Page 3 of 7 FirstFirst 1234567 LastLast
Results 41 to 60 of 131

Thread: Should Apple help government hack into the phone of dead terrorist?

  1. #41
    100% Organic MumblesBadly's Avatar
    Reputation
    94
    Join Date
    Jun 2015
    Location
    In the many threads of this forum
    Posts
    9,416
    Load Metric
    107171228
    Quote Originally Posted by sonatine View Post
    Quote Originally Posted by big dick View Post
    Fuck no. Funny all the right wing freedon fighters think apple should. I hate terrorist/radical muslims as much as the next guy but no fucking way should apple give in here.Dickhead Bush and his crew already passed the "patriot act" and we all know how that is working out.Redlight cameras, tollway passes, gps on the phones... let's be sure to let the govt know every little thing we do.

    This is the naked face of a national security issue, and national security trumps privacy and has since the literal dawn of nations.

    Further more the phone belongs to the employer and the employer has green lit breaking in.

    I mean honestly this isnt Sheriff Roscoe P Coltrane asking for access, its the FBI.

    And Im sorry but the more I read, the more this seems to be about Apple's stock price / brand / reputation than any sense of social responsibility.
    Name:  image.jpeg
Views: 493
Size:  41.2 KB
    _____________________________________________
    Quote Originally Posted by Dan Druff View Post
    I actually hope this [second impeachment] succeeds, because I want Trump put down politically like a sick, 14-year-old dog. ... I don't want him complicating the 2024 primary season. I just want him done.
    Quote Originally Posted by Dan Druff View Post
    Were Republicans cowardly or unethical not to go along with [convicting Trump in the second impeachment Senate trial]? No. The smart move was to reject it.

  2. #42
    Plutonium sonatine's Avatar
    Reputation
    7687
    Join Date
    Mar 2012
    Posts
    36,493
    Load Metric
    107171228
    408mumbles putting in work today.
    "Birds born in a cage think flying is an illness." - Alejandro Jodorowsky

    "America is not so much a nightmare as a non-dream. The American non-dream is precisely a move to wipe the dream out of existence. The dream is a spontaneous happening and therefore dangerous to a control system set up by the non-dreamers." -- William S. Burroughs

  3. #43
    Gold
    Reputation
    625
    Join Date
    Mar 2012
    Posts
    1,123
    Load Metric
    107171228
    Quote Originally Posted by sonatine View Post
    408mumbles putting in work today.
    Lannister dupe

     
    Comments
      
      Lannister: Used to be funny. Just a faggot now.

  4. #44
    Gold Charham's Avatar
    Reputation
    113
    Join Date
    May 2012
    Posts
    1,066
    Load Metric
    107171228
    On a separate note , it continues to bother me that criminals can steal a phone (happens all day every day in Chicago) and then are able to turn the phone into cash. Apple so worried about protecting my code , how about go a lot further then and make sure nobody can reset my phone then so that every crackhead isn't eyeing it for a quick grab and cash.

  5. #45
    Gold Charham's Avatar
    Reputation
    113
    Join Date
    May 2012
    Posts
    1,066
    Load Metric
    107171228
    Apple has apparently allowed access 70 times previously. http://www.zerohedge.com/news/2016-0...-feds-70-times

  6. #46
    100% Organic MumblesBadly's Avatar
    Reputation
    94
    Join Date
    Jun 2015
    Location
    In the many threads of this forum
    Posts
    9,416
    Load Metric
    107171228
    Quote Originally Posted by sonatine View Post
    408mumbles putting in work today.
    "National security" is the go-to issue to trample on our rights. And the FBI isn't so innocent. In the lead-up to the Iraq War, it went to the trouble of investigating a ladies' book club who had in some social media outlets express concern about the merit of going to war against Iraq. They were as much of a security threat as a bag of potatoes.
    _____________________________________________
    Quote Originally Posted by Dan Druff View Post
    I actually hope this [second impeachment] succeeds, because I want Trump put down politically like a sick, 14-year-old dog. ... I don't want him complicating the 2024 primary season. I just want him done.
    Quote Originally Posted by Dan Druff View Post
    Were Republicans cowardly or unethical not to go along with [convicting Trump in the second impeachment Senate trial]? No. The smart move was to reject it.

