robroy72

About

Username
robroy72
Joined
Visits
0
Last Active
Roles
member
Points
13
Badges
0
Posts
3
  • House committee invites Apple CEO Tim Cook, FBI Director James Comey to discuss encryption

    The biggest part of this problem is when you get people yapping their mouths who do not know what they are talking about.  Most people have no real clue how the technological processes are setup for these systems to work and for proper security to be in place.  "Oh just have Apple make a program to get into the device" -- shows how little these government lawyers at the Justice Department and politicians (Trump, Obama & most in DC) know how this stuff works.  

    In turn you have other incompetent staff at San Bernardino County that have no clue on how to properly manage iOS devices in an enterprise environment.  

    And to think -- some people want more government in our lives and "caring" for us!
    cornchipbrian greenanantksundarambaconstanglatifbpberndogjbdragonhlee1169argonaut
  • Apple ID linked to terrorist's iPhone 5c changed while device was in government hands, Apple says [


    linkman said:
    volcan said:
    How did they change the Apple ID associated with the phone if the phone was locked?
    Most likely through Apple's Mobile Device Management. It was his employer's phone and assigned to him.
    No, most likely they logged into the AppleID.apple.com (probably reset the password by having AppleID send them an e-mail to Farook's San Bernardino County's account, which they would have control over and access to).  

    If San Bernardino County would actually be running an MDM like any other business to setup, restrict, track and control their devices, they simply would have had the MDM system reset the PIN number so the FBI could access the device.  Every MDM system I have ever reviewed and used gives the company the capability to reset the PIN, lock the device or wipe the device.

    In the end it looks like San Bernardino County is the negligent one in this case on two accounts (1) did not use a proper MDM solution to manage the device to begin with and (2) then screwed up any attempt at data recovery by changing the AppleID password prevent any cloud based backups from the device.

    It appears Apple has already bent over backwards to assist the FBI in how the are able with this device.  This court action thus, is not about getting into this particular phone, but creating a backdoor giving the government access to all future devices.  Beyond U.S. citizen's civil liberties and constitutional protections, one last thing to ponder -- if the Justice Department succeeds in this, what kind of defense will Apple and other U.S. companies have when the likes of Russia and China begin to demand back doors in every encrypted product, and how will that leave any user (including U.S. gov't agencies) exposed for foreign espionage?
    cornchiplatifbpnouserpscooter63
  • Apple ID linked to terrorist's iPhone 5c changed while device was in government hands, Apple says [

    volcan said:
    How did they change the Apple ID associated with the phone if the phone was locked?
    The didn't change the Apple ID. They changed the passcode (I will use password from here on) associated with the AppleID probably via appleid.apple.com.
    However, that new password would have to be entered into the iPhone (Settings-iCloud) to have that iPhone activate iCloud backup, else it can't connect.
    Somebody probably thought they would change the password to get at the data in iCloud, found out the data hadn't been backed up in months (or at all), then learned that they couldn't get the iPhone to start auto backup without entering the new AppleID password in settings, and because they didn't know the original password, could not set it back. 
    Now they are stuck with an iPhone that can't back up to iCloud and they can't change to the new password because they don't know the 4-digit PASSCODE to access the iPhone. Thus, because the FBI screwed up, they want Apple to create a software hack to bypass the 'Wipe data after 10 wrong passcode attempts' so they can brute force the device; easier to do with only 4 numeric digits, especially when you have to use 4, not 1, 2 or 3.
    Once the iPhone passcode is broken, then the FBI can enter the NEW AppleID password to get the phone to sync with iCloud, but then it won't be necessary because they can now simply copy everything to a computer.

    In other words, they want Apple to save their butt for doing something they thought was smart, but didn't work, so they try Plan B and Apple balks.
    Exactly the case!
    latifbp