macaholic_1948
About
- Username
- macaholic_1948
- Joined
- Visits
- 3
- Last Active
- Roles
- member
- Points
- 5
- Badges
- 0
- Posts
- 262
Reactions
Comments
-
goofy1958 wrote: » First, I don't recall reading anything about it being physical access. Where did you read that at??? He needs a back door to bypass the encryption. How does physical access change that? How else can you read the contents o…
-
magman1979 wrote: » I do not extend any courtesy to those who ignorantly, and willfully hand over their rights to freedom and privacy in the name of empowering a power-hungry police state government, which uses the oldest excuses in the book to …
-
theunfetteredmind wrote: » You desire that for yourself or for everyone? In your mind, what is the difference between an encrypted phone and a phone with encrypted data? Imagine this scenario. A police officer stops you for speeding. He asks …
-
theunfetteredmind wrote: » Which is the same as others would likely do (with encryption in place so access can't be abused by whomever decides they really must have access with or without your consent). If you don't want law enforcement to have ba…
-
magman1979 wrote: » Here's a head's up for you, you're offering ZERO in way of constructive comments as well. In fact, what I've stated makes a LOT more sense than anything you've spewed... I have made comments that add to the discussion withou…
-
magman1979 wrote: » When you stand up for your rights and privileges as a US Citizen, and stop brown nosing the politicians giving it to you from behind and you taking it gladly, I'll pay attention to you. By your logic, and this DA's, you're…
-
theunfetteredmind wrote: » . I think you should lead the way. Make a copy of your house key and provide it to your local law enforcement in case they need to use it when they have a search warrant. if they come with a warrant to search my house, …
-
nevermark wrote: » You are arguing that privacy technology is not legal if you are arguing that all information must be kept in some government accessible form. Either it is legal to keep your information encrypted, so other parties can't loo…
-
magman1979 wrote: » Last time I checked, hackers have a much higher IQ than most of us, and can come up with very creative ways to exploit backdoors, even those meant for local, via remote. Please don't be naive. Have you not read the Snowden docs…
-
freerange wrote: » What planet are you living on? The Snowden releases prove unequivocally that the government wants access to all of our digital mobile and phone information all of the time. Period. If they have reasonable and probable cause to g…
-
auxio wrote: » Ah, the old "if you aren't with us you're against us" argument. How about a rational middle ground? I'm fine with a middle ground. Why don't you offer one instead of making silly comments?
-
freerange wrote: » What we want is for the government to stay out of our private lives. And absolutely no back doors. With back doors you leave yourself vulnerable to malfeasance as well. They are spending BILLIONS on homeland security. We expect …
-
goofy1958 wrote: » The DA is asking that a back door be built into the devices for law enforcement. Do you honestly think that hackers wouldn't exploit that back door in about a day? Get real. If a court order is issued to search a particular d…
-
nevermark wrote: » You have the issue completely upside down. There is nothing wrong with wire taps or court orders - nobody suggest these be discontinued. But neither is there anything wrong with people keeping their information private. Pr…
-
auxio wrote: » Because it's simply not a solution to the problem. Why should we all give up our privacy for a solution that isn't one? how are you giving up your lawful right to privacy? What the DA is asking for and to which I agree is the rig…
-
auxio wrote: » The fundamental problem is: strong encryption that can't be broken by law enforcement exists. So even if Apple adds a back door to iPhones, the people who really want to hide something can simply use different technology. So it's …
-
There is a huge difference between what this DA is asking for and what hackers and the NSA (or the KGB used to) do everyday. Invasion of user privacy takes four forms: A. Direct or passive remote monitoring or intercept of user information and da…
-
Another point, when you allow 3rd party vendors access to your data systems, including payment systems, it is a disaster in the making. http://www.knoxnews.com/knoxville/food-and-dining/8-colorado-stores-among-216-nationwide-affected-by-jimmy-john…
-
rob53 wrote: » No easy answer. Since you would own your phone, you don't have to pay the extra $25/mo. From the chart above, the cost would be $40 for 3GB data, unlimited minutes and texts. Taxes, a bunch of them, are added on top. I didn't chec…
-
SpamSandwich wrote: » Seems you're the one "squabbling" over commonly understood definitions. "Eye roll"