• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 18:22
CET 23:22
KST 07:22
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy7ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20Clem wins HomeStory Cup 289
Community News
Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool48Weekly Cups (March 9-15): herO, Clem, ByuN win42026 KungFu Cup Announcement6BGE Stara Zagora 2026 cancelled12
StarCraft 2
General
What mix of new & old maps do you want in the next ladder pool? (SC2) Potential Updates Coming to the SC2 CN Server Behind the Blue - Team Liquid History Book herO wins SC2 All-Star Invitational Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool
Tourneys
StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays Sparkling Tuna Cup - Weekly Open Tournament World University TeamLeague (500$+) | Signups Open RSL Season 4 announced for March-April
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat Mutation # 516 Specter of Death
Brood War
General
RepMastered™: replay sharing and analyzer site Gypsy to Korea KK Platform will provide 1 million CNY ASL21 General Discussion mca64Launcher - New Version with StarCraft: Remast
Tourneys
[Megathread] Daily Proleagues 2026 Changsha Offline Cup [ASL21] Ro24 Group B [ASL21] Ro24 Group A
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Nintendo Switch Thread Stormgate/Frost Giant Megathread Darkest Dungeon General RTS Discussion Thread Path of Exile
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Five o'clock TL Mafia Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia
Community
General
US Politics Mega-thread The Games Industry And ATVI European Politico-economics QA Mega-thread Canadian Politics Mega-thread Russo-Ukrainian War Thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Manga] One Piece [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
2024 - 2026 Football Thread Cricket [SPORT] Formula 1 Discussion Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
Unintentional protectionism…
Uldridge
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1968 users

US Politics Mega-thread - Page 2958

Forum Index > Closed
Post a Reply
Prev 1 2956 2957 2958 2959 2960 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 18:56 GMT
#59141
On February 19 2016 02:35 Gorsameth wrote:
Show nested quote +
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
Plansix
Profile Blog Joined April 2011
United States60190 Posts
February 18 2016 18:56 GMT
#59142
On February 19 2016 03:48 Acrofales wrote:
Show nested quote +
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.

From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Soap
Profile Blog Joined April 2010
Brazil1546 Posts
Last Edited: 2016-02-18 19:10:45
February 18 2016 19:03 GMT
#59143
On February 19 2016 03:48 Acrofales wrote:
Show nested quote +
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.


They can seek the manufacturer assistance, who replied they'd have to make a key to all of their safes. That can be construed as a violation of the Fourth Amendment requirement that searches must be specific.
puerk
Profile Joined February 2015
Germany855 Posts
February 18 2016 19:08 GMT
#59144
On February 19 2016 03:56 oneofthem wrote:
Show nested quote +
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 19:11 GMT
#59145
On February 19 2016 03:56 Plansix wrote:
Show nested quote +
On February 19 2016 03:48 Acrofales wrote:
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.

From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.

This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.
Average means I'm better than half of you.
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 19:13 GMT
#59146
On February 19 2016 04:08 puerk wrote:
Show nested quote +
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
puerk
Profile Joined February 2015
Germany855 Posts
February 18 2016 19:15 GMT
#59147
On February 19 2016 04:13 oneofthem wrote:
Show nested quote +
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

creating it after the fact only works through a vulnerability in the system, so doing it shows the existence of said vulnerability: in this case there seems to be a way to force a locked iphone to update its firmware to a faulty one, that will give access

if this is possible is still unclear, but if apple does it, the systems flaw is exposed and others will copy the technique
Gorsameth
Profile Joined April 2010
Netherlands22164 Posts
February 18 2016 19:17 GMT
#59148
On February 19 2016 04:13 oneofthem wrote:
Show nested quote +
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

How often do we need to lay out the path this takes before you understand why it is a problem?
It ignores such insignificant forces as time, entropy, and death
Acrofales
Profile Joined August 2010
Spain18246 Posts
Last Edited: 2016-02-18 19:20:02
February 18 2016 19:17 GMT
#59149
On February 19 2016 03:56 Plansix wrote:
Show nested quote +
On February 19 2016 03:48 Acrofales wrote:
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.

From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.


You're once again completely missing the point.

The police can:
1. Listen to what you're saying, and writing, through a wiretap they got a court order for. If those messages are encrypted, then whoever is on the receiving end is either receiving nonsensical jibberish, or can provide you with the decryption key.

2. The police can take that phone and figure out any number of ways to work around the security, just as today they manage to get info out of suspects in completely legal interrogations.

Neither of these have anything to do with the case at hand.

And the ability to store data in a way that nobody except the owner can access already exists and is freely available with a very brief Google search. All Apple did is take this already existing technology and embed it in their phone.

In actual fact, it already existed since virtually forever: you could always take your sensitive documents and hide them somewhere.

Edit: or as someone just pointed out: by memorizing it.
Plansix
Profile Blog Joined April 2011
United States60190 Posts
February 18 2016 19:20 GMT
#59150
On February 19 2016 04:11 WolfintheSheep wrote:
Show nested quote +
On February 19 2016 03:56 Plansix wrote:
On February 19 2016 03:48 Acrofales wrote:
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.

