If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#31
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article , ultred ragnusen
wrote: Forget black helicopters, FBI flying surveillance Cessnas over US cities. they can fly them all they want, but all they'll get is encrypted data, which will take a few few billion years to brute force. You wish. no wishing needed. as usual, you have *zero* understanding about encryption used on modern smartphones. |
#32
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
nospam wrote:
Forget black helicopters, FBI flying surveillance Cessnas over US cities. they can fly them all they want, but all they'll get is encrypted data, which will take a few few billion years to brute force. You wish. no wishing needed. as usual, you have *zero* understanding about encryption used on modern smartphones. Tell that to Zimmermann or Rommel or Stalin or Hirohito, all of whom believed essentially what you believe, which was fed to you by Brand X marketing. Your entire belief system is built upon a house of cards, fed to you by that admittedly fantastically competent Brand X marketing organization. When you crack things, you don't often go brute force, which is one reason why, when I worked at Fort Mead, the walls not only had no windows, but they had full-length heavy curtains on those walls with no windows (as just one example that they attack the weakest link). That you think the adversary goes frontal on the strongest link is what brand X marketing has told you to think, where all I'm saying is the logically verifiable fact that the weakest set of links of all brands of consumer grade smart phones is the same. |
#33
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article , ultred
ragnusen wrote: Forget black helicopters, FBI flying surveillance Cessnas over US cities. they can fly them all they want, but all they'll get is encrypted data, which will take a few few billion years to brute force. You wish. no wishing needed. as usual, you have *zero* understanding about encryption used on modern smartphones. Tell that to Zimmermann or Rommel or Stalin or Hirohito, all of whom believed essentially what you believe, which was fed to you by Brand X marketing. they didn't have iphones. Your entire belief system is built upon a house of cards, fed to you by that admittedly fantastically competent Brand X marketing organization. nope. it's based on a solid understanding of how modern devices actually work, something you lack, despite it being explained to you. When you crack things, you don't often go brute force, which is one reason why, when I worked at Fort Mead, the walls not only had no windows, but they had full-length heavy curtains on those walls with no windows (as just one example that they attack the weakest link). if you actually had worked there, you would have known how to spell it correctly. |
#34
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
nospam wrote:
for that, you need the passcode, which if it's complex, will take a few billion years to crack, and the imei won't help you at all, Your entire belief system is built upon a house of cards fed to you by Brand X marketing, admittedly one of the best marketing organizations in the world, such that you actually seem to think that an adversary must go frontal on your strongest link in order to obtain what they want. As just /one/ example of how adversaries attack weak links first, read any of the hits from this simple directed search: https://duckduckgo.com/?q=crack+encr...ing+cpu+sounds To save you time, this is the first hit: https://www.extremetech.com/extreme/...-computers-cpu The point here is that the mobile device security is only as strong as the set of weakest links, which are the same for all consumer grade mobile devices. |
#35
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
nospam wrote:
Tell that to Zimmermann or Rommel or Stalin or Hirohito, all of whom believed essentially what you believe, which was fed to you by Brand X marketing. they didn't have iphones. They all had data they encrypted with what they /thought/ was secure means. In /most/ cases that I mentioned, the adversary did not go frontal (e.g., enigma and Cairo were not frontal) but in some cases, they did go frontal (Joe Rochefort). Your entire belief system is built upon a house of cards, fed to you by that admittedly fantastically competent Brand X marketing organization. nope. it's based on a solid understanding of how modern devices actually work, something you lack, despite it being explained to you. That your entire belief system is underpinned by a foundation that is fed to you, word for word, by one of the best marketing organizations in the world, is patently obvious. if you actually had worked there, you would have known how to spell it correctly. True that, as "Fort Meade" is a purposeful euphemism, where the actual names inside the unnamed entity are in terms of R14 and the like. |
#36
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article , ultred
ragnusen wrote: As just /one/ example of how adversaries attack weak links first, read any of the hits from this simple directed search: https://duckduckgo.com/?q=crack+encr...ing+cpu+sounds To save you time, this is the first hit: https://www.extremetech.com/extreme/...-worlds-toughe st-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu you might want to actually *read* the links you spew. If you want to keep your data secure, you only really have two viable options: Heavy-duty encryption, physical security, and ideally both at the same time. iphones have the former and other than a confiscated phone, they also have the latter. not only that, but without the correct passcode, there won't be any sounds to capture it decrypting anything. tl;dr you haven't any clue. |
#37
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article , ultred ragnusen
wrote: Tell that to Zimmermann or Rommel or Stalin or Hirohito, all of whom believed essentially what you believe, which was fed to you by Brand X marketing. they didn't have iphones. They all had data they encrypted with what they /thought/ was secure means. not using modern encryption techniques, they didn't. |
#38
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
nospam wrote:
As just /one/ example of how adversaries attack weak links first, read any of the hits from this simple directed search: https://duckduckgo.com/?q=crack+encr...ing+cpu+sounds To save you time, this is the first hit: https://www.extremetech.com/extreme/...-worlds-toughe st-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu you might want to actually *read* the links you spew. If you want to keep your data secure, you only really have two viable options: Heavy-duty encryption, physical security, and ideally both at the same time. iphones have the former and other than a confiscated phone, they also have the latter. not only that, but without the correct passcode, there won't be any sounds to capture it decrypting anything. You may want to re-think your concept of "physical security" since we're talking about /radio/ waves, where it's impossible to have physical security of what transpires over those radio waves. |
#39
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
In article , ultred
ragnusen wrote: You may want to re-think your concept of "physical security" since we're talking about /radio/ waves, where it's impossible to have physical security of what transpires over those radio waves. nearly all data on a smartphone is encrypted *if* it's sent over the air. quite a bit of data never leaves the phone. ever. |
#40
|
|||
|
|||
The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
nospam wrote:
everything on an iphone is encrypted and for all intents, impossible to crack. cracking encryption on android phones is child's play. most of them aren't even encrypted because it slows the phone down too much. Let's give up because you can only spout what Brand X marketing has told you to spout, which works on the hoi polloi to make them pay more just to /feel/ safe, but who don't realize that not every attack will be frontal. |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
iPhone addicts cut-back on their children's food to afford latest iPhone | nospam | Digital Photography | 9 | August 31st 16 05:12 AM |
iphone crybaby sues Nikon (boo hoo! No iPhone support for D500 wifi!! | Mark Storkamp[_2_] | Digital Photography | 15 | June 25th 16 05:20 PM |
my application for iPhone: Model Pose | George Kerby | Digital Photography | 0 | November 12th 08 04:05 PM |
my application for iPhone: Model Pose | Folley Angstrom | Digital Photography | 0 | November 12th 08 07:53 AM |
The Existence of God | Happy Man | Digital Photography | 9 | March 1st 07 06:32 AM |