Submitted by WestEst101 t3_z8rxfo in Futurology
Dje4321 t1_iyduqbj wrote
Reply to comment by americon in Alexa, is the voice-assistant industry doomed? by WestEst101
They absolutely gave up the shooters information though. They handed over their icloud backups without hesitation which depending on your phone settings, could be your entire phone and everything on it. Your contacts, your messages, installed apps, photos, etc. Most people want their phone to be exactly the same when they restore from a backup, so you have to keep a copy of all of it if you want to restore it.
The FBI wanted access to the phone via a backdoor. Apple had no way of doing it as they didnt know the shooters password. So the FBI sued them to try and force them to add a backdoor to their software so they could try and bypass it. Apple refused because
-
it would eliminate any trust people had with them. Most people wouldnt buy an apple product if the government can just goto them and demand they change their software. Apple and the FBI can say they only added the backdoor once, but with a closed source eco system as tight as IOS, you have no real way to audit or verify anything that happens. the FBI could demand every text message that gets sent is emailed to them and you would have no real way to knowing without a massive amount of work to deconstruct IOS at all levels to verify.
-
because even if they did create a backdoor to let them bypass the password, most of the data would still be encrypted with the devices password (if apple set it up todo that, pretty stupid if they didnt)
There was nothing stopping the FBI, from simply cloning the devices storage, and simply guessing the shooters passcode which if it was a pin, would take a week at the absolute longest but more than likely, it could burn through all the combinations if a matter of minutes.
queequagg t1_iydzm2n wrote
>They handed over their icloud backups without hesitation
Of course they did, the FBI had a warrant. They follow the law. It is the user’s choice whether to use a cloud backup, however. You can use encrypted local backups if you prefer.
>because even if they did create a backdoor to let them bypass the password, most of the data would still be encrypted with the devices password
The back door the fbi wanted was a way to inject and run cracking software on the device. Most people’s passcodes are 4-6 digits. That’s trivial to crack, except that the OS (and in more recent phones, the Secure Enclave hardware) limits the rate of decryption attempts. IIRC the FBI found an Israeli company that used security flaws to do exactly that.
>There was nothing stopping the FBI, from simply cloning the devices storage, and simply guessing the shooters passcode which if it was a pin
The pin is entangled with a hardware encryption key physically built into the cpu. Cracking the encryption off the device is practically impossible.
Viewing a single comment thread. View all comments