![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#31 |
Dipped Squirrel Operative
|
![]()
Bingo.
__________________
>^..^<*)))>{ All generalizations are wrong. |
![]() |
![]() |
![]() |
#32 |
Lucky Sailor
![]() Join Date: Oct 2010
Location: Rome
Posts: 4,273
Downloads: 81
Uploads: 0
|
![]()
As it turns out, apple did offer a simple and one off solution to the problem, but the government screwed it up (by my reading).
IF the phone had been allowed to backup to the icloud, apple would have happily turned over the data from the backup. But someone in the government (I'm not sure if it was the suspects employers or someone from the Justice Department) altered the phones login properties, preventing it from backing up. So, yes Apple did have a simple solution that would have complied with the court order, but the government screwed it up. |
![]() |
![]() |
![]() |
#33 | |
Navy Seal
![]() |
![]() Quote:
<O>
__________________
__________________________________________________ __ |
|
![]() |
![]() |
![]() |
#34 |
Lucky Sailor
![]() Join Date: Oct 2010
Location: Rome
Posts: 4,273
Downloads: 81
Uploads: 0
|
![]()
Nope, that's a different story, but with similar results.
So it looks like the government had 2 chances to gain access to the phone, and it fouled both up. |
![]() |
![]() |
![]() |
#35 | |
Ace of the Deep
![]() Join Date: Oct 2007
Posts: 1,194
Downloads: 5
Uploads: 0
|
![]() Quote:
More troubling is if the feds get their way and force Apple to comply, it sets a dangerous precedent for the Gov. to force the same type of compliance from anyone for pretty much anything. |
|
![]() |
![]() |
![]() |
#36 |
Fleet Admiral
![]() |
![]()
This brings up an interesting question.
The police can force a person to have their fingerprints taken. Can the police force someone to swipe their finger on their cell phone to unlock it?
__________________
abusus non tollit usum - A right should NOT be withheld from people on the basis that some tend to abuse that right. |
![]() |
![]() |
![]() |
#37 |
Ace of the Deep
![]() Join Date: Oct 2007
Posts: 1,194
Downloads: 5
Uploads: 0
|
![]() |
![]() |
![]() |
![]() |
#38 | |
Wayfaring Stranger
|
![]() Quote:
![]() |
|
![]() |
![]() |
![]() |
#39 |
Ace of the Deep
![]() Join Date: Oct 2007
Posts: 1,194
Downloads: 5
Uploads: 0
|
![]()
It's my understanding the phone either didn't have that option or it wasn't set up. Nor was " mobile device management" software (that the county paid for but didn't install), set up on the device.
|
![]() |
![]() |
![]() |
#40 |
Soaring
|
![]()
In Germany, by the law the owner of an encrypted computer-device cannot be ruled to hand out the code to decrypt it.
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#41 |
Dipped Squirrel Operative
|
![]()
^ You do not need the encrypted data anymore.
Your guiltiness is being "proven" by your metadata alone, no written evidence needed anymore. If you become a suspect (like if you switch your mobile phone off now and then, be in locations statistically relevant, and might have met certain other suspects), your location and traveling paths are enough. They call it "advanced-cloud-based-behavior-analytics method": https://theintercept.com/document/20...ior-analytics/ They already kill autonomously, based on algorythms and statistical data. They did and do it in Pakistan, and it is called .. Skynet (bring on the terminators ![]() in german: http://www.heise.de/tp/artikel/47/47449/1.html ![]()
__________________
>^..^<*)))>{ All generalizations are wrong. |
![]() |
![]() |
![]() |
#42 | |
Fleet Admiral
![]() |
![]() Quote:
![]() ![]()
__________________
abusus non tollit usum - A right should NOT be withheld from people on the basis that some tend to abuse that right. |
|
![]() |
![]() |
![]() |
#43 |
Sea Lord
![]() Join Date: Sep 2006
Location: Adelaide, South Australia
Posts: 1,952
Downloads: 207
Uploads: 0
|
![]()
They tried, but it was password locked instead.
|
![]() |
![]() |
![]() |
#44 |
Chief of the Boat
|
![]()
I've one of those but you have to verify via a pass code on a regular basis (about once a month) so simply wait it out but then you're obviously back to the pass code problem.
|
![]() |
![]() |
![]() |
#45 |
Lucky Sailor
![]() Join Date: Oct 2010
Location: Rome
Posts: 4,273
Downloads: 81
Uploads: 0
|
![]()
Well, Appple has filed an appeal based on the first and fifth amendments. I think that everybody (not just here lol) needs to wait for the upper courts to decide this. I'm sure Apple will comply with whatever ruling is eventually handed out.
To me, this is a landmark case, and will decide personal security issues for many many years to come. |
![]() |
![]() |
![]() |
|
|