  7. #47
    Plutonium sonatine's Avatar
    Reputation
    7687
    Join Date
    Mar 2012
    Posts
    36,493
    Load Metric
    107171228
    Quote Originally Posted by MumblesBadly View Post
    Quote Originally Posted by sonatine View Post
    408mumbles putting in work today.
    "National security" is the go-to issue to trample on our rights. And the FBI isn't so innocent. In the lead-up to the Iraq War, it went to the trouble of investigating a ladies' book club who had in some social media outlets express concern about the merit of going to war against Iraq. They were as much of a security threat as a bag of potatoes.

     
    "Birds born in a cage think flying is an illness." - Alejandro Jodorowsky

    "America is not so much a nightmare as a non-dream. The American non-dream is precisely a move to wipe the dream out of existence. The dream is a spontaneous happening and therefore dangerous to a control system set up by the non-dreamers." -- William S. Burroughs

  8. #48
    Plutonium big dick's Avatar
    Reputation
    1319
    Join Date
    Feb 2013
    Location
    fuck krypt
    Posts
    11,738
    Load Metric
    107171228
    heil hitler

  9. #49
    Diamond Hockey Guy's Avatar
    Reputation
    1234
    Join Date
    Mar 2012
    Location
    Canada
    Posts
    7,629
    Load Metric
    107171228
    Quote Originally Posted by MumblesBadly View Post
    Quote Originally Posted by sonatine View Post
    408mumbles putting in work today.
    "National security" is the go-to issue to trample on our rights. And the FBI isn't so innocent. In the lead-up to the Iraq War, it went to the trouble of investigating a ladies' book club who had in some social media outlets express concern about the merit of going to war against Iraq. They were as much of a security threat as a bag of potatoes.
    Wasn't this from the Michael Moore documentary Fahrenheit 911?
    (•_•) ..
    ∫\ \___( •_•)
    _∫∫ _∫∫ɯ \ \

    Quote Originally Posted by Hockey Guy
    I'd say good luck in the freeroll but I'm pretty sure you'll go on a bender to self-sabotage yourself & miss it completely or use it as the excuse of why you didn't cash.

  10. #50
    Photoballer 4Dragons's Avatar
    Reputation
    2687
    Join Date
    Apr 2012
    Location
    Detroit
    Posts
    10,648
    Load Metric
    107171228
    Name:  32ylt.jpg
Views: 457
Size:  26.4 KB

  11. #51
    Bronze Buck Nasty's Avatar
    Reputation
    75
    Join Date
    Aug 2012
    Posts
    281
    Load Metric
    107171228
    Quote Originally Posted by Dan Druff View Post
    I'm not understanding something here.

    There are SO many ways for the government AND private companies to spy on us.
    Yes, and that's not a good thing and it doesn't make it ok to just add one more. We should be rolling back ways we can be spied on not adding to them.

  12. #52
    Plutonium sonatine's Avatar
    Reputation
    7687
    Join Date
    Mar 2012
    Posts
    36,493
    Load Metric
    107171228
    Quote Originally Posted by Buck Nasty View Post
    Quote Originally Posted by Dan Druff View Post
    I'm not understanding something here.

    There are SO many ways for the government AND private companies to spy on us.
    Yes, and that's not a good thing and it doesn't make it ok to just add one more. We should be rolling back ways we can be spied on not adding to them.

    And then someone sarin bombs a subway or hijacks another jet and suddenly the flyover states demand invisible walls on houses and detention camps for everyone with beards, braids, or bad attitudes.

    Tell you what; you put all those genies back in their bottles and *then* you can start making blanket statements about who can spy on who.

     
    Comments
      
      Lannister: cried and said you was leaving
    "Birds born in a cage think flying is an illness." - Alejandro Jodorowsky

    "America is not so much a nightmare as a non-dream. The American non-dream is precisely a move to wipe the dream out of existence. The dream is a spontaneous happening and therefore dangerous to a control system set up by the non-dreamers." -- William S. Burroughs

  13. #53
    Photoballer 4Dragons's Avatar
    Reputation
    2687
    Join Date
    Apr 2012
    Location
    Detroit
    Posts
    10,648
    Load Metric
    107171228
    Can somebody help me out if anyone has touched on this point?

