't know the "user id" which came in form of something called "Security Enclave". Which is an extra chip, working together with a UNIQUE (which is new for iPhone 6 and up, making 5 and before inherently NOT unique) user ID that apple doesn't even know. It's basically an extra computer in your phone, which purely is there to prevent breaching into your phone. Even by apple.

edit:

Ah, i was right.

Show nested quote +
As a remedy, the FBI has asked for Apple to perform the following actions on their behalf:
[Provide] the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (“SIF”) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory (“RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory. The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The SIF will be loaded via Device Firmware Upgrade (“DFU”) mode, recovery mode, or other applicable mode available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowed the government to conduct passcode recovery analysis.


Good luck FBI. Tech companies will go full SOPA for this.
Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
Silvanel
Profile Blog Joined March 2003
Poland4744 Posts
Last Edited: 2016-02-18 09:56:52
February 18 2016 09:56 GMT
#59038
On February 18 2016 18:22 m4ini wrote:
Show nested quote +
On February 18 2016 16:48 Silvanel wrote:
This "hardware key" which is needed from Apple (+update of course) is like licenses key for Windows. Its unique to device (and even sesion) the same key wouldnt work on different device. FBI is asking for one key, not key genaration mechanism. When microsoft gives out their licenses key (after You buy Windows) they are not compromizing other licenses. Same with this hardwere key, unless its really stupid - knowing one key would not give You s way to genarte more keys.


TLDR: One key =/= key generation mechanism.


Sorry to be blunt, but that's bullshit.

It's NOT like the windows key for iPhones before 6. After 6, even if apple wanted, they couldn't unlock it, because they don't know the "user id" which came in form of something called "Security Enclave". Which is an extra chip, working together with a UNIQUE (which is new for iPhone 6 and up, making 5 and before inherently NOT unique) user ID that apple doesn't even know. It's basically an extra computer in your phone, which purely is there to prevent breaching into your phone. Even by apple.

edit:

Ah, i was right.

Show nested quote +
As a remedy, the FBI has asked for Apple to perform the following actions on their behalf:
[Provide] the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (“SIF”) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory (“RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory. The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The SIF will be loaded via Device Firmware Upgrade (“DFU”) mode, recovery mode, or other applicable mode available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowed the government to conduct passcode recovery analysis.




Dude, You seriously lack reading comprahension. I am talking about hardware key that needs to be sent to force update of software of Iphone. Which is what is needed (along with new software of course) to bypass protection of Ihpne5C (iphone in question).
Iphone6 is totally different game, but i wasnt talking about them, and theres is no need of discussing them in connection to this particular case.
Iphone5C dont have Secure Enclave. Which is clearly stated in article i provided earlier (the same You are quoting).
Pathetic Greta hater.
GreenHorizons
Profile Blog Joined April 2011
United States23762 Posts
February 18 2016 10:02 GMT
#59039
Apple has said they are ready to go to the Supreme Court over it soooo that shit ain't getting settled any time soon.
"People like to look at history and think 'If that was me back then, I would have...' We're living through history, and the truth is, whatever you are doing now is probably what you would have done then" "Scratch a Liberal..."
Silvanel
Profile Blog Joined March 2003
Poland4744 Posts
Last Edited: 2016-02-18 10:25:06
February 18 2016 10:23 GMT
#59040
The other way of attacking the issue by FBI might be hiring some strong embeded software company to engineer some hardware based solution with taping to processor directly and sending interupts/other commands during execution of Iphone software on processer. But there are multiple problems with this approach
1.MUCH longer
2.MUCH more expansive
3.No gurantee of success
4.Worse for PR
5.Might (i dont really know what FBI can and cant do) not be legal

Everything would be much easier with Apple cooperation.
Pathetic Greta hater.
Prev 1 2950 2951 2952 2953 2954 10093 Next
Please log in or register to reply.
Live Events Refresh
Replay Cast
00:00
WardiTV Mondays #76
CranKy Ducklings86
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
PiGStarcraft324
RuFF_SC2 157
StarCraft: Brood War
GuemChi 5572
Artosis 590
Shuttle 347
sSak 59
NaDa 30
Bale 12
Dota 2
monkeys_forever540
Counter-Strike
taco 1041
Super Smash Bros
hungrybox1308
Other Games
summit1g9790
tarik_tv4421
Day[9].tv905
C9.Mang0336
JimRising 295
Maynarde115
ViBE82
CosmosSc2 20
Organizations
Other Games
BasetradeTV66
Dota 2
PGL Dota 2 - Main Stream41
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 20 non-featured ]
StarCraft 2
• Hupsaiya 64
• davetesta48
• musti20045 24
• Berry_CruncH7
• CranKy Ducklings SOOP2
• intothetv
• AfreecaTV YouTube
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• RayReign 41
• Azhi_Dahaki2
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• masondota21646
League of Legends
• Doublelift4772
Other Games
• Day9tv905
Upcoming Events
KCM Race Survival
7h 14m
The PondCast
8h 14m
WardiTV Team League
10h 14m
BASILISK vs Team Liquid
OSC
10h 14m
Replay Cast
22h 14m
WardiTV Team League
1d 10h
Big Brain Bouts
1d 15h
Fjant vs SortOf
YoungYakov vs Krystianer
Reynor vs HeRoMaRinE
RSL Revival
2 days
Cure vs Zoun
herO vs Rogue
WardiTV Team League
2 days
Platinum Heroes Events
2 days
[ Show More ]
BSL
2 days
RSL Revival
3 days
ByuN vs Maru
MaxPax vs TriGGeR
WardiTV Team League
3 days
BSL
3 days
Replay Cast
3 days
Replay Cast
4 days
Afreeca Starleague
4 days
Light vs Calm
Royal vs Mind
Wardi Open
4 days
Monday Night Weeklies
4 days
OSC
4 days
Sparkling Tuna Cup
5 days
Afreeca Starleague
5 days
Rush vs PianO
Flash vs Speed
Replay Cast
6 days
Afreeca Starleague
6 days
BeSt vs Leta
Queen vs Jaedong
Replay Cast
6 days
Liquipedia Results

Completed

Proleague 2026-03-24
WardiTV Winter 2026
Underdog Cup #3

Ongoing

KCM Race Survival 2026 Season 1
BSL Season 22
CSL Elite League 2026
CSL Season 20: Qualifier 1
ASL Season 21
Acropolis #4 - TS6
RSL Revival: Season 4
Nations Cup 2026
NationLESS Cup
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual

Upcoming

2026 Changsha Offline CUP
CSL Season 20: Qualifier 2
CSL 2026 SPRING (S20)
Acropolis #4
IPSL Spring 2026
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.