User Panel
Quoted:
Question: If the government did get it's way and get a public key to all the things, how long would it take for that key to be published on Wikileaks? Days? Months? View Quote Never believe a word the gov’t says. The founding fathers understood this and that’s why our Constitution is written the way it is. |
|
|
Another "The Constitution is getting in my way" whines.
I'm a LOT more worried about the FBI and their ilk than "terrorists". |
|
Quoted:
The government already has a search warrant for the data in question in this case. Microsoft is trying to not comply with the warrant by saying that the data (of the US person) is currently being stored in a server based oversees (Ireland, if I recall correctly). The government is arguing that the data is still "controlled" by Microsoft (by any reasonable definition of the term) and should be subject to the warrant. View Quote |
|
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you
|
|
Quoted:
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you View Quote |
|
Quoted:
What are you talking about? People complain all the time about Windows 10 and the other bullshit companies use for spying. This thread is about the new head of the FBI whining about encryption. That's why we're complaining about the government. View Quote View All Quotes View All Quotes Quoted:
Quoted:
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you |
|
Quoted:
Oh look you're bringing #Pizzagate into yet another thread. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Hey FBI, there's a whole nest of Pedos in Hollywood and DC. They're pretty open about it too. Doubt you'd have to do any hackerman stuff to catch them. Go catch those guys and we'll talk. P.S. The answer will still be no you statist fucks. Pot, kettle. |
|
|
Quoted:
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you View Quote |
|
The scary part is listening to the ex-NSA people talking about how easy it is to compromise the person instead of the encryption. Therein lies the real problem with the consumer grade offerings. Most people don't understand it well enough to know how they can be compromised even when they use encryption.
The human element is the weakest link. |
|
Quoted:
The scary part is listening to the ex-NSA people talking about how easy it is to compromise the person instead of the encryption. Therein lies the real problem with the consumer grade offerings. Most people don't understand it well enough to know how they can be compromised even when they use encryption. The human element is the weakest link. View Quote |
|
Quoted:
I feel like maybe you don't understand. Even with search warrants, not some covert FBI tin foil CRAP, the information is not being able to be retrieved. This isn't some mass conspiracy, these are child molestors taking pics of you or your neighbors kids, these are drug dealers. Many of them have already been charged but the info for further prosecution can't be received........ask me how I know after busting an auto theft ring View Quote |
|
Quoted:
I guess there in lies the communication breakdown. I am not advocating lesser quality data encryption for the consumer! I fully support the best data encryption available to the consumer but as someone who isn't tech savvy, I can't help but think apple could create a program or internal software to retrieve the encrypted data for law enforcement upon issuance of a search warrant. View Quote "We're from the government and we're here to help". |
|
|
|
Quoted:
I guess there in lies the communication breakdown. I am not advocating lesser quality data encryption for the consumer! I fully support the best data encryption available to the consumer but as someone who isn't tech savvy, I can't help but think apple could create a program or internal software to retrieve the encrypted data for law enforcement upon issuance of a search warrant. View Quote As for the technical side, once there's a hole in there program, there's a hole. If you're at all familiar with how things work (OPM, Snowden, Manning, Russian and Chinese IP theft, etc.), you know that such a "back door" capability in the hands of LE and the IC would pose an unmanageable threat to the effectiveness of its security. It either works, or it doesn't and can't be trusted. And then folks outside the U.S. can come up with alternatives not subject to U.S. law. Then what? Encryption is basic privacy. That should be enough. |
|
Quoted:
There are a couple facts at play here. One is that the widespread use of effective encryption creates a very real and valid concern for law enforcement and the intelligence community. That's a real thing. However, the other side of that issue refers to the value of effective encryption to the average person, or U.S. citizen. Frankly, and despite the nuisance (understated) created by encryption in official venues when a proper warrant allows access to information which cannot be retrieved, the tie (and I don't think it's even close to a tie) should go in favor of the person exercising rights to privacy, and that privacy is very, very seldom with regard to legitimate government action, but a hedge against criminals of interest to government entities already troubled by the encryption problem to begin with. Said another way, encryption is mostly effective at preventing issues otherwise of interest to LE. Well, if LE had time to worry about it, that is. As for the technical side, once there's a hole in there program, there's a hole. If you're at all familiar with how things work (OPM, Snowden, Manning, Russian and Chinese IP theft, etc.), you know that such a "back door" capability in the hands of LE and the IC would pose an unmanageable threat to the effectiveness of its security. It either works, or it doesn't and can't be trusted. And then folks outside the U.S. can come up with alternatives not subject to U.S. law. Then what? Encryption is basic privacy. That should be enough. View Quote |
