Quik   10 #97 Posted February 19, 2016 Yeah... there was no disresepct there. Just because they lost someone to people who were of the same fanaticism as the phone owners doesnt make them automatically any more entitled than the average person to have an opinion  You are not going to win friends by that attitude. Dont like someone so you insult them? Sounds like some knight of the road feels entitled because he's found out how to drive a big truck and twiddle a steering wheel back and forth.  The people he was 'insulting' were the degenerate islamist rats who murdered Lee Rigby. Insulting them won't win him as a friend per se but any dog who defends the terrorist islamist scum can cross themselves off my chummy list. Share this post Link to post Share on other sites Share this content via...
Dude111   10 #98 Posted February 19, 2016 Well done Apple. Lets hope they win the case.The govt is playing dumb!!!! THEY HAVE FULL ACCESS TO THESE SPY BOXS WHENEVER THEY WANT IT!! Share this post Link to post Share on other sites Share this content via...
Cyclone   10 #99 Posted February 19, 2016 I'm saying that I think it's unwise to side with dead terrorists against the TLAs investigating them. How the results of that decision manifest themselves are speculation.  That's not what you said at all.  You quite clearly said that the US agencies would blackmail or coerce apple employees into doing what they want anyway.  And now you're trying to recast the entire debate into one where Apple is apparently on the side of terrorists. Share this post Link to post Share on other sites Share this content via...
Stoned   10 #100 Posted February 19, 2016 Im truly staggered that over 45% of voters on this pole feel Apple are in the wrong. Share this post Link to post Share on other sites Share this content via...
unbeliever   10 #101 Posted February 19, 2016 I don't see why it can't be cracked without apple's help. In which case it's not clear why the US government are harassing apple unless they have another motive. Open the phone, remove the storage chip, clone the contents into an image file, brute force the image file. Without the phone to enforce the 10 tries limit, all it takes is time. Share this post Link to post Share on other sites Share this content via...
Obelix   11 #102 Posted February 19, 2016 I don't see why it can't be cracked without apple's help. In which case it's not clear why the US government are harassing apple unless they have another motive. Open the phone, remove the storage chip, clone the contents into an image file, brute force the image file. Without the phone to enforce the 10 tries limit, all it takes is time.  The data on the chip is encrypted so copying it is of no help whatsoever and it's not possible to brute force that encryption Share this post Link to post Share on other sites Share this content via...
unbeliever   10 #103 Posted February 19, 2016 The data on the chip is encrypted so copying it is of no help whatsoever and it's not possible to brute force that encryption  It's possible to brute force any encryption. Are you saying that the encryption is so good that it would be impractical to crack? Share this post Link to post Share on other sites Share this content via...
Eric Arthur   10 #104 Posted February 19, 2016 It's possible to brute force any encryption. Are you saying that the encryption is so good that it would be impractical to crack?  ISTR that a brute force attack would take up to 5.5 years as the system slows down the time allowed between attempts with each attempt. Share this post Link to post Share on other sites Share this content via...
unbeliever   10 #105 Posted February 19, 2016 ISTR that a brute force attack would take up to 5.5 years as the system slows down the time allowed between attempts with each attempt.  How can it slow anything after you've made an image of the storage device onto your own system?  Any encrypted storage device can be cloned. Only thing is that your clone is still encrypted. But the clone is on your own hardware so you can throw as much cpu at the decryption as you can lay your hands on. Share this post Link to post Share on other sites Share this content via...
Eric Arthur   10 #106 Posted February 19, 2016 How can it slow anything after you've made an image of the storage device onto your own system? Any encrypted storage device can be cloned. Only thing is that your clone is still encrypted. But the clone is on your own hardware so you can throw as much cpu at the decryption as you can lay your hands on.  I don't know, it is just what I read somewhere recently, but it will also depend where the data is that you're trying to look at. Some or all could be on Apple's servers.  Good luck to the NSA, so long as Apple don't assist them I think that's fine. Share this post Link to post Share on other sites Share this content via...
Cyclone   10 #107 Posted February 19, 2016 How can it slow anything after you've made an image of the storage device onto your own system? Any encrypted storage device can be cloned. Only thing is that your clone is still encrypted. But the clone is on your own hardware so you can throw as much cpu at the decryption as you can lay your hands on.  Assuming that the clone doesn't detect the change in hardware and just immediately self wipe...  Part of the request to apple is to create an electronic means of trying pins, such that a brute force attack could be run in seconds. Share this post Link to post Share on other sites Share this content via...
unbeliever   10 #108 Posted February 19, 2016 Assuming that the clone doesn't detect the change in hardware and just immediately self wipe... Part of the request to apple is to create an electronic means of trying pins, such that a brute force attack could be run in seconds.  The clone never runs. It can't detect anything. It just sits there as a file on a hard drive helplessly whilst you crack it. Share this post Link to post Share on other sites Share this content via...