-
Categories
-
Platforms
-
Content
lol. I think you are missing the point that stock android devices are pretty solid. Couple that with android's "Remote Wipe" and your stuff is pretty damned safe unless you decide to strip away the safety mechanisms yourself before-hand. (Which does usually trigger an e-fuse that causes a notice to be displayed in the initial boot screen of the device)That could be tricky i'm not into writing drivers
But for the purpose of recovering data, any old compatible rom i'm able to compile from source ...
Something that can not be done for iOS because it's closed source, so i guess the fbi probably has this covered already for android!
Remote Wipe xDThatIsWhyMyAndroidPasswordIsVeryVeryLong!
Unless Apple wants to deliberately be on the side of crime
How can you tell if encryption has been used for criminal activity, without bypassing the encryption?Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
The mod required is to the operating system. No one outside of Apple should have access to it, and, if it is like anyplace I have worked, only a limited number of programmers inside Apple would have access to it.Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
Do terrorists deserve privacy? I can see a need for a warrant, for sure. But I would like the FBI to have the tools to fight crime.Or respectful of people's right to privacy.
Or maintain their client base...
The mod required is to the operating system. No one outside of Apple should have access to it, and, if it is like anyplace I have worked, only a limited number of programmers inside Apple would have access to it.
Bob
Criminals do not get the same rights as others.
Make that ***convicted*** criminals. Note that in the US that is not a tautology.
ak
How can you tell if encryption has been used for criminal activity, without bypassing the encryption?
Depends what I'm talking to my mother about!If the meta data shows them calling known terrorists shouldn't that justify a warrant?
You don't need to encrypt a message to your mother.
Herschel, I see where you are coming from, but there is a balance between security and privacy.Unless Apple wants to deliberately be on the side of crime all they have to say is that using the encryption for criminal activity may wave rights to secrecy. Create the software!
Will it only be a matter of time before some unhappy Apple programmer takes the opportunity to do it himself?
How many programmers have this capability and access to source code?
You do realize they made a movie based on this right? Minority Report... and although they don't investigate 'tech' and 'trends' they still attempt to pre-emptively act. Would you want human beings to analyse your actions, or a computer program? And before you answer, keep in mind that google has accidentally classified a group of humans incorrectly as apes...A nice thought but we can't wait until after the bombing and convict the remains of the bomber. To protect the public we need to investigate and act before the crime.
No, but if he steals the loaf of bread I will pursue him for the rest of my life.And - a known terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?
ak
Herschel, I see where you are coming from, but there is a balance between security and privacy.
If you want absolute security, you have no privacy.
Where do you draw the line?
As far as Apple vs. the FBI is concerned, I would have hoped that the FBI would have the resources available to disassemble the device, clone the flash, the run aggressive techniques on the clones to decrypt it.
What the FBI wants is an 'easy button' to get into the iPhone, and if you don't see any problems with that then I suggest you go make a copy of all of your keys, and write down all of your user-names and passwords and drop them off at a local police depot.
Remember that the FBI, police, government, etc. are all Human beings just like you and me. What would make you trust an individual with an FBI job more than an individual working construction?
You do realize they made a movie based on this right? Minority Report... and although they don't investigate 'tech' and 'trends' they still attempt to pre-emptively act. Would you want human beings to analyse your actions, or a computer program? And before you answer, keep in mind that google has accidentally classified a group of humans incorrectly as apes...
A terrorist walks into a bar...
But seriously, folks...a terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?
And - a known terrorist walks into Kroger and buys bread. Can (not should) Kroger be prosecuted for supporting terrorism?
ak
I think you are confusing things here...The FBI should have the talent????
Now there is an idea. That little lady on NCIS does it all the time.
So many devices. So many programs. So many versions of each.
Does the industry need to be well regulated like the casino gaming industry? Before a product can be released the software needs to be authorized by the Gaming Commission. There are no secrets in programming in this industry.
There's a dangerous thought.
I think you are confusing things here...
The issue here isn't a code audit, it's installing a back-door. You do that in any machine in the gambling industry and heads will roll.
You should see the security in the gaming industry... using that is a horrible example of 'the right way to do things' when you compare the situation with Apple or other phone manufacturers.
To be honest, I would feel much much safer if the code was audited to the same scrutiny that the gaming industry is. We have far to many hacks, root-kits and virii in our Apple, Android, Windows, and *Nix devices.
I can see that you are arguing with emotion though, and there is no logical way to debate that.