flat assembler
Message board for the users of flat assembler.
![]() Goto page 1, 2 Next |
Author |
|
Walter
Argued with the girlfriend on this one. If it was just about giving government a binary dump of data, I'd say go for it. After all, we're dealing with terrorist activities here. But this one is much more complicated.
www.wired.com "But if you got a warrant, I guess you're gonna come in." Grateful Dead - Truckin' |
|||
![]() |
|
sinsi
Quote: What is actually being asked for here is that Apple write custom code that allows the FBI to perform a brute-force attack against the iPhone without triggering the "10 strikes and the phone is wiped" protection mechanism. http://www.theregister.co.uk/2016/02/17/why_tim_cook_is_wrong_a_privacy_advocates_view/ |
|||
![]() |
|
sleepsleep
one locked all his wealth,memories,etc in an unbreakable treasury chest,
come one person demand chest key from him because he needs something inside that chest, or he suspects this person stole something from him and locked it inside the chest, chest contains proof that could clear another convicted person, or stuff that could save thousand lives, or etc if i lend a handset from you to record a movie, the recorded mp4 is mine or yours? who own all the rubbishes on streets? police could force me to open my door because they suspect there are terrorists in my house, they do it with all my neighbours knew and watch, with me watching and recording, but police cannot and should not force housing developer to create a hidden door in every house so that they could enter through that door when they want to enter. i suggest, apple video tape, screen video, each police request to open an iphone and post them in youtube, i think such approach is nearer to available accepted laws. |
|||
![]() |
|
Walter
|
|||
![]() |
|
JohnFound
All this story for me simple show for the public. PR action of Apple. On the reality Apple probably shares the user data with the government, but wants this to be kept in secret.. And the secrecy of such collaboration is good for the government as well, because otherwise the people will start to control their conversations and the content of their phones.
For example, why not to simply desolder the flash chip from the phone and brute force it separately. This way the protection will not work anymore. |
|||
![]() |
|
revolution
JohnFound wrote: For example, why not to simply desolder the flash chip from the phone and brute force it separately. This way the protection will not work anymore. |
|||
![]() |
|
JohnFound
Well, I have close to none knowledge of ARM architecture. But I am sure there is something dirty behind the scene of this story. Everything is too melodramatic.
![]() |
|||
![]() |
|
revolution
JohnFound wrote: Well, I have close to none knowledge of ARM architecture. But I am sure there is something dirty behind the scene of this story. Everything is too melodramatic. |
|||
![]() |
|
YONG
McAfee Founder: I'll decrypt terrorists iPhone for free
https://www.youtube.com/watch?v=EWZ8Gi0DVP8 Wow, he said it can be done within three weeks! ![]() ![]() |
|||
![]() |
|
revolution
YONG wrote: McAfee Founder: I'll decrypt terrorists iPhone for free |
|||
![]() |
|
JohnFound
revolution wrote: He knows he will never be given the chance so he is quite safe to claim whatever he wants. Well, he always can demonstrate the technique with another iPhone and then will get his chance. ![]() _________________ Tox ID: 48C0321ADDB2FE5F644BB5E3D58B0D58C35E5BCBC81D7CD333633FEDF1047914A534256478D9 |
|||
![]() |
|
revolution
JohnFound wrote: Well, he always can demonstrate the technique with another iPhone and then will get his chance. ![]() |
|||
![]() |
|
JohnFound
Well, it can be made trustworthy. One way, or another. In addition, if he want to crack this terrorists phone, as a way to advertise his skills, it is better he can make it, or else will get the opposite effect.
|
|||
![]() |
|
YONG
revolution wrote: I think it is just a publicity stunt. He knows he will never be given the chance so he is quite safe to claim whatever he wants. ![]() |
|||
![]() |
|
YONG
Refer to:
http://money.cnn.com/2016/02/29/technology/judge-apple-feds/index.html?iid=obnetwork Quote: A federal magistrate-judge in New York City has ruled that the U.S. government can't force Apple to hack an iPhone to investigate a drug dealer. ![]() |
|||
![]() |
|
AsmGuru62
This discussion has an interesting remark:
the possibility of preventing a terrorist attack is not worth of all the possible issues for ordinal iPhone users, when their phones can get 'unlocked' - too much information is on the smart phones these days. http://www.therebel.media/fbi_san_bernardino_terrorists_to_bring_apple_and_microsoft |
|||
![]() |
|
YONG
It is over ... for the time being.
Refer to: http://money.cnn.com/2016/03/28/news/companies/fbi-apple-iphone-case-cracked/index.html ![]() |
|||
![]() |
|
Walter
The name of the new operating system:
GovOS ![]() |
|||
![]() |
|
ManOfSteel
What a fetid load of rubbish all this talk about "smartphone this", "encryption that". Blah!!!
There MAY be some proof on their phones/computers that MAY be locked/encrypted. MAYBE. But it's not like the crime is being committed in cyberland. And it's not like the people committing the crime aren't already known to many security agencies around the world. These people high up in the idiocy, err, I mean intelligence community really think the whole world is made of complete morons who can't see how incompetent they've become at doing their job, who can't see the whole situation overwhelms them, who can't see they don't even grasp the ABC of that kind of terrorism. If only we could have an encryption-free world, if only we could eavesdrop on all your kinky conversations, if only we could watch your every movement through the CCTV peephole from the cradle to the grave. Then we would all be saved and enjoy a long life in the land of milk and honey where planes don't get hijacked and come crashing into buildings and where bombs don't go off in train stations. If only ... |
|||
![]() |
|
Goto page 1, 2 Next < Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2019, Tomasz Grysztar.
Powered by rwasa.