Main Menu |
Most Favorited Images |
Recently Uploaded Images |
Most Liked Images |
Top Reviewers |
cockalatte |
649 |
MoneyManMatt |
490 |
Still Looking |
399 |
samcruz |
399 |
Jon Bon |
397 |
Harley Diablo |
377 |
honest_abe |
362 |
DFW_Ladies_Man |
313 |
Chung Tran |
288 |
lupegarland |
287 |
nicemusic |
285 |
Starscream66 |
281 |
You&Me |
281 |
George Spelvin |
270 |
sharkman29 |
256 |
|
Top Posters |
DallasRain | 70812 | biomed1 | 63467 | Yssup Rider | 61114 | gman44 | 53307 | LexusLover | 51038 | offshoredrilling | 48751 | WTF | 48267 | pyramider | 46370 | bambino | 42980 | The_Waco_Kid | 37283 | CryptKicker | 37225 | Mokoa | 36497 | Chung Tran | 36100 | Still Looking | 35944 | Mojojo | 33117 |
|
|
02-19-2016, 06:55 PM
|
#61
|
Account Disabled
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
|
Apple now claiming the password had been changed after it was seized by authorities.
|
|
Quote
| 1 user liked this post
|
02-19-2016, 07:53 PM
|
#62
|
Valued Poster
Join Date: Jan 4, 2010
Location: Stillwater, OK
Posts: 3,631
|
Quote:
Originally Posted by i'va biggen
Apple now claiming the password had been changed after it was seized by authorities.
|
you got a link? or just more babble babble
|
|
Quote
| 1 user liked this post
|
02-19-2016, 09:21 PM
|
#63
|
Account Disabled
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
|
|
|
Quote
| 1 user liked this post
|
02-19-2016, 10:50 PM
|
#64
|
Valued Poster
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
|
LL, why are you so willing to trade Liberty for security? You put way too much trust in government. You're not an idiot like so many on here. Figure it out, man!
|
|
Quote
| 1 user liked this post
|
02-19-2016, 11:06 PM
|
#65
|
Account Disabled
Join Date: Dec 30, 2014
Location: DFW
Posts: 8,050
|
Quote:
Originally Posted by Yssup Rider
Hypocrite. How can you whine about someone hijacking a thread and then hijack another thread within 10 minutes?
Takes a certain lack of moral fiber, wouldn't you say, shitfly?
|
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein
|
|
Quote
| 1 user liked this post
|
02-19-2016, 11:30 PM
|
#66
|
Account Disabled
Join Date: Jan 20, 2010
Location: Houston
Posts: 14,460
|
Quote:
Originally Posted by LexusLover
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."
Now explain how ...
"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer!
|
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
|
|
Quote
| 1 user liked this post
|
02-19-2016, 11:49 PM
|
#67
|
Account Disabled
Join Date: Jan 20, 2010
Location: Houston
Posts: 14,460
|
Quote:
Originally Posted by DSK
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein
|
Nobody sweats the Austin Reacharound Crew. -gnadfly
|
|
Quote
| 1 user liked this post
|
02-20-2016, 06:28 AM
|
#68
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by CuteOldGuy
LL, why are you so willing to trade Liberty for security?
|
Why are you so willing to misinterpret what others post?
I can ask you a similar question.
Why are you so willing to trade security for your so called "liberty"?
If you are so concerned about "protecting" your personal information on your cell phone, then don't put your personal information on your cell phone. If you don't want your personal information "perused" by the "government" then don't have your personal information where it can been "seen."
What apparently none of you "libertarians" have figured out is the Fourth Amendment doesn't keep the "government" from "looking and seeing," it only keeps the "government" from using what it "sees" against you!
Do you use WIFI?
You want to huff and puff about your information is no one else's business ... and if you want to keep it that way, ..
.. then don't do any crimes using your cell phone/Iphone as an instrumentality of the furtherance of the elements of the offense ... and also don't become a victim of crime for which the content of your cell phone/Iphone may produce some clues as to the person or persons responsible.
The appellate courts are perfectly willing (as a general rule) to protect your "right of privacy," but the decades of exceptions that have been crafted have ALWAYS been centered around "public safety" and changes in the technology available to crooks.....and now terrorists. Fly much?
|
|
Quote
| 1 user liked this post
|
02-20-2016, 06:39 AM
|
#69
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by i'va biggen
Apple now claiming the password had been changed after it was seized by authorities.
|
Oh, my! How nefarious and diabolical of the investigators!
So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!
Securing the evidence is a paramount consideration to protect the integrity!
|
|
Quote
| 1 user liked this post
|
02-20-2016, 07:51 AM
|
#70
|
Account Disabled
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
|
Quote:
Originally Posted by LexusLover
Oh, my! How nefarious and diabolical of the investigators!
So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!
Securing the evidence is a paramount consideration to protect the integrity!
|
https://www.yahoo.com/finance/news/a...53147176.html#
|
|
Quote
| 1 user liked this post
|
02-20-2016, 08:35 AM
|
#71
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by gnadfly
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
|
And you've "assumed" the software does not, and has not, existed prior to the phones being marketed with the "super encryption" software installed. Given the general intelligence the manufacturer has displayed, I have a reasonable doubt that the manufacturer installed encrypting software for which they had no "translator"!
Do you all actually believe Apple has no idea how to translate their own encryption? Or worse yet, do you believe a software engineer created a program to encrypt data without knowing how it is structured, how it functions, and how to defeat it?
All of the fear mongering about "criminals" obtaining the "translating software" can just as easily be the basis for confiscating firearms by the government from those lawfully in possession. How do "we" know the "bad guys" won't get them?
My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place.
|
|
Quote
| 1 user liked this post
|
02-20-2016, 08:41 AM
|
#72
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by i'va biggen
|
The link is not SECURE! How ironic!!!!
|
|
Quote
| 1 user liked this post
|
02-20-2016, 08:46 AM
|
#73
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by LexusLover
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."
Now explain how ...
"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer!
|
Quote:
Originally Posted by DSK
That is a perfect example of an excellent chain of custody, but I can hear the ghost of Johnny Cochran saying this:
"If the data ain't encrypted then whitey done scripted to make the dark man convicted!"
|
Quote:
Originally Posted by gnadfly
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
|
There is always a risk. It's a "cost-benefit" analysis.
|
|
Quote
| 1 user liked this post
|
02-20-2016, 09:43 AM
|
#74
|
Lifetime Premium Access
Join Date: Jan 1, 2010
Location: houston
Posts: 48,267
|
Quote:
Originally Posted by LexusLover
My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place.
|
And if you are wrong...
|
|
Quote
| 1 user liked this post
|
02-20-2016, 11:19 AM
|
#75
|
Valued Poster
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
|
Quote:
Originally Posted by WTF
And if you are wrong...
|
.. and if you are "wrong"?
Do you want "encryption" that protects your personal information? Or not?
|
|
Quote
| 1 user liked this post
|
|
AMPReviews.net |
Find Ladies |
Hot Women |
|