• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 13:24
CEST 19:24
KST 02:24
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Serral wins EWC 202542Tournament Spotlight: FEL Cracow 202510Power Rank - Esports World Cup 202580RSL Season 1 - Final Week9[ASL19] Finals Recap: Standing Tall15
Community News
Weekly Cups (Jul 28-Aug 3): herO doubles up5LiuLi Cup - August 2025 Tournaments3[BSL 2025] H2 - Team Wars, Weeklies & SB Ladder10EWC 2025 - Replay Pack4Google Play ASL (Season 20) Announced58
StarCraft 2
General
Clem Interview: "PvT is a bit insane right now" Serral wins EWC 2025 TL Team Map Contest #5: Presented by Monster Energy Would you prefer the game to be balanced around top-tier pro level or average pro level? Weekly Cups (Jul 28-Aug 3): herO doubles up
Tourneys
WardiTV Mondays $5,000 WardiTV Summer Championship 2025 Sparkling Tuna Cup - Weekly Open Tournament LiuLi Cup - August 2025 Tournaments Sea Duckling Open (Global, Bronze-Diamond)
Strategy
Custom Maps
External Content
Mutation # 485 Death from Below Mutation # 484 Magnetic Pull Mutation #239 Bad Weather Mutation # 483 Kill Bot Wars
Brood War
General
How do the new Battle.net ranks translate? Which top zerg/toss will fail in qualifiers? BW General Discussion Google Play ASL (Season 20) Announced Nobody gona talk about this year crazy qualifiers?
Tourneys
[ASL20] Online Qualifiers Day 2 [Megathread] Daily Proleagues Cosmonarchy Pro Showmatches [ASL20] Online Qualifiers Day 1
Strategy
Simple Questions, Simple Answers [G] Mineral Boosting Muta micro map competition Does 1 second matter in StarCraft?
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread Total Annihilation Server - TAForever Beyond All Reason [MMORPG] Tree of Savior (Successor of Ragnarok)
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
US Politics Mega-thread Things Aren’t Peaceful in Palestine Bitcoin discussion thread European Politico-economics QA Mega-thread 9/11 Anniversary
Fan Clubs
INnoVation Fan Club SKT1 Classic Fan Club!
Media & Entertainment
Movie Discussion! [Manga] One Piece Anime Discussion Thread [\m/] Heavy Metal Thread Korean Music Discussion
Sports
2024 - 2025 Football Thread Formula 1 Discussion TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
Gtx660 graphics card replacement Installation of Windows 10 suck at "just a moment" Computer Build, Upgrade & Buying Resource Thread
TL Community
TeamLiquid Team Shirt On Sale The Automated Ban List
Blogs
[Girl blog} My fema…
artosisisthebest
Sharpening the Filtration…
frozenclaw
ASL S20 English Commentary…
namkraft
The Link Between Fitness and…
TrAiDoS
momentary artworks from des…
tankgirl
from making sc maps to makin…
Husyelt
Customize Sidebar...

Website Feedback

Closed Threads



Active: 723 users

US Politics Mega-thread - Page 2961

Forum Index > Closed
Post a Reply
Prev 1 2959 2960 2961 2962 2963 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
puerk
Profile Joined February 2015
Germany855 Posts
February 18 2016 20:18 GMT
#59201
On February 19 2016 05:12 Plansix wrote:
Show nested quote +
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
On February 19 2016 04:20 Plansix wrote:
On February 19 2016 04:11 WolfintheSheep wrote:
On February 19 2016 03:56 Plansix wrote:
[quote]
From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.

This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.


Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.


IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. You need to call the system administrator and have them confirm where the email came from and then prove that the person in question had sole access to the machine. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.


May it suprise you when i say: "so what?", why should proving something being easy be the highest standard our (/your) society strifes for?
Simberto
Profile Blog Joined July 2010
Germany11511 Posts
February 18 2016 20:20 GMT
#59202
The point is that i don't trust the FBI with that kind of access. US agencies are known to ignore the law if it benefits them when working with data. If the FBI has that access, i give it at most a year or two until it turns out that they weren't only using it with legitimate court orders.