    So this guy was a terrorist right? OK, and he's dead..? OK, now the phone in question wasn't his, but belonged to his employer,,,and,,, the employer gave permission to inspect the phone, riiiight?

    So what's the rumpus?

    Is this Apple grandstanding for public appeal or are they just saying, no, you hack the damn phone, we don't want to be bothered? I keep hearing that maybe they actually can't hack the fucking thing. Like it's 10 tries and you're done, no more data?

  14. #54
    Plutonium sonatine's Avatar
    Reputation
    7687
    Join Date
    Mar 2012
    Posts
    36,493
    Load Metric
    107171228
    Quote Originally Posted by 4Dragons View Post
    Can somebody help me out if anyone has touched on this point?

    So this guy was a terrorist right? OK, and he's dead..? OK, now the phone in question wasn't his, but belonged to his employer,,,and,,, the employer gave permission to inspect the phone, riiiight?

    So what's the rumpus?

    Is this Apple grandstanding for public appeal or are they just saying, no, you hack the damn phone, we don't want to be bothered? I keep hearing that maybe they actually can't hack the fucking thing. Like it's 10 tries and you're done, no more data?

    I just read a compelling argument that apple _does_ have a key that would allow the data to be trivially decrypted.

    So, again, this is sounding more and more like Apple just trying to brand themselves as anti-authoritarian. Or the FBI wants them to act like they refuse so skells get a false sense of security since the FBI knows perfectly well how to decrypt iPhone data.

    Btw McAffee just threw his hat in the ring and said he would decrypt the fucking phone for free.
    "Birds born in a cage think flying is an illness." - Alejandro Jodorowsky

    "America is not so much a nightmare as a non-dream. The American non-dream is precisely a move to wipe the dream out of existence. The dream is a spontaneous happening and therefore dangerous to a control system set up by the non-dreamers." -- William S. Burroughs

  15. #55
    Photoballer 4Dragons's Avatar
    Reputation
    2687
    Join Date
    Apr 2012
    Location
    Detroit
    Posts
    10,648
    Load Metric
    107171228
    Quote Originally Posted by sonatine View Post
    Quote Originally Posted by 4Dragons View Post
    Can somebody help me out if anyone has touched on this point?

    So this guy was a terrorist right? OK, and he's dead..? OK, now the phone in question wasn't his, but belonged to his employer,,,and,,, the employer gave permission to inspect the phone, riiiight?

    So what's the rumpus?

    Is this Apple grandstanding for public appeal or are they just saying, no, you hack the damn phone, we don't want to be bothered? I keep hearing that maybe they actually can't hack the fucking thing. Like it's 10 tries and you're done, no more data?

    I just read a compelling argument that apple _does_ have a key that would allow the data to be trivially decrypted.

    So, again, this is sounding more and more like Apple just trying to brand themselves as anti-authoritarian. Or the FBI wants them to act like they refuse so skells get a false sense of security since the FBI knows perfectly well how to decrypt iPhone data.

    Btw McAffee just threw his hat in the ring and said he would decrypt the fucking phone for free.

    Just odd to me that Apple would take THIS case to grandstand. I mean if you have a 'no doubt about it' terrorist, that phone most likely has not only relevant but very time sensitive data that could be used to go after anyone he was in contact with. That's data that quickly becomes useless when those involved find out that this dick ate it. I mean I get it if it were some wretch that had dubious evidence against him and Apple wanted to white knight for him, but fuck. .this guy?

  16. #56
    Platinum
    Reputation
    424
    Join Date
    Mar 2012
    Posts
    4,214
    Load Metric
    107171228
    No clue where Tine is getting his info but most of it has been wrong. Apple DOES NOT have the ability to get around the encryption right now, the FBI wants them to develop a way. Apple has said it will take them 5 years. So while "LOLZ Apple can do anything with their own phone Apple = God" is nice and all, that isn't really the case at all.

    https://www.yahoo.com/tech/judge-say...023354352.html

    The judge ruled Apple had to provide technical help, which includes removing the limit on the number of passwords one can enter on the iPhone and bypassing the device's auto-erase function. The order also says the company could be asked to write custom software to do so if it does not have the current ability to bypass those features. Apple has five days to respond to whether the order would be "unreasonably burdensome." The company was not immediately available for comment.

