Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > The Political Forum
test
The Political Forum Discuss anything related to politics in this forum. World politics, US Politics, State and Local.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 397
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 281
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70817
biomed163509
Yssup Rider61144
gman4453310
LexusLover51038
offshoredrilling48767
WTF48267
pyramider46370
bambino42996
The_Waco_Kid37301
CryptKicker37225
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 02-19-2016, 06:55 PM   #61
i'va biggen
Account Disabled
 
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
Encounters: 17
Default

Apple now claiming the password had been changed after it was seized by authorities.
i'va biggen is offline   Quote
Old 02-19-2016, 07:53 PM   #62
cptjohnstone
Valued Poster
 
cptjohnstone's Avatar
 
Join Date: Jan 4, 2010
Location: Stillwater, OK
Posts: 3,631
Default

Quote:
Originally Posted by i'va biggen View Post
Apple now claiming the password had been changed after it was seized by authorities.
you got a link? or just more babble babble
cptjohnstone is offline   Quote
Old 02-19-2016, 09:21 PM   #63
i'va biggen
Account Disabled
 
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
Encounters: 17
Default

http://www.nydailynews.com/news/nati...icle-1.2536178

Screw you hillbilly, you know I can't post links.

http://apple.slashdot.org/story/16/0...rnment-custody
i'va biggen is offline   Quote
Old 02-19-2016, 10:50 PM   #64
CuteOldGuy
Valued Poster
 
CuteOldGuy's Avatar
 
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
Encounters: 20
Default

LL, why are you so willing to trade Liberty for security? You put way too much trust in government. You're not an idiot like so many on here. Figure it out, man!
CuteOldGuy is offline   Quote
Old 02-19-2016, 11:06 PM   #65
DSK
Account Disabled
 
Join Date: Dec 30, 2014
Location: DFW
Posts: 8,050
Encounters: 19
Default

Quote:
Originally Posted by Yssup Rider View Post
Hypocrite. How can you whine about someone hijacking a thread and then hijack another thread within 10 minutes?

Takes a certain lack of moral fiber, wouldn't you say, shitfly?
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein
DSK is offline   Quote
Old 02-19-2016, 11:30 PM   #66
gnadfly
Account Disabled
 
Join Date: Jan 20, 2010
Location: Houston
Posts: 14,460
Default

Quote:
Originally Posted by LexusLover View Post
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."

Now explain how ...

"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer!
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
gnadfly is offline   Quote
Old 02-19-2016, 11:49 PM   #67
gnadfly
Account Disabled
 
Join Date: Jan 20, 2010
Location: Houston
Posts: 14,460
Default

Quote:
Originally Posted by DSK View Post
“I am free, no matter what rules surround me. If I find them tolerable, I tolerate them; if I find them too obnoxious, I break them. I am free because I know that I alone am morally responsible for everything I do.”
― Robert A. Heinlein
Nobody sweats the Austin Reacharound Crew. -gnadfly
gnadfly is offline   Quote
Old 02-20-2016, 06:28 AM   #68
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by CuteOldGuy View Post
LL, why are you so willing to trade Liberty for security?
Why are you so willing to misinterpret what others post?

I can ask you a similar question.

Why are you so willing to trade security for your so called "liberty"?

If you are so concerned about "protecting" your personal information on your cell phone, then don't put your personal information on your cell phone. If you don't want your personal information "perused" by the "government" then don't have your personal information where it can been "seen."

What apparently none of you "libertarians" have figured out is the Fourth Amendment doesn't keep the "government" from "looking and seeing," it only keeps the "government" from using what it "sees" against you!

Do you use WIFI?

You want to huff and puff about your information is no one else's business ... and if you want to keep it that way, ..

.. then don't do any crimes using your cell phone/Iphone as an instrumentality of the furtherance of the elements of the offense ... and also don't become a victim of crime for which the content of your cell phone/Iphone may produce some clues as to the person or persons responsible.