Second point: When that access possibility exists, it is less secure than when it doesn't exist. Currently, noone has to keep it safe because it doesn't exist. If you build intentional backdoors into programs, they become less secure. (And it is a back door, not a fucking front door, stop using that word, it does not mean what you think it means.) And if you force apple and US companies to provide backdoors to their products via law and thus open them up to abuse from criminals, you just have to wait for the first time when someone breaks into that backdoor to lose a giant amount of market share to non-US companies who are not forced to compromise security to satisfy the governments unending need to spy on its citizens.
KwarK
Profile Blog Joined July 2006
United States42692 Posts
February 18 2016 20:21 GMT
#59203
oneofthem, you should bear in mind that the NSA let random contractors who didn't even work for the NSA have access to all their shit and one of them was able to just take stuff home with him, get on a plane to HK and give it all away. The only defence against human incompetence hacking is to limit the ability of the humans to cause damage. When someone with a strong Chinese accent calls the FBI and claims to be President Obema who has forgotten the pin to his iphone and needs the algorithm to unlock it someone will give it up.
ModeratorThe angels have the phone box
Acrofales
Profile Joined August 2010
Spain17992 Posts
February 18 2016 20:22 GMT
#59204
On February 19 2016 05:12 Plansix wrote:
Show nested quote +
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
On February 19 2016 04:20 Plansix wrote:
On February 19 2016 04:11 WolfintheSheep wrote:
On February 19 2016 03:56 Plansix wrote:
[quote]
From a legal standpoint, that makes it very hard to prove a lot of things. If they can never open an Iphone for review, you could harass someone from it forever, sending death threats and other terrible thing and never be charged. As long as you did it all on the phone, including the creation of the address, it could be impossible to prove you sent the threats.

A tiny computer that can never be opened by anyone but the owner is the dream of almost every slightly smart criminal.

This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.


Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.


IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. You need to call the system administrator and have them confirm where the email came from and then prove that the person in question had sole access to the machine. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.


It's Ben Franklin time! One of your own founding fathers: "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety."
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 20:23 GMT
#59205
On February 19 2016 05:08 Acrofales wrote:
Show nested quote +
On February 19 2016 04:58 oneofthem wrote:
On February 19 2016 04:53 Acrofales wrote:
On February 19 2016 04:47 oneofthem wrote:
On February 19 2016 04:45 Acrofales wrote:
On February 19 2016 04:40 oneofthem wrote:
On February 19 2016 04:33 Acrofales wrote:
On February 19 2016 04:25 oneofthem wrote:
On February 19 2016 04:20 WolfintheSheep wrote:
On February 19 2016 04:13 oneofthem wrote:
[quote]so what is the problem with creating another similarly secure front door mechanism that authorized access can open?

The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
the front door would be a secured access option with the fbi or whoever holding the key. i am talking about designing the security process so as to avoid both unsecure backdoors and inability to access device in the process of investigation and so on.


You know that the analogy is a house with two doors. One with your key and one with the FBI's key. Except that the FBI's key also opens everybody else's door in the entire world. It's a single point of failure as about 100 ppl here have pointed out, and by its very definition insecure. You seem to be throwing words around without knowing their technical definition in this context.



uh it does not have to be a passcode key obviously. there can be device specific code that requires a secured algorithm to decrypt. it would not be a universal one point of failure, and this is just a technical challenge that should not define the tradeoff in question.


Except that now your golden algorithm has taken the place of your golden key. I am literally repeating the wired article I posted not 1 page back. Please read a wiki page on information security or something... It is either device specific, or universally usable whenever the FBI wants to. In the latter, it is a single point of failure. And while at first that key/algorithm will be fairly safe with just the FBI having access, I give it a few months/year at most before it is reproduced, copied or stolen.

you can't reverse engineer some encrypted locks to find the solver algorithm, so just properly secure the golden algorithm and we are okay. the overall landscape is that strength of encryption can get very high, so if your question is on the security of the government door then it should not be an unsolvable problem, except when there is so much dismissal for want of a solution.


Nothing is impenetrable.

Security is about making things so hard to break into that it's prohibitively expensive to do so.

The problem you are creating, however, is that this golden widget will be almost indescribably valuable to a lot of ppl, ranging from organized crime to foreign agencies. It also cannot be changed sufficiently often to not give these organizations a lot of time and data to Crack the system.

Combine the two, and I give any such system between a few months and a year before it is blown wide open, and with it, all data on all smartphones... or at least all American ones. I give it about a week before Samsung and all Chinese brands drop Android and switch to Tizen or some other homebrew OS, and the rest of the world laughs at how stupid the US was to purposefully expose their entire population.

And you thought the Ashley Madison hack was bad...

it would certainly be subjected to attacks but the public exposure is to the individual devices, and not the FBI portion of the mechanism or the manufacturer portion. you can have encryption dependent on a code per device that apple holds, going through a decrypter the government holds, and all the device has is a non-communicative door.

again the standard is not really impossible to crack. it just has to be nonfragile and be at least as secure as the regular security feature on the device.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
Plansix
Profile Blog Joined April 2011
United States60190 Posts
February 18 2016 20:23 GMT
#59206
On February 19 2016 05:15 Gorsameth wrote:
Show nested quote +
On February 19 2016 05:12 Plansix wrote:
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
On February 19 2016 04:20 Plansix wrote:
On February 19 2016 04:11 WolfintheSheep wrote:
[quote]
This exists already, and it's called the human brain.