    It's unclear what Apple may be able to do here considering the company has said in the past that 90 percent of devices running iOS 8 or higher cannot be forcibly unlocked. The company stopped storing encryption keys after that version of its mobile OS was released in September 2014. Even if Apple removes the password limit and auto-erase function, it would still take standard decryption software more than five years to crack the six-digit passcode, according to The Washington Post. The only timely way for the FBI to crack the code on Farook's iPhone, which is running iOS 9, is with a supercomputer and the iPhone's hardware key. Apple says it does not keep a copy of the key.
    https://www.washingtonpost.com/world...f99_story.html

    "The Silicon Valley giant has steadfastly maintained that it is unable to unlock its newer iPhones for law enforcement, even when officers obtain a warrant, because they are engineered in such a way that Apple does not hold the decryption key. Only the phone’s user — or someone who knew the password — would be able to unlock the phone.

    The FBI’s efforts may show how impervious the new technology is to efforts to circumvent it. According to industry officials, Apple cannot unilaterally dismantle or override the 10-tries-and-wipe feature. Only the user or person who controls the phone’s settings can do so.

    However, U.S. Magistrate Judge Sheri Pym said in her order, Apple can write software that can bypass the feature. Federal prosecutors stated in a memo accompanying the order that the software would affect only the seized phone.
    So let's get this straight....Apple CANNOT do this right now. This isn't the company saying this, it is people who know a hell of a lot more shit about the encryption than you or I. THEY are the ones saying it is fucking impossible. The FBI wants Apple to take as much time (5 years) to write a new fucking way around the shit (but only for that phone!!).

    But have no fear because if you have an iphone you can still protect yourself from any prying eyes, just make a sick long pass word.....

    https://theintercept.com/2016/02/18/...-ios-backdoor/
    YESTERDAY, APPLE CEO TIM COOK published an open letter opposing a court order to build the FBI a “backdoor” for the iPhone.

    Cook wrote that the backdoor, which removes limitations on how often an attacker can incorrectly guess an iPhone passcode, would set a dangerous precedent and “would have the potential to unlock any iPhone in someone’s physical possession,” even though in this instance, the FBI is seeking to unlock a single iPhone belonging to one of the killers in a 14-victim mass shooting spree in San Bernardino, California, in December.

    It’s true that ordering Apple to develop the backdoor will fundamentally undermine iPhone security, as Cook and other digital security advocates have argued. But it’s possible for individual iPhone users to protect themselves from government snooping by setting strong passcodes on their phones — passcodes the FBI would not be able to unlock even if it gets its iPhone backdoor.

    The technical details of how the iPhone encrypts data, and how the FBI might circumvent this protection, are complex and convoluted, and are being thoroughly explored elsewhere on the internet. What I’m going to focus on here is how ordinary iPhone users can protect themselves.

    The short version: If you’re worried about governments trying to access your phone, set your iPhone up with a random, 11-digit numeric passcode. What follows is an explanation of why that will protect you and how to actually do it.

    If it sounds outlandish to worry about government agents trying to crack into your phone, consider that when you travel internationally, agents at the airport or other border crossings can seize, search, and temporarily retain your digital devices — even without any grounds for suspicion. And while a local police officer can’t search your iPhone without a warrant, cops have used their own digital devices to get search warrants within 15 minutes, as a Supreme Court opinion recently noted.

    The most obvious way to try and crack into your iPhone, and what the FBI is trying to do in the San Bernardino case, is to simply run through every possible passcode until the correct one is discovered and the phone is unlocked. This is known as a “brute force” attack.

    For example, let’s say you set a six-digit passcode on your iPhone. There are 10 possibilities for each digit in a numbers-based passcode, and so there are 106, or 1 million, possible combinations for a six-digit passcode as a whole. It is trivial for a computer to generate all of these possible codes. The difficulty comes in trying to test them.

    One obstacle to testing all possible passcodes is that the iPhone intentionally slows down after you guess wrong a few times. An attacker can try four incorrect passcodes before she’s forced to wait one minute. If she continues to guess wrong, the time delay increases to five minutes, 15 minutes, and finally one hour. There’s even a setting to erase all data on the iPhone after 10 wrong guesses.