|
|
Quoted:
Just pointing out that the answer doesn't like in single-scope thinking. View Quote |
|
Quoted:
There are a couple facts at play here. One is that the widespread use of effective encryption creates a very real and valid concern for law enforcement and the intelligence community. That's a real thing. However, the other side of that issue refers to the value of effective encryption to the average person, or U.S. citizen. Frankly, and despite the nuisance (understated) created by encryption in official venues when a proper warrant allows access to information which cannot be retrieved, the tie (and I don't think it's even close to a tie) should go in favor of the person exercising rights to privacy, and that privacy is very, very seldom with regard to legitimate government action, but a hedge against criminals of interest to government entities already troubled by the encryption problem to begin with. Said another way, encryption is mostly effective at preventing issues otherwise of interest to LE. Well, if LE had time to worry about it, that is. As for the technical side, once there's a hole in there program, there's a hole. If you're at all familiar with how things work (OPM, Snowden, Manning, Russian and Chinese IP theft, etc.), you know that such a "back door" capability in the hands of LE and the IC would pose an unmanageable threat to the effectiveness of its security. It either works, or it doesn't and can't be trusted. And then folks outside the U.S. can come up with alternatives not subject to U.S. law. Then what? Encryption is basic privacy. That should be enough. View Quote View All Quotes View All Quotes Quoted:
Quoted:
I guess there in lies the communication breakdown. I am not advocating lesser quality data encryption for the consumer! I fully support the best data encryption available to the consumer but as someone who isn't tech savvy, I can't help but think apple could create a program or internal software to retrieve the encrypted data for law enforcement upon issuance of a search warrant. As for the technical side, once there's a hole in there program, there's a hole. If you're at all familiar with how things work (OPM, Snowden, Manning, Russian and Chinese IP theft, etc.), you know that such a "back door" capability in the hands of LE and the IC would pose an unmanageable threat to the effectiveness of its security. It either works, or it doesn't and can't be trusted. And then folks outside the U.S. can come up with alternatives not subject to U.S. law. Then what? Encryption is basic privacy. That should be enough. |
|
|
Quoted:
Nope. Doesn't work that way. The content is still encrypted even if you make a bit for bit copy of the Flash Rom. It can only be read and decrypted by the SAME serialized CPU that wrote it, AND still requires the correct password as well. View Quote View All Quotes View All Quotes |
|
Quoted:
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you View Quote Plenty of us make effort to keep ourselves secure. Regardless, the primary difference here between private and public is voluntarism. |
|
|
Quoted:
We virtualize OS and Apps...why not Flash/ROM (which we kinda do already) and hardware. I would not be surprise if the FBI/NSA has a system to pull the serialized CPU info and then just virtualize it with a crack wrapper so that they can do a constant brute force attack on the password without the limits of lockouts. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
just clone the phone The content is still encrypted even if you make a bit for bit copy of the Flash Rom. It can only be read and decrypted by the SAME serialized CPU that wrote it, AND still requires the correct password as well. |
|
Quoted:
I feel like maybe you don't understand. Even with search warrants, not some covert FBI tin foil CRAP, the information is not being able to be retrieved. This isn't some mass conspiracy, these are child molestors taking pics of you or your neighbors kids, these are drug dealers. Many of them have already been charged but the info for further prosecution can't be received........ask me how I know after busting an auto theft ring View Quote I do pay all my bills from my phone I bank on my phone I have my credit cards linked on my phone. I depend on encryption to protect myself from criminals not just from the stupid criminals but from the technology savvy criminals who want to steal my identity and my money. What your our asking me to do is have have my security compromised so that your job is easier and if my information is ever stolen you’ll investigate it. Thing is I maybe financially ruined but that not your problem and you don’t care so long as your job is easier. |
|
Stupidity or ineptitude plays a large part in this I'm certain. Apple said today that the FBI has not yet asked for their help with the Texas church shooters phone, if they had, versus sending it to Quantico, Apple said they would have told them to use the shooters thumbprint. It's a moot point now, as after 48hrs the phone will ask for a password.
TOP MEN. Also, now you're claiming to be a secret squirrel phone cracker? A couple of months ago you alluded to being in the halls of Congress. Never in the history of Arfcom has someone chosen a more appropriate username, B_S, indeed. |
|
Quoted:
I guess there in lies the communication breakdown. I am not advocating lesser quality data encryption for the consumer! I fully support the best data encryption available to the consumer but as someone who isn't tech savvy, I can't help but think apple could create a program or internal software to retrieve the encrypted data for law enforcement upon issuance of a search warrant. View Quote Its not a hard concept to understand. Based off your name it looks like you work for dc metro 6th district vice and by your comments I think it’s safe to assume you’re a LEO. So how would you feel if you’re encrypted networks has a built in back door which a tech savvy group of criminals were able to crack and pass around so that other criminals know were officers are and can listen to your tac channels so they can prepare an ambush when you go to raid them. This would endanger officers and compromiseing my encrypted would endanger me. Not to mention foreign governments with unlimited resources building tools to exploit the back door and harming the nation financially. |
|
Quoted:
Stupidity or ineptitude plays a large part in this I'm certain. Apple said today that the FBI has not yet asked for their help with the Texas church shooters phone, if they had, versus sending it to Quantico, Apple said they would have told them to use the shooters thumbprint. It's a moot point now, as after 48hrs the phone will ask for a password. TOP MEN. Also, now you're claiming to be a secret squirrel phone cracker? A couple of months ago you alluded to being in the halls of Congress. Never in the history of Arfcom has someone chosen a more appropriate username, B_S, indeed. View Quote His only purpose here is to troll us and disrupt our forum |
|
Quoted:
Know how I know you don't really understand encryption? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
If you're requiring him to use cryptographically insecure code (backdoors qualify) by law, then yes you are. |
|
Quoted:
<snip> As for the technical side, once there's a hole in there program, there's a hole. If you're at all familiar with how things work (OPM, Snowden, Manning, Russian and Chinese IP theft, etc.), you know that such a "back door" capability in the hands of LE and the IC would pose an unmanageable threat to the effectiveness of its security. It either works, or it doesn't and can't be trusted. And then folks outside the U.S. can come up with alternatives not subject to U.S. law. Then what? Encryption is basic privacy. That should be enough. View Quote |
|
Quoted:
I love how people get so riled up over the government wanting to peek in their devices, but are willfully complacent or downright ignorant of the fact that your devices and all the apps on them are streaming data about them to private corporations and individuals constantly. Paying for the privilege of giving your personal data away so someone can profit from it is fine and dandy, but when the .gov wants to try and find pedos and terrorizers the same way it's all OMGWTFBBQ. And sure, the government will not always do what is best for you, but a profit based corporation will NEVER do what is best for you View Quote |
|
Quoted:
Also, now you're claiming to be a secret squirrel phone cracker? A couple of months ago you alluded to being in the halls of Congress. Never in the history of Arfcom has someone chosen a more appropriate username, B_S, indeed. View Quote |
|
I totally believe the FBI and all the BS that certain insiders bring here.
|
|
|
Quoted:
Quoted:
Ok, I know for some things our G2 IMO Officer had to have copies of our truecrypt passwords for reg and hidden containers. If the above was true why would they need our passwords for our containers on the gov laptops? If they could access them why would they need our password? |
|
Good on one hand because no one wants too much government overreach. On the other hand you want them to access the data in some situations. For instance, to catch a child molester or a no shit terrorist. Can't have one without the other though. All or nothing.
|
|
Quoted:
I guess there in lies the communication breakdown. I am not advocating lesser quality data encryption for the consumer! I fully support the best data encryption available to the consumer but as someone who isn't tech savvy, I can't help but think apple could create a program or internal software to retrieve the encrypted data for law enforcement upon issuance of a search warrant. View Quote View All Quotes View All Quotes Quoted:
Quoted:
If you're requiring him to use cryptographically insecure code (backdoors qualify) by law, then yes you are. |
|
|
Quoted:
Technology is binary. People are stupid. View Quote View All Quotes View All Quotes Quoted:
Quoted:
The scary part is listening to the ex-NSA people talking about how easy it is to compromise the person instead of the encryption. Therein lies the real problem with the consumer grade offerings. Most people don't understand it well enough to know how they can be compromised even when they use encryption. The human element is the weakest link. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.