11 thoughts on “When Satire And Documentary Collide

  1. Speaking of satire, documentary and flaunting law and a bit of a threadjack – sorry. Apple refusing to unlock terrorist’s phone even after a subpoena. I wonder what they are trying to protect – it certainly ain’t their customer’s information which they sell to a highest bidder. Also, showcases goobernment’s pathetic IT skills not being able to break into an iphone. A 5 sec search of interwebs showed tons of hits (with videos yet) on how to do it. These are the people we trust to protect us from harm? Certainly a case for a new libturd SCJ on the take from Apple, Google, Facebook, Twitter and Microsoft who only watches MSNBC to double down on protecting customer privacy, even in criminal cases, never mind criminal cases of the terrorist kind. The world had gone mad!

  2. jpa what apple is protecting but won’t say is that the key they would use to decrypt the phone would be the same key to decrypt all iphones which would give the government access to every encrypted message on any iphone the government wants to search – its the “backdoor” Obama’s justice department has been whinging about for the past few years

  3. If you haven’t broken any laws they you shouldn’t object to the Federal Government looking at every single document you own. /sarcasm.

  4. Sounds to me they are two different issues – Feds need to get into a specific phone and asking Apple to create a backdoor for all future phones so they can do it easier. I fully support the former and absolutely reject the latter. But I also do not buy Apple’s assertion they have done everything to help with the former if the phone is still locked. It is hard to believe Apple cannot decrypt a specific phone and hand it over without supplying the key itself.

    I also do not buy Cook’s self-righteousness. With “probable cause”, Gov’t should be able to use every tool at their disposal to go after the perps, whoever they are. And that means ordering Apple to “spy” on their customers on a case by case basis, not that Apple does not do it right now en-masse and not for security but for profit. Problem is, no, I do not trust current Gov’t to use this power. Not with their track record of taking cyber security seriously – Obamacare, Shrillery’s server, Snowden, hacks of DHS personnel files, etc.

  5. There are dozens of encryption apps out there for all brands of cell phones. A friend told me they work.

  6. Actually, from what I understand, the government wants to brute-force the password. It’s not exactly that hard to do given how resistant people are to typing in 20 digit numbers.

    But what Apple did was create a 10 tries and you’ve wiped your iPhone system to get around the problem. That’s nice for security, bad for brute forcing the system.

    What the gov’t is asking Apple to do is to bypass that security for them. Honestly, I’m not exactly sure why they’re asking Apple to do that since they could do it themselves if they wanted. Tap into the flash and image everything there directly, then set up an emulator using that memory to allow brute forcing, for example. But by asking for Apple to do it, they’re trying to get off cheap and with minimal development issue, since Apple already has all the technical documentation and knows how to build those emulators (they’re typically used during development). But they’re also sending a message that if you try and get your users privacy, the government is going to make you regret that with all this extra work.

  7. JPA, suppose you got Apple to back door their system. The government would want the details on the back door, true? And how well would the government protect that data? As well as they protect the personnel records of their spies?

    And I think you mistake where Apple makes their money and how they do their spying. They don’t spy on their users phones. In fact, the system they set up makes their phones relatively secure. What they have done is allow themselves to “spy” on transactions their users make with them (iTunes purchases, etc), but they’ve been pretty good on leaving most functions secure. Contrast that with Google and Android, where everything you do on the Internet is monitored and reported back into Google’s maw. (Scan what gets reported back into Google with Chromium and you’ll be dismayed at the stream of data they get.)

    I detest Apple and don’t get an iPhone mainly because of iTunes and their attitude on limited hardware support (only 6 years late on supplying a reasonable size screen), but their overall attitude towards the user and privacy of most transactions is far, far better than those of Google and Microsoft (with the privacy horror that is Win10).

  8. nerdbert++
    ” privacy horror that is Win10″
    btw if you’re running Win 10 and haven’t used Spybot Anti-Beacon do so immediately, it turns off most of the privacy slurping software that is set on by Default in Win 10. Remember too that MS turns a lot of the stuff back on every time it pushes an update so you will have to run the Anti-Beacon program each time there’s a update… also remember Cortana is essentially the mother of all keyloggers.

  9. “But what Apple did was create a 10 tries and you’ve wiped your iPhone system to get around the problem. ”
    So what is stopping the government from making a million images of the IPhone memory and hacking each one with a sliced brute force attack?
    That’s what I would do.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.