    This is where the FBI’s requested backdoor comes into play. The FBI is demanding that Apple create a special version of the iPhone’s operating system, iOS, that removes the time delays and ignores the data erasure setting. The FBI could install this malicious software on the San Bernardino killer’s iPhone, brute force the passcode, unlock the phone, and access all of its data. And that process could hypothetically be repeated on anyone else’s iPhone.

    (There’s also speculation that the government could make Apple alter the operation of a piece of iPhone hardware known as the Secure Enclave; for the purposes of this article, I assume the protections offered by this hardware, which would slow an attacker down even more, are not in place.)

    Even if the FBI gets its way and can clear away iPhone safeguards against passcode guessing, it faces another obstacle, one that should help keep it from cracking passcodes of, say, 11 digits: It can only test potential passcodes for your iPhone using the iPhone itself; the FBI can’t use a supercomputer or a cluster of iPhones to speed up the guessing process. That’s because iPhone models, at least as far back as May 2012, have come with a Unique ID (UID) embedded in the device hardware. Each iPhone has a different UID fused to the phone, and, by design, no one can read it and copy it to another computer. The iPhone can only be unlocked when the owner’s passcode is combined with the the UID to derive an encryption key.

    So the FBI is stuck using your iPhone to test passcodes. And it turns out that your iPhone is kind of slow at that: iPhones intentionally encrypt data in such a way that they must spend about 80 milliseconds doing the math needed to test a passcode, according to Apple. That limits them to testing 12.5 passcode guesses per second, which means that guessing a six-digit passcode would take, at most, just over 22 hours.

    You can calculate the time for that task simply by dividing the 1 million possible six-digit passcodes by 12.5 per seconds. That’s 80,000 seconds, or 1,333 minutes, or 22 hours. But the attacker doesn’t have to try each passcode; she can stop when she finds one that successfully unlocks the device. On average, it will only take 11 hours for that to happen.

    But the FBI would be happy to spend mere hours cracking your iPhone. What if you use a longer passcode? Here’s how long the FBI would need:

    seven-digit passcodes will take up to 9.2 days, and on average 4.6 days, to crack
    eight-digit passcodes will take up to three months, and on average 46 days, to crack
    nine-digit passcodes will take up to 2.5 years, and on average 1.2 years, to crack
    10-digit passcodes will take up to 25 years, and on average 12.6 years, to crack
    11-digit passcodes will take up to 253 years, and on average 127 years, to crack
    12-digit passcodes will take up to 2,536 years, and on average 1,268 years, to crack
    13-digit passcodes will take up to 25,367 years, and on average 12,683 years, to crack

    It’s important to note that these estimates only apply to truly random passcodes. If you choose a passcode by stringing together dates, phone numbers, social security numbers, or anything else that’s at all predictable, the attacker might try guessing those first, and might crack your 11-digit passcode in a very short amount of time. So make sure your passcode is random, even if this means it takes extra time to memorize it. (Memorizing that many digits might seem daunting, but if you’re older than, say, 29, there was probably a time when you memorized several phone numbers that you dialed on a regular basis.)

    Nerd tip: If you’re using a Mac or Linux, you can securely generate a random 11-digit passcode by opening the Terminal app and typing this command:

    python -c 'from random import SystemRandom as r; print(r().randint(0,10**11-1))'

    It’s also important to note that we’re assuming the FBI, or some other government agency, has not found a flaw in Apple’s security architecture that would allow them to test passcodes on their own computers or at a rate faster than 80 milliseconds per passcode.

    Once you’ve created a new 11-digit passcode, you can start using it by opening the Settings app, selecting “Touch ID & Passcode,” and entering your old passcode if prompted. Then, if you have an existing passcode, select “Change passcode” and enter your old passcode. If you do not have an existing passcode, and are setting one for the first time, click “Turn passcode on.”

    Then, in all cases, click “Passcode options,” select “Custom numeric code,” and then enter your new passcode.

    Here are a few final tips to make this long-passcode thing work better:

    Within the “Touch ID & Passcode” settings screen, make sure to turn on the Erase Data setting to erase all data on your iPhone after 10 failed passcode attempts.

    Make sure you don’t forget your passcode, or you’ll lose access to all of the data on your iPhone.

    Don’t use Touch ID to unlock your phone. Your attacker doesn’t need to guess your passcode if she can push your finger onto the home button to unlock it instead. (At least one court has ruled that while the police cannot compel you to disclose your passcode, they can compel you to use your fingerprint to unlock your smartphone.)