Realistically, everything you send out on a phone still exists on the receiver's phone, and the records of some message being sent to that exact destination which align perfectly with the time stamps still exist. You don't need to break open a criminal's phone to prove that they were transmitting the incriminating messages beyond a reasonable doubt.

Honestly, people pretend that secrets didn't exist before computers, and that the situation is somehow worse. In reality it's far, far better for law enforcement, even with encryption, because you can't brute force or hack a person (legally) who is keeping secrets in their head. but a phone has no rights.


Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.


IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.

And you think the solution is to throw everything out on the street instead? (since it is almost inevitable that it will be broken once introduced)
Sometimes the privacy of everyone is more important then your ability to convict one man.

What if that personal is going to harm me or my family? Or is harassing me? Plotting to steal from me? Taking photos of my children and stalking them when I am not around? That isn't a hard drive, its a computer that is connected to a network. Its not a safe. The key part is the majority of crimes harm another person. Does privacy extend so far that this man made system makes them immune a search if they own an Iphone?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Nyxisto
Profile Joined August 2010
Germany6287 Posts
Last Edited: 2016-02-18 20:25:17
February 18 2016 20:24 GMT
#59207
I'd like to throw in that one of the heads of the Paris attacks was literally interviewed by ISIS self proclaimed 'lifestyle magazine' half a year before the attacks, so before the intelligence agencies try to hack phones they maybe should start browsing Facebook
Deathstar
Profile Blog Joined May 2010
9150 Posts
February 18 2016 20:26 GMT
#59208
Alright to segway this ridiculous conversation about strengthening the surveillance state.

This is very bizarre. I haven't processed the meaning of Trump's statement yet.
"If and when the vatican is attacked by ISIS,... the pope will have only wished and prayed that Donald Trump would have been President."


rip passion
Gorsameth
Profile Joined April 2010
Netherlands21687 Posts
February 18 2016 20:27 GMT
#59209
On February 19 2016 05:23 Plansix wrote:
Show nested quote +
On February 19 2016 05:15 Gorsameth wrote:
On February 19 2016 05:12 Plansix wrote:
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
On February 19 2016 04:20 Plansix wrote:
[quote]

Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.


IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.

And you think the solution is to throw everything out on the street instead? (since it is almost inevitable that it will be broken once introduced)
Sometimes the privacy of everyone is more important then your ability to convict one man.

What if that personal is going to harm me or my family? Or is harassing me? Plotting to steal from me? Taking photos of my children and stalking them when I am not around? That isn't a hard drive, its a computer that is connected to a network. Its not a safe. The key part is the majority of crimes harm another person. Does privacy extend so far that this man made system makes them immune a search if they own an Iphone?

For someone who works with the courts you have a very bad understanding of why we have so many limits in place.
It ignores such insignificant forces as time, entropy, and death
Deathstar
Profile Blog Joined May 2010
9150 Posts
February 18 2016 20:27 GMT
#59210
On February 19 2016 05:24 Nyxisto wrote:
I'd like to throw in that one of the heads of the Paris attacks was literally interviewed by ISIS self proclaimed 'lifestyle magazine' half a year before the attacks, so before the intelligence agencies try to hack phones they maybe should start browsing Facebook


Man so much for our beautiful intelligence community that they couldn't fucking stop 9/11. The whole bureaucracy is loaded with incompetence.
rip passion
Soap
Profile Blog Joined April 2010
Brazil1546 Posts
February 18 2016 20:28 GMT
#59211
https://en.wikipedia.org/wiki/Dual_EC_DRBG

In December 2015, Juniper Networks announced that some revisions of their ScreenOS firmware used Dual_EC_DRGB with the suspect P and Q points, creating a backdoor in their firewall. Originally it was supposed to use a Q point chosen by Juniper which may or may not have been generated in provably safe way. Dual_EC_DRGB was then used to seed ANSI X9.17 PRNG. This would have obfuscated the Dual_EC_DRGB output thus killing the backdoor. However, a "bug" in the code exposed the raw output of the Dual_EC_DRGB, hence compromising the security of the system. This backdoor was then backdoored itself by an unknown party which changed the Q point and some test vectors. Allegations that the NSA had persistent backdoor access through Juniper firewalls had already been published in 2013 by Der Spiegel.
IgnE
Profile Joined November 2010
United States7681 Posts
February 18 2016 20:29 GMT
#59212
On February 19 2016 05:23 Plansix wrote:
Show nested quote +
On February 19 2016 05:15 Gorsameth wrote:
On February 19 2016 05:12 Plansix wrote:
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
On February 19 2016 04:20 Plansix wrote:
[quote]

Courts require all evidence be authenticated by a witness, confirming that the evidence is what the attorney claims it is. So in the case of an email, they would need a witness that could testify that the email was sent from that specific phone while the witness is under oath. And that witness is open to cross examination, where the other side can as if they are 100% sure. If they can never open the phone, I question how they would ever prove that it came from that specific phone and not someplace else. The same goes for twitter and all other forms of social media that allow for anonymous log in.


IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.

And you think the solution is to throw everything out on the street instead? (since it is almost inevitable that it will be broken once introduced)
Sometimes the privacy of everyone is more important then your ability to convict one man.

What if that personal is going to harm me or my family? Or is harassing me? Plotting to steal from me? Taking photos of my children and stalking them when I am not around? That isn't a hard drive, its a computer that is connected to a network. Its not a safe. The key part is the majority of crimes harm another person. Does privacy extend so far that this man made system makes them immune a search if they own an Iphone?


Dude wtf are you even talking about anymore? How does encryption prevent prosecution of a person for doing any of those things?

And "a computer is not a safe"? What the fuck? What is a "safe"?
The unrealistic sound of these propositions is indicative, not of their utopian character, but of the strength of the forces which prevent their realization.
Gorsameth
Profile Joined April 2010
Netherlands21687 Posts
February 18 2016 20:29 GMT
#59213
On February 19 2016 05:26 Deathstar wrote:
Alright to segway this ridiculous conversation about strengthening the surveillance state.

This is very bizarre. I haven't processed the meaning of Trump's statement yet.
Show nested quote +
"If and when the vatican is attacked by ISIS,... the pope will have only wished and prayed that Donald Trump would have been President."


https://www.youtube.com/watch?v=pOcqiZsU7U4

I guess Trump is still trying to find that line he shouldn't cross.

No luck yet :p
It ignores such insignificant forces as time, entropy, and death
Acrofales
Profile Joined August 2010
Spain17992 Posts
February 18 2016 20:30 GMT
#59214
On February 19 2016 05:23 oneofthem wrote:
Show nested quote +
On February 19 2016 05:08 Acrofales wrote:
On February 19 2016 04:58 oneofthem wrote:
On February 19 2016 04:53 Acrofales wrote:
On February 19 2016 04:47 oneofthem wrote:
On February 19 2016 04:45 Acrofales wrote:
On February 19 2016 04:40 oneofthem wrote:
On February 19 2016 04:33 Acrofales wrote:
On February 19 2016 04:25 oneofthem wrote:
On February 19 2016 04:20 WolfintheSheep wrote:
[quote]
The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
the front door would be a secured access option with the fbi or whoever holding the key. i am talking about designing the security process so as to avoid both unsecure backdoors and inability to access device in the process of investigation and so on.


You know that the analogy is a house with two doors. One with your key and one with the FBI's key. Except that the FBI's key also opens everybody else's door in the entire world. It's a single point of failure as about 100 ppl here have pointed out, and by its very definition insecure. You seem to be throwing words around without knowing their technical definition in this context.



uh it does not have to be a passcode key obviously. there can be device specific code that requires a secured algorithm to decrypt. it would not be a universal one point of failure, and this is just a technical challenge that should not define the tradeoff in question.


Except that now your golden algorithm has taken the place of your golden key. I am literally repeating the wired article I posted not 1 page back. Please read a wiki page on information security or something... It is either device specific, or universally usable whenever the FBI wants to. In the latter, it is a single point of failure. And while at first that key/algorithm will be fairly safe with just the FBI having access, I give it a few months/year at most before it is reproduced, copied or stolen.

you can't reverse engineer some encrypted locks to find the solver algorithm, so just properly secure the golden algorithm and we are okay. the overall landscape is that strength of encryption can get very high, so if your question is on the security of the government door then it should not be an unsolvable problem, except when there is so much dismissal for want of a solution.


Nothing is impenetrable.

Security is about making things so hard to break into that it's prohibitively expensive to do so.

The problem you are creating, however, is that this golden widget will be almost indescribably valuable to a lot of ppl, ranging from organized crime to foreign agencies. It also cannot be changed sufficiently often to not give these organizations a lot of time and data to Crack the system.

Combine the two, and I give any such system between a few months and a year before it is blown wide open, and with it, all data on all smartphones... or at least all American ones. I give it about a week before Samsung and all Chinese brands drop Android and switch to Tizen or some other homebrew OS, and the rest of the world laughs at how stupid the US was to purposefully expose their entire population.

