JOHN MCAFEE: I'll decrypt the San Bernardino phone free of charge so Apple doesn't need to place a back door on its product

Posted by freedomforall 9 years, 2 months ago to Government
43 comments | Share | Flag

"Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation's enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together."
SOURCE URL: http://www.businessinsider.com/john-mcafee-ill-decrypt-san-bernardino-phone-for-free-2016-2


Add Comment

FORMATTING HELP

All Comments Hide marked as read Mark all as read

  • Posted by $ jlc 9 years, 2 months ago
    We have to have a good definition of the problem before we can discuss the validity of potential solutions. The best description I was able to find was on io9:
    "Apple offered the government four alternative techniques to help it access the phone’s data, as an alternate to creating a special software, the executive told reporters. This is a very different scenario than the one portrayed in the government’s motion, which paints Apple as thoroughly uncooperative.

    But there is one thing the government and Apple agree on: It is technically possible for Apple to write the kind of software in demand. In fact, the executive admitted that the Cupertino company would be able to write this software not only for its newest phones but also for all phones it has in use. And that’s one of the reasons Apple insists that the burden of writing the software is far too great—any software it creates could act as a master key.

    Apple hasn’t revealed exactly how far it will go before it acquiesces. However, this will likely have an impact on how it designs security measures in the future. Apple may design them to make it technically impossible to force the company to comply. "

    If this is accurate, it changes my answer: Apple should (a) use one of its 4 solutions to hack the individual phone, (b) let the appeal against writing exploit software for the FBI drag on for years, and (c) make future versions of the iphone unhackable. (God should make a rock that is to big for him to lift.) After years worth of appeals, and with all of the phones by-that-time unhackable, the issue will be moot.

    Jan
    Reply | Mark as read | Best of... | Permalink  
  • Posted by $ allosaur 9 years, 2 months ago
    Don't worry, folks, our wonderful government is only here to help us.
    Big Brother just wants a backdoor to watch our everything.
    So you don;t want to be looked upon as a domestic terrorist, do you? For sure you don't!
    Just get with the system and represent yourself as one cool dude or dudette.
    Go, go, good government, go!
    Good government is . . . WORKING!
    Yay!.
    Just love your good government
    I am Bernie Sanders and I approve of this message. .
    Reply | Mark as read | Best of... | Permalink  
  • Posted by Bethesda-gal 9 years, 2 months ago
    Apple isn't refusing the warrant, that would be obstruction of justice. They're appealing it and it is still in that process.

    2. According to Maria Bartaromo on Fox Business News, Tim Cook's fight is all theatrics and he will comply as soon as the legal objections are exhausted, but to save face both in the industry and internationally, to make it clear that govt doesn't control corporations as they do in China.
    Reply | Mark as read | Best of... | Permalink  
  • Posted by Herb7734 9 years, 2 months ago
    For the Solons of Washington, nothing less than another limitation to our freedom is to be expected. Many have used patriotism as an excuse for collectivism, even those who are supposedly Constitutional scholars.
    Reply | Mark as read | Best of... | Permalink  
  • Posted by $ MikeMarotta 9 years, 2 months ago
    AJAshinoff wrote: "Apple had done this very thing 70 times for the fed gov in the past. Why take a stand on this instance?..."

    Apple is taking the producer's stance. Remember that Hank Rearden employed Wesley Mouch as his lobbyist in Washington. Why should Rearden later refuse to sell his Metal at the market price to the State Science Institute for their Highly Important Project? Why object to the Gift Certificate? He went along "70 other times". Why draw the line here? Why draw it at all?
    Reply | Mark as read | Best of... | Permalink  
    • Posted by plusaf 9 years, 2 months ago
      I don't know if the technology or science behind my thoughts are feasible, but if I were Tim Cook, I'd have my 'best and brightest' re-engineer the encryption engines so that in the Next Release, the code to crack the Previous Releases could never work.
      Then push every Apple Device's OS to the NEW Encryption Level and THEN give the gumblement the help to crack the old security technology.
      Impossible, maybe. "Unfair to Apple customers too lazy, stupid or ignorant to accept the new Encryption Download?"
      Maybe, but maybe they deserve to be Darwined out of the gene pool anyway!
      Reply | Mark as read | Parent | Best of... | Permalink  
    • Posted by DrZarkov99 9 years, 2 months ago
      The previous incidents were with an earlier iOS, with less encryption. Apple has listened to their customers regarding privacy issues, and has deliberately removed earlier back door code. There are licensed third party applications offered to corporations and government that enable those headquarters to disable passwords remotely. Unfortunately the county that employed the terrorist decided not to have this code installed.
      Reply | Mark as read | Parent | Best of... | Permalink  
    • Posted by ProfChuck 9 years, 2 months ago
      Is the encryption on the SanBernardino phone the same version as those earlier cases? Apple has gone to great lengths to create a truly unbreakable cipher. It may be that no one, not even Apple, can crack the system if there isn't a back door already in the code.
      Reply | Mark as read | Parent | Best of... | Permalink  
  • Posted by $ AJAshinoff 9 years, 2 months ago
    Lets look at this rationally as well as logically. The cellphone in question was not owned by the individual, it was owned a a government entity (his employer). Apple has used their tools to break into 70 phones at the governments request, they are refusing to hack into this known terrorist work phone. Why?