From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.

This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.


Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 19:20 GMT
#59151
On February 19 2016 04:13 oneofthem wrote:
Show nested quote +
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.
Average means I'm better than half of you.
Plansix
Profile Blog Joined April 2011
United States60190 Posts
February 18 2016 19:22 GMT
#59152
I was under the impression that if the FBI tries to brute force the phone or break the encryption, it will delete itself and destroy the evidence. Is that not true?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Acrofales
Profile Joined August 2010
Spain18246 Posts
Last Edited: 2016-02-18 19:29:08
February 18 2016 19:24 GMT
#59153
On February 19 2016 04:22 Plansix wrote:
I was under the impression that if the FBI tries to brute force the phone or break the encryption, it will delete itself and destroy the evidence. Is that not true?

It might be, but that has a VERY simple workaround. The real problem is the time it will take to crack the pass code.

EDIT: the work around is obviously to bypass the OS entirely and read out the ROM directly. You can keep flashing it ad infinitum if it keeps getting destroyed. I don't really see any way for iOS to get around that. Even if there's two separate ROMS like in their newer Secure Enclave systems. Only way I can think of doing this irreversibly is by tying the code up in some hardware and actually destroying that hardware if the code is typed wrong too often. Fairly certain that isn't happening.
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 19:24 GMT
#59154
On February 19 2016 04:17 Gorsameth wrote:
Show nested quote +
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

How often do we need to lay out the path this takes before you understand why it is a problem?

it's not a problem with some relaxed assumptions. again a lot of intermediate and less scary optins that properly take into account compelling security/law enforcement interests
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 19:25 GMT
#59155
On February 19 2016 04:20 WolfintheSheep wrote:
Show nested quote +
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 19:27 GMT
#59156
On February 19 2016 04:20 Plansix wrote:
Show nested quote +
On February 19 2016 04:11 WolfintheSheep wrote:
On February 19 2016 03:56 Plansix wrote:
On February 19 2016 03:48 Acrofales wrote:
On February 19 2016 03:43 Jayme wrote:
On February 19 2016 03:35 Acrofales wrote:
Extremely relevant article from wired in 2014 on this issue. I agree completely. The sense of entitlement of law officials to be able to ruffle through your stuff is quite ludicrous.

Now I sympathize with the FBI in this case and wish them all the luck in the world cracking that phone. But just as we don't forbid ppl from using safes, or locking their front door, should we try to block the computational equivalent of these technologies.

And no, a search warrant doesn't mean you have to open your safe. Just your front door.


Edit: forgot the link.
http://www.wired.com/2014/10/golden-key/


That actually depends on what the Search Warrant says. If it specifically indicates a safe they know you own you're actually compelled to open it. Normally they just take the entire thing and open it themselves. Careful with statements like that. Search Warrants aren't limited to your house.



True, but they can't prove you didn't forget the code. And in this case the owner is dead, so can't be compelled to giving them the code.

From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.

This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.


Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.

And if I wore gloves and sent these evil messages from newspaper cutouts like the good old days, you're saying I would never be convicted?

Sure, encryption is a road block for law enforcement, but again, the fact that the evidence even exists on a phone or device now instead of nowhere is a step up from even 20 years back, so let's not pretend that encryption is providing some magical hole that criminals can escape to.
Average means I'm better than half of you.
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 19:30 GMT
#59157
On February 19 2016 04:15 puerk wrote:
Show nested quote +
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

creating it after the fact only works through a vulnerability in the system, so doing it shows the existence of said vulnerability: in this case there seems to be a way to force a locked iphone to update its firmware to a faulty one, that will give access

if this is possible is still unclear, but if apple does it, the systems flaw is exposed and others will copy the technique

the discussion i am interested in having concerns the general design of secured devices. this particular phone can just be individually unlocked, then apple can issue an update that would introduce front door measure at a later date for future problems.

i see no necessitation of security flaw from this sort of a design.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 19:32 GMT
#59158
On February 19 2016 04:25 oneofthem wrote:
Show nested quote +
On February 19 2016 04:20 WolfintheSheep wrote:
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.

A secondary access point does not become magically more secure just because you called it a front door.

The security flaw is that there is an access vector that is identical across all devices outside of the control of the owner of the secured information.