And you thought the Ashley Madison hack was bad...

it would certainly be subjected to attacks but the public exposure is to the individual devices, and not the FBI portion of the mechanism or the manufacturer portion. you can have encryption dependent on a code per device that apple holds, going through a decrypter the government holds, and all the device has is a non-communicative door.

again the standard is not really impossible to crack. it just has to be nonfragile and be at least as secure as the regular security feature on the device.


No. It has to be about 100 million times as secure, because instead of giving access to 1 phone, it'll give access to a 100 million phones.

Also, why the focus on Apple? Do you think Google and Microsoft are immune? So suddenly the firmware system jiggerydo can be accessed by a couple of dozen people. It'll take a few weeks for that part to leak. The FBI will be harder. But soon someone will be chopping off Bobby Jr's fingers and that'll be the end of that.
Plansix
Profile Blog Joined April 2011
United States60190 Posts
Last Edited: 2016-02-18 20:32:32
February 18 2016 20:30 GMT
#59215
On February 19 2016 05:29 IgnE wrote:
Show nested quote +
On February 19 2016 05:23 Plansix wrote:
On February 19 2016 05:15 Gorsameth wrote:
On February 19 2016 05:12 Plansix wrote:
On February 19 2016 05:05 puerk wrote:
On February 19 2016 05:00 Plansix wrote:
On February 19 2016 04:52 puerk wrote:
On February 19 2016 04:47 Plansix wrote:
On February 19 2016 04:39 Gorsameth wrote:
On February 19 2016 04:34 Simberto wrote:
[quote]

IP addresses. If the phone sends data through the internet, it has a very specific address.

Just as an aside, the legal problem is not proving that device X sent the data. Its to prove the suspect was the one using device X at the time.

And you prove that by saying they have sole access to the device or had the device at the time the criminal activity took place. But to do that, you need to prove that the device sent the data and was the one used. Its a hurdle in all internet based crime and digital evidence.

http://www.theverge.com/2016/2/16/11027732/apple-iphone-encryption-fbi-san-bernardino-shooters

On a side, note, the Judge specifically ordered that Apple assist with bypassing the auto delete feature, which appears to be no small task. Also removing the limit on the number of password attempts. If they cannot currently do that, they need to write software that will allow them.

So the order isn't for them to create a back door, but remove the defenses they put in place so the FBI can force the phone open. With those in place, every iphone is completely immune to being forced open. I don't see anything unreasonable about that order.

Sorry but have you ever felt that maybe lawschool did not make you an expert in cryptography?
Does american law have no form of: de.wikipedia.org?
The gain of hacking that phone is insignificantly low, but it's detriments are unpredictably large and severe. There is no compelling argument to do it. And "fuck i have no clue how stuff works, i will force the apple guys to do my bidding" just doesn't cut it.

First of all, I am a paralegal. Second, don't be an asshole. That second one might be hard for you.

Its a piece of tech. Apple has created a system where it is marketing and selling communication devices that cannot be forced opened without destroying the evidence. They either comply or the FBI is going to push congress to make this form of encryption illegal without some way of opening it.

Ok, sorry i will try.

Please look at that legal concept, i hope google autotranslate makes it kinda understandable. Approprietness of means of law enforcement is an issue that we can talk about in a politics thread, giving advice on how encryption should get circumvented by people not knowing how said encryption works however is pointless.

I agree with you that it might happen this way, and i am saying it is a bad outcome for society overall.

Let me put it to you this way, you understand encryption. I understand how hard it is to get evidence entered into a court. Even physical evidence is challenging at times. We have had documents that are worthless because we couldn't provide a witness to confirm they were authentic. Same with photos, because no one could testify when they we needed to prove they were taken in a specific time frame. Emails are a nightmare if one side won't admit they sent it. If you can't access the phone to provide proof to the jury that the email/text/tweet was sent from that phone, it will likely be impossible to prove who send it. That is just a reality of the legal process for almost all evidence.

And you think the solution is to throw everything out on the street instead? (since it is almost inevitable that it will be broken once introduced)
Sometimes the privacy of everyone is more important then your ability to convict one man.

What if that personal is going to harm me or my family? Or is harassing me? Plotting to steal from me? Taking photos of my children and stalking them when I am not around? That isn't a hard drive, its a computer that is connected to a network. Its not a safe. The key part is the majority of crimes harm another person. Does privacy extend so far that this man made system makes them immune a search if they own an Iphone?


Dude wtf are you even talking about anymore? How does encryption prevent prosecution of a person for doing any of those things?

And "a computer is not a safe"? What the fuck? What is a "safe"?

