misa
About
- Username
- misa
- Joined
- Visits
- 34
- Last Active
- Roles
- member
- Points
- 270
- Badges
- 1
- Posts
- 827
Reactions
-
Apple should work with carmakers instead of building vehicle on its own, Fiat Chrysler CEO says
SpamSandwich said:mike1 said:In other words, buy us. He' been trying to find a merger partner for a while.
Partnering with Toyota/Lexus would be preferable to any US company short of Tesla itself. -
Avid iPhone user Donald Trump calls for Apple boycott over encryption fight
fordee said:Tim Cook is a patriot. Donald Trump is a traitor to the American people.
-
User security, privacy issues draw sharp contrast between Apple iOS, Google Android in FBI encrypti
This tells you quite a bit about the safety of "Cloud" services. The FBI and NSA can twist an arm and get that data. So the encryption layer has to be on the device (your device) side.
Google and such make their money at the expense of it's users privacy. I would never EVER use an Android device for anything but throw-away uses. The Apple devices are far more secure for this purpose, and the iOS devices are far more secure than the MacBook/iMac because the hard drive can be ejected from the notebook/desktop.
What is going to happen is that Apple is going to start making the SSD's in their laptops and desktops non-removable and encrypted so that the same iOS security then applies to the desktops.
As for it being "impossible" for the FBI or NSA to break into a device... they can obviously emulate the device hardware, or even pull the storage and brute force it that way. Both solutions risk destroying the device. Asking Apple to create a backdoor is not a solution and it puts the entire burden of unlocking the device on Apple instead of the FBI/NSA who have the probably cause.
Any kind of backdoor is a bad thing. You can never prevent the keys from being leaked, look at how quickly CSS, AACS, BD+ and various other ways of defeating HDCP work in the media. You literately can not mandate that there be a backdoor in one content protection measure and not create backdoors in everything that implements it.
If law enforcement wants to prevent having to deal with this in the future, they should not kill suspects except as a last resort. -
Hackers trying to bribe Apple workers into handing over login information, report says
cali said:SpamSandwich said:As long as there are incentives, there will be people willing to take great risks for the rewards.
This is probably an excellent reason ALL Apple logins and passwords should be replaced with either Touch ID or the combination of Touch ID and a password, so no one, not even Apple could access user data.
And I thought by 2015 everything on Apple devices would be TouchID compatible. Seemed logical even way back when it anounced.
On the Windows side of things, things are compounded further as only a password can be used as there's no way of having TouchID on any machine as an external thing, since it defeats the secure element.
Like I expect sometime soon that TouchID type of sensors will be part of computer monitors and be transmitted over the HDCP handshake as an alternative to logging in with a password or "cloud password"
Personally I think logging in with your apple or microsoft login into your PC/Mac is putting way too much faith in Apple or Microsoft and internet connectivity reliability.
-
Apple acknowledges 'Error 53' glitch, says it's part of Touch ID security [u]
linkman said:Why not fix the problem by having iOS wipe out the data in the secure enclave/Touch ID, thus ensuring the data is not compromised instead of bricking it? Or at least let the phone work without use of Touch ID (yikes, it'd be like using an iPhone 5). Yes, this would allow non-Apple authorized repairs to actually succeed and possibly deprive Apple of a bit of revenue. As for the person quoted in the Guardian article that lost all of his/her data: backup your stuff! Data-wise this is no different than losing your iPhone. Apple makes it so easy to backup and restore that there should be no excuses. If you value the information then back it up.
If the secure element is compromised, you don't want the device to be accessed, period. Like the proper solution really is "wipe the device and restore from a backup" and the restore from the backup re-syncs the secure element.