    Don’t use iCloud backups. Your attacker doesn’t need to guess your passcode if she can get a copy of all the same data from Apple’s server, where it’s no longer protected by your passcode.

    Do make local backups to your computer using iTunes, especially if you are worried about forgetting your iPhone passcode. You can encrypt the backups, too.

    By choosing a strong passcode, the FBI shouldn’t be able to unlock your encrypted phone, even if it installs a backdoored version of iOS on it. Not unless it has hundreds of years to spare.

  17. #57
    Plutonium Sanlmar's Avatar
    Reputation
    4704
    Join Date
    Mar 2013
    Posts
    23,171
    Load Metric
    107171228
    My knee jerk "keep dat guvmint outta yo bidness" reaction has been tempered somewhat.

    You wanna bring the physical phone in with a warrant and a blank purchase order to Apple - then I'm good.

    Could be a right fine piece of incremental business for Apple. I hope they fuck the Feds up the ass. Keep up the storyline about how damn hard this is.

    I don't see this as a hipster, anti establishment branding thing so much as an opportunity to grab some cash and keep the Feds at arms length.

    If the Feds wanted extra cheese on TheSparten's Friday Special he would first tell them how hard this is - then figure a government sized price. This puts a smile on my face.

    If you aren't banging the Feds out of extras somehow you are prolly just earning a living.

    I know ultimately it's my money but I'd rather see Tim Cook get a bonus than see some corn farmer in Iowa pocket his ethanol subsidy or similar dumbfuck Federal stupidity.

    That Druff's argument helped change my opinion leads me to question the strength of my character.

  18. #58
    Plutonium Sanlmar's Avatar
    Reputation
    4704
    Join Date
    Mar 2013
    Posts
    23,171
    Load Metric
    107171228
    McAfee coming up on CNBC.

    Should be good lulz. Dude has lost his mind.

  19. #59
    Plutonium sonatine's Avatar
    Reputation
    7687
    Join Date
    Mar 2012
    Posts
    36,493
    Load Metric
    107171228
    Quote Originally Posted by NaturalBornHustler View Post
    No clue where Tine is getting his info but most of it has been wrong. Apple DOES NOT have the ability to get around the encryption right now, the FBI wants them to develop a way. Apple has said it will take them 5 years. So while "LOLZ Apple can do anything with their own phone Apple = God" is nice and all, that isn't really the case at all.

    https://www.yahoo.com/tech/judge-say...023354352.html



    https://www.washingtonpost.com/world...f99_story.html

    "The Silicon Valley giant has steadfastly maintained that it is unable to unlock its newer iPhones for law enforcement, even when officers obtain a warrant, because they are engineered in such a way that Apple does not hold the decryption key. Only the phone’s user — or someone who knew the password — would be able to unlock the phone.

    The FBI’s efforts may show how impervious the new technology is to efforts to circumvent it. According to industry officials, Apple cannot unilaterally dismantle or override the 10-tries-and-wipe feature. Only the user or person who controls the phone’s settings can do so.

    However, U.S. Magistrate Judge Sheri Pym said in her order, Apple can write software that can bypass the feature. Federal prosecutors stated in a memo accompanying the order that the software would affect only the seized phone.
    So let's get this straight....Apple CANNOT do this right now. This isn't the company saying this, it is people who know a hell of a lot more shit about the encryption than you or I. THEY are the ones saying it is fucking impossible. The FBI wants Apple to take as much time (5 years) to write a new fucking way around the shit (but only for that phone!!).

    But have no fear because if you have an iphone you can still protect yourself from any prying eyes, just make a sick long pass word.....

    https://theintercept.com/2016/02/18/...-ios-backdoor/
    YESTERDAY, APPLE CEO TIM COOK published an open letter opposing a court order to build the FBI a “backdoor” for the iPhone.

    Cook wrote that the backdoor, which removes limitations on how often an attacker can incorrectly guess an iPhone passcode, would set a dangerous precedent and “would have the potential to unlock any iPhone in someone’s physical possession,” even though in this instance, the FBI is seeking to unlock a single iPhone belonging to one of the killers in a 14-victim mass shooting spree in San Bernardino, California, in December.

    It’s true that ordering Apple to develop the backdoor will fundamentally undermine iPhone security, as Cook and other digital security advocates have argued. But it’s possible for individual iPhone users to protect themselves from government snooping by setting strong passcodes on their phones — passcodes the FBI would not be able to unlock even if it gets its iPhone backdoor.

    The technical details of how the iPhone encrypts data, and how the FBI might circumvent this protection, are complex and convoluted, and are being thoroughly explored elsewhere on the internet. What I’m going to focus on here is how ordinary iPhone users can protect themselves.

    The short version: If you’re worried about governments trying to access your phone, set your iPhone up with a random, 11-digit numeric passcode. What follows is an explanation of why that will protect you and how to actually do it.

    If it sounds outlandish to worry about government agents trying to crack into your phone, consider that when you travel internationally, agents at the airport or other border crossings can seize, search, and temporarily retain your digital devices — even without any grounds for suspicion. And while a local police officer can’t search your iPhone without a warrant, cops have used their own digital devices to get search warrants within 15 minutes, as a Supreme Court opinion recently noted.

    The most obvious way to try and crack into your iPhone, and what the FBI is trying to do in the San Bernardino case, is to simply run through every possible passcode until the correct one is discovered and the phone is unlocked. This is known as a “brute force” attack.

    For example, let’s say you set a six-digit passcode on your iPhone. There are 10 possibilities for each digit in a numbers-based passcode, and so there are 106, or 1 million, possible combinations for a six-digit passcode as a whole. It is trivial for a computer to generate all of these possible codes. The difficulty comes in trying to test them.

    One obstacle to testing all possible passcodes is that the iPhone intentionally slows down after you guess wrong a few times. An attacker can try four incorrect passcodes before she’s forced to wait one minute. If she continues to guess wrong, the time delay increases to five minutes, 15 minutes, and finally one hour. There’s even a setting to erase all data on the iPhone after 10 wrong guesses.

    This is where the FBI’s requested backdoor comes into play. The FBI is demanding that Apple create a special version of the iPhone’s operating system, iOS, that removes the time delays and ignores the data erasure setting. The FBI could install this malicious software on the San Bernardino killer’s iPhone, brute force the passcode, unlock the phone, and access all of its data. And that process could hypothetically be repeated on anyone else’s iPhone.

    (There’s also speculation that the government could make Apple alter the operation of a piece of iPhone hardware known as the Secure Enclave; for the purposes of this article, I assume the protections offered by this hardware, which would slow an attacker down even more, are not in place.)

    Even if the FBI gets its way and can clear away iPhone safeguards against passcode guessing, it faces another obstacle, one that should help keep it from cracking passcodes of, say, 11 digits: It can only test potential passcodes for your iPhone using the iPhone itself; the FBI can’t use a supercomputer or a cluster of iPhones to speed up the guessing process. That’s because iPhone models, at least as far back as May 2012, have come with a Unique ID (UID) embedded in the device hardware. Each iPhone has a different UID fused to the phone, and, by design, no one can read it and copy it to another computer. The iPhone can only be unlocked when the owner’s passcode is combined with the the UID to derive an encryption key.

    So the FBI is stuck using your iPhone to test passcodes. And it turns out that your iPhone is kind of slow at that: iPhones intentionally encrypt data in such a way that they must spend about 80 milliseconds doing the math needed to test a passcode, according to Apple. That limits them to testing 12.5 passcode guesses per second, which means that guessing a six-digit passcode would take, at most, just over 22 hours.

    You can calculate the time for that task simply by dividing the 1 million possible six-digit passcodes by 12.5 per seconds. That’s 80,000 seconds, or 1,333 minutes, or 22 hours. But the attacker doesn’t have to try each passcode; she can stop when she finds one that successfully unlocks the device. On average, it will only take 11 hours for that to happen.