[image loading]

He stated that privacy was more important than the ability to convict someone. And I pointed out that crimes are normally the result on one person harming another in some way, that we weight the rights of privacy to the right of the victim not to be harmed. That is why we have search warrants.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 20:30 GMT
#59216
On February 19 2016 05:14 Acrofales wrote:
Show nested quote +
On February 19 2016 05:09 oneofthem wrote:
On February 19 2016 05:03 WolfintheSheep wrote:
On February 19 2016 04:58 oneofthem wrote:
On February 19 2016 04:53 Acrofales wrote:
On February 19 2016 04:47 oneofthem wrote:
On February 19 2016 04:45 Acrofales wrote:
On February 19 2016 04:40 oneofthem wrote:
On February 19 2016 04:33 Acrofales wrote:
On February 19 2016 04:25 oneofthem wrote:
[quote]
that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
the front door would be a secured access option with the fbi or whoever holding the key. i am talking about designing the security process so as to avoid both unsecure backdoors and inability to access device in the process of investigation and so on.


You know that the analogy is a house with two doors. One with your key and one with the FBI's key. Except that the FBI's key also opens everybody else's door in the entire world. It's a single point of failure as about 100 ppl here have pointed out, and by its very definition insecure. You seem to be throwing words around without knowing their technical definition in this context.



uh it does not have to be a passcode key obviously. there can be device specific code that requires a secured algorithm to decrypt. it would not be a universal one point of failure, and this is just a technical challenge that should not define the tradeoff in question.


Except that now your golden algorithm has taken the place of your golden key. I am literally repeating the wired article I posted not 1 page back. Please read a wiki page on information security or something... It is either device specific, or universally usable whenever the FBI wants to. In the latter, it is a single point of failure. And while at first that key/algorithm will be fairly safe with just the FBI having access, I give it a few months/year at most before it is reproduced, copied or stolen.

you can't reverse engineer some encrypted locks to find the solver algorithm, so just properly secure the golden algorithm and we are okay. the overall landscape is that strength of encryption can get very high, so if your question is on the security of the government door then it should not be an unsolvable problem, except when there is so much dismissal for want of a solution.

This is why the technologically inept should not comment on these things.

"Just properly secure it" is not a solution, it's a wish.
this is as technical as holding gold in a vault, since we are really talking about securing the method not a piece of passcode. learn to read.



You fail to understand that there is no difference between the pass code and the method.

Whether you use a key or a sequence of genetically modified monkeys that have to dance in a specific order, it is only the complexity that increases, not the underlying principles. And give enough incentive, that complexity can be overcome (usually because some FBI shmoe leaves his laptop in his car)

the point is you can have physical security method on top of the encryption. the former would at least prevent access and provide knowledge of loss which can then be signal to do something about it before the sufficient time passes for the device to be rendered ineffective.

this random contractor situation is pretty bad but we are talking about future plans. i do agree political risk is probably unacceptable at this moment but having a discovery proof space of operations is going to breed all sorts of illegal activities.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
oneofthem
Profile Blog Joined November 2005
Cayman Islands24199 Posts
February 18 2016 20:33 GMT
#59217
On February 19 2016 05:24 Nyxisto wrote:
I'd like to throw in that one of the heads of the Paris attacks was literally interviewed by ISIS self proclaimed 'lifestyle magazine' half a year before the attacks, so before the intelligence agencies try to hack phones they maybe should start browsing Facebook

the u.s. at least is refraining from watching social media due to civil rights concerns.
We have fed the heart on fantasies, the heart's grown brutal from the fare, more substance in our enmities than in our love
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
February 18 2016 20:34 GMT
#59218
On February 19 2016 05:23 Plansix wrote:
Does privacy extend so far that this man made system makes them immune a search if they own an Iphone?


This isn't the crux of the issue. The crux of the issue is over encryption. Privacy does not and should not make one immune to legal searches and seizures. But that's not the issue at all.

Do I have a right to encrypt my data?
Do I have the right to private communication?
WolfintheSheep
Profile Joined June 2011
Canada14127 Posts
February 18 2016 20:35 GMT
#59219
On February 19 2016 05:05 Plansix wrote:
Show nested quote +
On February 19 2016 05:03 WolfintheSheep wrote:
On February 19 2016 04:58 oneofthem wrote:
On February 19 2016 04:53 Acrofales wrote:
On February 19 2016 04:47 oneofthem wrote:
On February 19 2016 04:45 Acrofales wrote:
On February 19 2016 04:40 oneofthem wrote:
On February 19 2016 04:33 Acrofales wrote:
On February 19 2016 04:25 oneofthem wrote:
On February 19 2016 04:20 WolfintheSheep wrote:
[quote]
The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
the front door would be a secured access option with the fbi or whoever holding the key. i am talking about designing the security process so as to avoid both unsecure backdoors and inability to access device in the process of investigation and so on.