Not that it has the word "back" in it.
Average means I'm better than half of you.
puerk
Profile Joined February 2015
Germany855 Posts
February 18 2016 19:32 GMT
#59159
On February 19 2016 04:30 oneofthem wrote:
Show nested quote +
On February 19 2016 04:15 puerk wrote:
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

creating it after the fact only works through a vulnerability in the system, so doing it shows the existence of said vulnerability: in this case there seems to be a way to force a locked iphone to update its firmware to a faulty one, that will give access

if this is possible is still unclear, but if apple does it, the systems flaw is exposed and others will copy the technique

the discussion i am interested in having concerns the general design of secured devices. this particular phone can just be individually unlocked, then apple can issue an update that would introduce front door measure at a later date for future problems.

i see no necessitation of security flaw from this sort of a design.


you expertly elaborate about issues you have not the first clue about. this might be the problem in this conversation: you have no fucking clue and act like you do and throw a tantrum when your dreamt up cluelessness solution doesnt work.

you behave like a child that talks about dry rain, and how parents are mean when they say that is not how rain works....
Acrofales
Profile Joined August 2010
Spain18246 Posts
Last Edited: 2016-02-18 19:37:57
February 18 2016 19:33 GMT
#59160
On February 19 2016 04:25 oneofthem wrote:
Show nested quote +
On February 19 2016 04:20 WolfintheSheep wrote:
On February 19 2016 04:13 oneofthem wrote:
On February 19 2016 04:08 puerk wrote:
On February 19 2016 03:56 oneofthem wrote:
On February 19 2016 02:35 Gorsameth wrote:
On February 19 2016 02:27 oneofthem wrote:
privacy hawks are making this harder than necessary. there are ways to make iphones unlock without thereby propagating said tools or methods. the means could itself be protected by encryption in some secure location.

strawmanning open access when it need not go so far is just a waste of time

Any backdoor in the OS itself is exploitable, its pretty impossible for it not to be.
Apple can do this with a 1 time program to only break this one phone.

Then the FBI/NSA/CIA will have another phone, and another, and another and....
Before long Apple has several people doing nothing but writing 1 use programs to break phones.

"Hey wouldn't it be easy if there was just a general backdoor we could use? We would need the physical phone so its all safe"

"Hey yeah that backdoor? Its kinda bad if we need the phone itself you know, we want to catch people before they commit crimes so we need to be able to remote breakin"

Oh hey look someone broke the Iphone backdoor and now everyone's data is on the streets, evil Apple let this happen!.

Intelligence organizations have a long history of breaking laws and gathering anything and everything they can get their hands on regardless of use. No I don't trust them to act responsibly with this technology for even a second.

the whole point of bringing it up in a court of law is to have a front door rather than a backdoor, with the proper precautions and safeguards.

there is already a front door, the passkey the owner of the phone used. (have they even tried swiping his finger on the sensor, if it is biometrically locked?)
everything else is by definition of encryption systems a back door
so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
Prev 1 2956 2957 2958 2959 2960 10093 Next
Please log in or register to reply.
Live Events Refresh
The PiG Daily
22:00
Best Games of SC
Maru vs Solar
Rogue vs MaxPax
herO vs Clem
SHIN vs ByuN
herO vs SHIN
TBD vs ByuN
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
PiGStarcraft130
ViBE88
SpeCial 85
Ketroc 0
StarCraft: Brood War
Britney 17752
Shuttle 324
Bonyth 82
Aegong 47
LancerX 25
NaDa 22
IntoTheRainbow 11
Dota 2
Gorgc7047
Super Smash Bros
Liquid`Ken7
Other Games
summit1g9727
Grubby3603
tarik_tv2491
shahzam599
Liquid`Hasu238
mouzStarbuck196
C9.Mang0196
KnowMe187
ArmadaUGS186
crisheroes170
ProTech129
ZombieGrub44
PPMD24
Organizations
Other Games
gamesdonequick1549
StarCraft 2
angryscii 42
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 17 non-featured ]
StarCraft 2
• mYiSmile152
• musti20045 51
• Hupsaiya 45
• Migwel
• sooper7s
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
StarCraft: Brood War
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota21003
Other Games
• imaqtpie994
• Scarra729
• Shiphtur155
Upcoming Events
RSL Revival
11h 38m
Cure vs Zoun
herO vs Rogue
Platinum Heroes Events
16h 38m
BSL
21h 38m
RSL Revival
1d 11h
ByuN vs Maru
MaxPax vs TriGGeR
WardiTV Team League
1d 13h
BSL
1d 20h
Replay Cast
2 days
Replay Cast
2 days
Afreeca Starleague
2 days
Light vs Calm
Royal vs Mind
Wardi Open
2 days
[ Show More ]
Monday Night Weeklies
2 days
OSC
3 days
Sparkling Tuna Cup
3 days
Afreeca Starleague
3 days
Rush vs PianO
Flash vs Speed
Replay Cast
4 days
Afreeca Starleague
4 days
BeSt vs Leta
Queen vs Jaedong
Replay Cast
5 days
The PondCast
5 days
Replay Cast
6 days
RSL Revival
6 days
Liquipedia Results

Completed

KCM Race Survival 2026 Season 1
WardiTV Winter 2026
Underdog Cup #3

Ongoing

BSL Season 22
CSL Elite League 2026
CSL Season 20: Qualifier 1
ASL Season 21
Acropolis #4 - TS6
RSL Revival: Season 4
Nations Cup 2026
NationLESS Cup
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual

Upcoming

2026 Changsha Offline CUP
CSL Season 20: Qualifier 2
CSL 2026 SPRING (S20)
Acropolis #4
IPSL Spring 2026
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.