    But the FBI would be happy to spend mere hours cracking your iPhone. What if you use a longer passcode? Here’s how long the FBI would need:

    seven-digit passcodes will take up to 9.2 days, and on average 4.6 days, to crack
    eight-digit passcodes will take up to three months, and on average 46 days, to crack
    nine-digit passcodes will take up to 2.5 years, and on average 1.2 years, to crack
    10-digit passcodes will take up to 25 years, and on average 12.6 years, to crack
    11-digit passcodes will take up to 253 years, and on average 127 years, to crack
    12-digit passcodes will take up to 2,536 years, and on average 1,268 years, to crack
    13-digit passcodes will take up to 25,367 years, and on average 12,683 years, to crack

    It’s important to note that these estimates only apply to truly random passcodes. If you choose a passcode by stringing together dates, phone numbers, social security numbers, or anything else that’s at all predictable, the attacker might try guessing those first, and might crack your 11-digit passcode in a very short amount of time. So make sure your passcode is random, even if this means it takes extra time to memorize it. (Memorizing that many digits might seem daunting, but if you’re older than, say, 29, there was probably a time when you memorized several phone numbers that you dialed on a regular basis.)

    Nerd tip: If you’re using a Mac or Linux, you can securely generate a random 11-digit passcode by opening the Terminal app and typing this command:

    python -c 'from random import SystemRandom as r; print(r().randint(0,10**11-1))'

    It’s also important to note that we’re assuming the FBI, or some other government agency, has not found a flaw in Apple’s security architecture that would allow them to test passcodes on their own computers or at a rate faster than 80 milliseconds per passcode.

    Once you’ve created a new 11-digit passcode, you can start using it by opening the Settings app, selecting “Touch ID & Passcode,” and entering your old passcode if prompted. Then, if you have an existing passcode, select “Change passcode” and enter your old passcode. If you do not have an existing passcode, and are setting one for the first time, click “Turn passcode on.”

    Then, in all cases, click “Passcode options,” select “Custom numeric code,” and then enter your new passcode.

    Here are a few final tips to make this long-passcode thing work better:

    Within the “Touch ID & Passcode” settings screen, make sure to turn on the Erase Data setting to erase all data on your iPhone after 10 failed passcode attempts.

    Make sure you don’t forget your passcode, or you’ll lose access to all of the data on your iPhone.

    Don’t use Touch ID to unlock your phone. Your attacker doesn’t need to guess your passcode if she can push your finger onto the home button to unlock it instead. (At least one court has ruled that while the police cannot compel you to disclose your passcode, they can compel you to use your fingerprint to unlock your smartphone.)

    Don’t use iCloud backups. Your attacker doesn’t need to guess your passcode if she can get a copy of all the same data from Apple’s server, where it’s no longer protected by your passcode.

    Do make local backups to your computer using iTunes, especially if you are worried about forgetting your iPhone passcode. You can encrypt the backups, too.

    By choosing a strong passcode, the FBI shouldn’t be able to unlock your encrypted phone, even if it installs a backdoored version of iOS on it. Not unless it has hundreds of years to spare.


    The 'key' apple is holding is the ability to suppress the 80ms-between-PIN entries and the doomsday lockout. Sound familiar? Go back and read my earlier posts if not. Or just keep Mumblesposting, your call of course.

    Also no one is talking about parallelization across cloned hard drives and virtualized hardware as well, so all those passkey estimates are laughable at face value of course.
    "Birds born in a cage think flying is an illness." - Alejandro Jodorowsky

    "America is not so much a nightmare as a non-dream. The American non-dream is precisely a move to wipe the dream out of existence. The dream is a spontaneous happening and therefore dangerous to a control system set up by the non-dreamers." -- William S. Burroughs

  20. #60
    Plutonium Sanlmar's Avatar
    Reputation
    4704
    Join Date
    Mar 2013
    Posts
    23,171
    Load Metric
    107171228
    Trump just called for Apple boycott


    Sorry Druff. Lose $1500 or support Trump? Ouch

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Nelson Mandela. Really a terrorist or not?
    By son of lockman in forum Flying Stupidity
    Replies: 28
    Last Post: 10-24-2015, 02:03 PM
  2. How much of a terrorist are you?
    By Brittney Griner's Clit in forum Flying Stupidity
    Replies: 7
    Last Post: 10-22-2015, 03:40 PM
  3. possible terrorist attack at super bowl
    By mulva in forum Flying Stupidity
    Replies: 7
    Last Post: 02-01-2015, 02:35 PM
  4. City government is the most corrupt form of US government
    By Dan Druff in forum Flying Stupidity
    Replies: 1
    Last Post: 09-10-2012, 06:27 PM
  5. Replies: 4
    Last Post: 05-13-2012, 04:34 PM