You know that the analogy is a house with two doors. One with your key and one with the FBI's key. Except that the FBI's key also opens everybody else's door in the entire world. It's a single point of failure as about 100 ppl here have pointed out, and by its very definition insecure. You seem to be throwing words around without knowing their technical definition in this context.



uh it does not have to be a passcode key obviously. there can be device specific code that requires a secured algorithm to decrypt. it would not be a universal one point of failure, and this is just a technical challenge that should not define the tradeoff in question.


Except that now your golden algorithm has taken the place of your golden key. I am literally repeating the wired article I posted not 1 page back. Please read a wiki page on information security or something... It is either device specific, or universally usable whenever the FBI wants to. In the latter, it is a single point of failure. And while at first that key/algorithm will be fairly safe with just the FBI having access, I give it a few months/year at most before it is reproduced, copied or stolen.

you can't reverse engineer some encrypted locks to find the solver algorithm, so just properly secure the golden algorithm and we are okay. the overall landscape is that strength of encryption can get very high, so if your question is on the security of the government door then it should not be an unsolvable problem, except when there is so much dismissal for want of a solution.

This is why the technologically inept should not comment on these things.

"Just properly secure it" is not a solution, it's a wish.

They should remove the auto delete feature, that is a little much. From reports, it takes a really long time to crack these phones by brute force, so that should be enough.

Well, reality of this (assuming it's confirmed) is that being able to update the firmware and overwrite security settings is already a gigantic security hole.

On February 19 2016 05:23 oneofthem wrote:
Show nested quote +
On February 19 2016 05:08 Acrofales wrote:
On February 19 2016 04:58 oneofthem wrote:
On February 19 2016 04:53 Acrofales wrote:
On February 19 2016 04:47 oneofthem wrote:
On February 19 2016 04:45 Acrofales wrote:
On February 19 2016 04:40 oneofthem wrote:
On February 19 2016 04:33 Acrofales wrote:
On February 19 2016 04:25 oneofthem wrote:
On February 19 2016 04:20 WolfintheSheep wrote:
[quote]
The problem, as stated a hundred times already, is that your use of the word "authorized" is not in line with reality.

You think it means "only the people we want".

The reality is "only people who have the key".

And there is a gigantic difference.

that is not what i think at all, try again. a front door works the same way but with proper safeguards that a 'back door' lacks. you might as well say the fact the owner can use the phone is a security flaw.


OK. So the front door requires a special key that the user can configure. He sets his code to fjord$^_fhrid4568nrtbr÷==AT&TIEN

He memorized this key and doesn't tell anybody. He subsequently dies, leaving the front door locked forever.

Now what you're proposing is that somehow Apple magically has this key too? How?

EDIT: and just to be clear this, and only this is the front door. Amy other access mechanism is, by its very definition, a back door.
the front door would be a secured access option with the fbi or whoever holding the key. i am talking about designing the security process so as to avoid both unsecure backdoors and inability to access device in the process of investigation and so on.


You know that the analogy is a house with two doors. One with your key and one with the FBI's key. Except that the FBI's key also opens everybody else's door in the entire world. It's a single point of failure as about 100 ppl here have pointed out, and by its very definition insecure. You seem to be throwing words around without knowing their technical definition in this context.



uh it does not have to be a passcode key obviously. there can be device specific code that requires a secured algorithm to decrypt. it would not be a universal one point of failure, and this is just a technical challenge that should not define the tradeoff in question.


Except that now your golden algorithm has taken the place of your golden key. I am literally repeating the wired article I posted not 1 page back. Please read a wiki page on information security or something... It is either device specific, or universally usable whenever the FBI wants to. In the latter, it is a single point of failure. And while at first that key/algorithm will be fairly safe with just the FBI having access, I give it a few months/year at most before it is reproduced, copied or stolen.

you can't reverse engineer some encrypted locks to find the solver algorithm, so just properly secure the golden algorithm and we are okay. the overall landscape is that strength of encryption can get very high, so if your question is on the security of the government door then it should not be an unsolvable problem, except when there is so much dismissal for want of a solution.


Nothing is impenetrable.

Security is about making things so hard to break into that it's prohibitively expensive to do so.

The problem you are creating, however, is that this golden widget will be almost indescribably valuable to a lot of ppl, ranging from organized crime to foreign agencies. It also cannot be changed sufficiently often to not give these organizations a lot of time and data to Crack the system.

Combine the two, and I give any such system between a few months and a year before it is blown wide open, and with it, all data on all smartphones... or at least all American ones. I give it about a week before Samsung and all Chinese brands drop Android and switch to Tizen or some other homebrew OS, and the rest of the world laughs at how stupid the US was to purposefully expose their entire population.