The appellate courts are perfectly willing (as a general rule) to protect your "right of privacy," but the decades of exceptions that have been crafted have ALWAYS been centered around "public safety" and changes in the technology available to crooks.....and now terrorists. Fly much?
LexusLover is offline   Quote
Old 02-20-2016, 06:39 AM   #69
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by i'va biggen View Post
Apple now claiming the password had been changed after it was seized by authorities.
Oh, my! How nefarious and diabolical of the investigators!

So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!

Securing the evidence is a paramount consideration to protect the integrity!
LexusLover is offline   Quote
Old 02-20-2016, 07:51 AM   #70
i'va biggen
Account Disabled
 
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
Encounters: 17
Default

Quote:
Originally Posted by LexusLover View Post
Oh, my! How nefarious and diabolical of the investigators!

So, Apple can no longer remotely and surreptitiously delete or modify shit? Nor anyone else!!!

Securing the evidence is a paramount consideration to protect the integrity!
https://www.yahoo.com/finance/news/a...53147176.html#
i'va biggen is offline   Quote
Old 02-20-2016, 08:35 AM   #71
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by gnadfly View Post
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
And you've "assumed" the software does not, and has not, existed prior to the phones being marketed with the "super encryption" software installed. Given the general intelligence the manufacturer has displayed, I have a reasonable doubt that the manufacturer installed encrypting software for which they had no "translator"!

Do you all actually believe Apple has no idea how to translate their own encryption? Or worse yet, do you believe a software engineer created a program to encrypt data without knowing how it is structured, how it functions, and how to defeat it?

All of the fear mongering about "criminals" obtaining the "translating software" can just as easily be the basis for confiscating firearms by the government from those lawfully in possession. How do "we" know the "bad guys" won't get them?

My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place.
LexusLover is offline   Quote
Old 02-20-2016, 08:41 AM   #72
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by i'va biggen View Post
The link is not SECURE! How ironic!!!!
LexusLover is offline   Quote
Old 02-20-2016, 08:46 AM   #73
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by LexusLover View Post
It's real simple. Two special agents appear at Apple's pre-designated lab with the Iphone in question with a court order and the owner's waiver, and stand their in the lab with video and audio recording the chain of custody events while the technician(s) hook up the phone to a computer containing the proprietary software and the software downloads and unscrambles the file or files in the phone that are desired by the FBI and hands the "English" to them on a disk or flash drive with an accompanying affidavit affirming/swearing to the validity and accuracy of the "translation," and the two agents depart with the Iphone, their copy of the information (the only one is ok .. keeping in mind ala HillariousNoMore than there is unscrambled data on the Apple computer (which can be scrubbed while the agents remain there to observe and confirm) ...., and the paper work confirming the chain of custody, extraction, translation, and authenticity of the "English."

Now explain how ...

"...Criminals, terrorists, the Chinese, NSA, exwife's lawyer, ..." are going to get the "unscrambling software"? It NEVER leaves the Apple lab computer!
Quote:
Originally Posted by DSK View Post
That is a perfect example of an excellent chain of custody, but I can hear the ghost of Johnny Cochran saying this:

"If the data ain't encrypted then whitey done scripted to make the dark man convicted!"
Quote:
Originally Posted by gnadfly View Post
Sure it can. How is the software developed? Who are the developers? Where is the software developed? You've assumed away the problem(s).
There is always a risk. It's a "cost-benefit" analysis.
LexusLover is offline   Quote
Old 02-20-2016, 09:43 AM   #74
WTF
Lifetime Premium Access
 
WTF's Avatar
 
Join Date: Jan 1, 2010
Location: houston
Posts: 48,267
Default

Quote:
Originally Posted by LexusLover View Post

My suggestion of having the "translating" done "in house" by Apple was to avoid the ultimate "solution" of prohibiting such encryption in the first place.
And if you are wrong...
WTF is offline   Quote
Old 02-20-2016, 11:19 AM   #75
LexusLover
Valued Poster
 
LexusLover's Avatar
 
Join Date: Jan 16, 2010
Location: Texas
Posts: 51,038
Default

Quote:
Originally Posted by WTF View Post
And if you are wrong...
.. and if you are "wrong"?

Do you want "encryption" that protects your personal information? Or not?
LexusLover is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved