Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Keep fighting. This is not about just one phone.
Keep fighting. This is not about just one phone.
I see this thread as who do you trust...
Ish & the FBI?
Or Apple & Lance.
I voted yes. Not because I'm anti-government, or pro Apple, but because I'm pro security and privacy.
Once a backdoor is created there's no telling in whose hands it will end up and I don't trust Apple or the government to keep it secure. Or to not use it again.
If the code could be written in a secure room with no connection to any network, the data retrieved to a thumb drive (independently verified to contain only the phone data), which is handed to the FBI, then the room and its contents vaporized, I would probably support the FBI having the data in this particular case.
I voted yes. Not because I'm anti-government, or pro Apple, but because I'm pro security and privacy.
Once a backdoor is created there's no telling in whose hands it will end up and I don't trust Apple or the government to keep it secure. Or to not use it again.
If the code could be written in a secure room with no connection to any network, the data retrieved to a thumb drive (independently verified to contain only the phone data), which is handed to the FBI, then the room and its contents vaporized, I would probably support the FBI having the data in this particular case.
If it's that easy it would already be there.The script for exploiting the back door would be up on the hacking sites five minutes after Apple wrote it.
That's why I said "this particular case". This case is the person is dead and is guilty of killing quite a few people and there's a decent chance others were involved. This is a very limited and unique case.that's great, but it's never about just one case.they just don't work that way. give 'em an inch and they'll take a mile every fucking time.
Depending on what the passcode is it could take them many years, very many, to brute force the encryption.Privacy is one issue; the fact that we've pissed away trillions of dollars on computer systems and computer experts and can't even read an iPhone is another. The biggest issue for me though is that I don't like the government telling a private business that they have to create something for the government because the government can't do it themselves.
If they want software to break the encryption, put it out for bid.
Depending on what the passcode is it could take them many years, very many, to brute force the encryption.
Unless the thread title is the actual court case title, it should be "FBI vs. Security."
The passcode is just a 4 digit pin. 10,000 possibles, a few days or couple weeks tops to crack that.
The problems isn't the code, it's the fact that putting in the wrong code wipes the phone. No way past that currently.
I don't know about that specific phone, but some iPhones accept alpha-numeric pass phrases.The passcode is just a 4 digit pin. 10,000 possibles, a few days or couple weeks tops to crack that.
The problems isn't the code, it's the fact that putting in the wrong code wipes the phone. No way past that currently.
Default in iOS 9 is six digits.
Why would they think it's only 4? If it's wrong, regardless, I assume it indicates it's wrong. It would be pretty stupid to say, "sorry, your passcode is 16 characters, try again"Pretty sure in this case they're saying it's 4. Not sure about alpha though. Never saw that get mentioned. Maybe they don't know.
Why would they think it's only 4? If it's wrong, regardless, I assume it indicates it's wrong. It would be pretty stupid to say, "sorry, your passcode is 16 characters, try again"
It's a 5c and as of iOS6 it can accept at least a 37 character alpha-numeric/special character passcode. Given the character choices even a 6 character password has over 208 billion possible combinations.