And you thought the Ashley Madison hack was bad...

it would certainly be subjected to attacks but the public exposure is to the individual devices, and not the FBI portion of the mechanism or the manufacturer portion. you can have encryption dependent on a code per device that apple holds, going through a decrypter the government holds, and all the device has is a non-communicative door.

again the standard is not really impossible to crack. it just has to be nonfragile and be at least as secure as the regular security feature on the device.


Obscurity is one of the strongest security measures you can have. Breaking your personal security is not really that hard, just time intensive and not worth the ROI. (which is really the FBI's issue. They could probably break the phone's encryption with enough time and resources, they just want Apple to make it easier and faster)

Breaking everyone's security all at once, though, that's worth a lot.
Average means I'm better than half of you.
Nyxisto
Profile Joined August 2010
Germany6287 Posts
Last Edited: 2016-02-18 20:37:01
February 18 2016 20:35 GMT
#59220
On February 19 2016 05:33 oneofthem wrote:
Show nested quote +
On February 19 2016 05:24 Nyxisto wrote:
I'd like to throw in that one of the heads of the Paris attacks was literally interviewed by ISIS self proclaimed 'lifestyle magazine' half a year before the attacks, so before the intelligence agencies try to hack phones they maybe should start browsing Facebook

the u.s. at least is refraining from watching social media due to civil rights concerns.


So they're not watching stuff people consciously put out in public but they demand to get access to private information? Is this bizarro world? I'm pretty sure the Boston marathon guys put stuff on their social media pages as well.
Prev 1 2959 2960 2961 2962 2963 10093 Next
Please log in or register to reply.
Live Events Refresh
WardiTV Summer Champion…
15:00
Open Qualifier #2
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Hui .180
UpATreeSC 162
BRAT_OK 150
StarCraft: Brood War
Calm 4204
Rain 3002
Shuttle 1485
Bisu 1482
Horang2 756
EffOrt 688
firebathero 545
Mini 480
ggaemo 410
Mong 360
[ Show more ]
Soulkey 191
Hyuk 185
Barracks 114
hero 110
TY 103
Dewaltoss 84
PianO 71
Movie 56
sSak 50
Sharp 41
scan(afreeca) 39
sas.Sziky 38
Killer 37
JYJ29
Aegong 19
Yoon 16
Terrorterran 12
Stormgate
TKL 205
Dota 2
Gorgc6660
qojqva3919
Dendi2499
syndereN510
League of Legends
Reynor84
Counter-Strike
fl0m2509
flusha444
kRYSTAL_65
Super Smash Bros
hungrybox517
Other Games
KnowMe391
Lowko390
B2W.Neo269
Trikslyr62
QueenE47
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 22 non-featured ]
StarCraft 2
• davetesta43
• iHatsuTV 23
• Hinosc 15
• Dystopia_ 7
• Reevou 2
• sooper7s
• AfreecaTV YouTube
• Migwel
• LaughNgamezSOOP
• intothetv
• IndyKCrew
• Kozan
StarCraft: Brood War
• HerbMon 1
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• C_a_k_e 3782
• masondota2682
• Shiphtur286
League of Legends
• Nemesis4961
• TFBlade1136
Other Games
• imaqtpie561
Upcoming Events
PiGosaur Monday
6h 36m
WardiTV Summer Champion…
17h 36m
Stormgate Nexus
20h 36m
uThermal 2v2 Circuit
22h 36m
The PondCast
1d 16h
WardiTV Summer Champion…
1d 17h
Replay Cast
2 days
LiuLi Cup
2 days
uThermal 2v2 Circuit
2 days
RSL Revival
3 days
[ Show More ]
RSL Revival
3 days
uThermal 2v2 Circuit
3 days
CSO Cup
3 days
Sparkling Tuna Cup
4 days
uThermal 2v2 Circuit
4 days
Wardi Open
5 days
RotterdaM Event
5 days
RSL Revival
6 days
Liquipedia Results

Completed

ASL Season 20: Qualifier #2
FEL Cracow 2025
CC Div. A S7

Ongoing

Copa Latinoamericana 4
Jiahua Invitational
BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Qualifiers
HCC Europe
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
BLAST.tv Austin Major 2025
ESL Impact League Season 7
IEM Dallas 2025

Upcoming

ASL Season 20
CSLPRO Chat StarLAN 3
BSL Season 21
BSL 21 Team A
RSL Revival: Season 2
Maestros of the Game
SEL Season 2 Championship
WardiTV Summer 2025
uThermal 2v2 Main Event
Thunderpick World Champ.
MESA Nomadic Masters Fall
CS Asia Championships 2025
Roobet Cup 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.