This is true about cryptography also. Apple did not say it was impossible - they said it would be "extremely burdensome" to do so. This is the reason that with the old DES encryption the key size outside couldn't be any larger than 40 bit but inside was 128 (recommending 256 now I think) - a brute force attack is possible. It just is not practical. You can throw huge super computers at it or clusters of 1000's of desktop machines but in the worst case scenarios it takes years to break. The larger the key the bigger the possible set of keys. There are many other factors that influence this also.
Note: When you by a safe that is rated as uncrackable that is given a certain amount of time (15 min. to 1 hr.) based on response time.
However, that only applies up until I need you to decrypt a phone for my personal benefit. For example, a loved one has been kidnapped, and the information on a phone might return them to me.
In that case, I am against you 100%.
In summary: Protect my information. But not the guy who took my loved one. He doesn't deserve protection.
Now solve my koan. GO!
Yes, and kidnapping is a really big problem in the U.S. so Apple should destroy all the privacy protection it builds into the phone and OS just for this circumstance.
All the government needs to do is force the individual who's phone they want to look into for the passcode and if they do not comply then hold them in contemp of court and put them in jail until they comply. It solves the problem either way the bad person is behind bars and if that person feels the information on the phone is worth protecting to the last day of their lives so be it that is their choose. This way the rest of us do not have to worrry about the government snoping on us and the bad guy are put behind bars.
Comments
This is true about cryptography also. Apple did not say it was impossible - they said it would be "extremely burdensome" to do so. This is the reason that with the old DES encryption the key size outside couldn't be any larger than 40 bit but inside was 128 (recommending 256 now I think) - a brute force attack is possible. It just is not practical. You can throw huge super computers at it or clusters of 1000's of desktop machines but in the worst case scenarios it takes years to break. The larger the key the bigger the possible set of keys. There are many other factors that influence this also.
Note: When you by a safe that is rated as uncrackable that is given a certain amount of time (15 min. to 1 hr.) based on response time.
You go, Apple. I am totally behind you, 100%.
However, that only applies up until I need you to decrypt a phone for my personal benefit. For example, a loved one has been kidnapped, and the information on a phone might return them to me.
In that case, I am against you 100%.
In summary: Protect my information. But not the guy who took my loved one. He doesn't deserve protection.
Now solve my koan. GO!
Yes, and kidnapping is a really big problem in the U.S. so Apple should destroy all the privacy protection it builds into the phone and OS just for this circumstance.
Go Apple, don't give into the surveillance society!
All the government needs to do is force the individual who's phone they want to look into for the passcode and if they do not comply then hold them in contemp of court and put them in jail until they comply. It solves the problem either way the bad person is behind bars and if that person feels the information on the phone is worth protecting to the last day of their lives so be it that is their choose. This way the rest of us do not have to worrry about the government snoping on us and the bad guy are put behind bars.