    If that government agency wants a back door into the phones it provides its people and are willing to pay for it apple should provide it (or the business should find other phones). The fedgov, following a successful terrorist attack, subpoena's apple to do something they've readily done before and they refuse - obstruction of justice.

    This is not about privacy, the terrorist was not the owner. This is about politics and defiance.

    Apple should comply TO SPECIFICALLY keep the hack out of the fedgov hands. If the fedgov gives McAfee a phone to hack they or he will own the backdoor (hack) and have it for future use, to use on whoever they want.
    Reply | Mark as read | Best of... | Permalink  
    • Posted by $ MikeMarotta 9 years, 2 months ago
      Aligned once again with the authorities, Alan? I am so disappointed... You know, a thousand years ago, I read a science fiction story called "Classicism." On a spaceliner, the passenger catches the eye of the flight attendant and she is interested. He tells her of his latest victory, a scam on a bureaucrat whom he tricked into believing that he actually had developed a transdimensional transporter. "That's horrible!" she says. He is taken aback. "I thought that you, too, are a Classicist." She says that she is: Her family's Middle Classicism is all about manicured lawns and neat communities. "What do you practice?" He replies: "Neo-classicism."
      Reply | Mark as read | Parent | Best of... | Permalink  
      • Posted by $ AJAshinoff 9 years, 2 months ago
        I'm not sure how you see this.

        A government agency owns the phones. (their property)
        A government agency is seeking their phones to be hacked to obtain potentially critical and time sensitive information (their phones, their property)
        A vendor of that government agency is denying them service, a service needed to collect potentially critical information - obstruction.

        Apple had done this very thing 70 times for the fed gov in the past. Why take a stand on this instance? An instance where terrorism is confirmed, lives have been lost, and additional terrorist actions could be prevented."

        I do not see how this targeted instance equates to the flood gates opening UNLESS the fed gov has to get someone like McAfee to create a hack, which they or he will then own (creating a vulnerability). Apple should provide this as an internal service for a large client with a very good need. Just as I would hack a client server to get by a lost password.

        Are library computers private property too?
        Reply | Mark as read | Parent | Best of... | Permalink  
        • Posted by $ MikeMarotta 9 years, 2 months ago
          Libraries are whole other domain. Librarians are very firm in their refusals. If I had to choose between police forces and libraries to protect my freedom, it would be libraries hands down. I even contribute extra money to my city library. Libraries are the sine qua non of civilization. Everyone has technology. Everyone has rites of passage. Only civilized cultures have libraries.

          You must be referring to some instance that I do not know of.
          Reply | Mark as read | Parent | Best of... | Permalink  
          • Posted by $ AJAshinoff 9 years, 2 months ago
            I setup the network for a library here in Phoenix. One step further, I've setup networks for many companies here in Phoenix (including corporate smart phones). On several occasions, the library in particular, someone locked themselves out of their system, a library patron hacked the system and put in a password, or a disgruntled employee left and encrypted a workstation (event he cataloging server once (really sucked)). I was called in to hack to recover data or a void or reset password or to decrypt a system at the behest of my client. I did so without hesitation (yes, a bit of code needed to be written) because they were the legitimate owners of the machines and everything contained therein. This situation is no different, except that a government entity if the owner and Apple the vendor. The fedgov is trying to gain time critical information and (because a terrorist act HAD been committed) evidence. These phones are the property of that government entity.

            Frankly, were I the one pulling the strings, I'd pay someone to hack the phone, keep the program to myself for future use and then find another vendor for my phones.

            ps

            A library is just a committee which runs like a business. Every machine on those networks is open to scrutiny and forensic examination. Gates was a real **ick about unfettered websearch, uncovered a lot of stupid kids and adult pervs.
            Reply | Mark as read | Parent | Best of... | Permalink  
            • Posted by 9 years, 2 months ago
              Apple's point in this case is that they can't just decrypt that one. It must be a general solution to the decryption technique and they will not do that because they have promised all their customers they would not.
              This is another case of government using a situation to do something that destroys liberty and privacy, and again terrorism is the excuse. This time they are using Apple as the actor to cover the crime. It makes me wonder if this wasn't another NSA false flag.
              Reply | Mark as read | Parent | Best of... | Permalink  
  • Posted by random 9 years, 2 months ago
    Hollow, unfulfillable promises for publicity.

    I wonder how funny the elections will be when Kanye West runs in 2020.
    Reply | Mark as read | Best of... | Permalink  
    • Posted by $ MikeMarotta 9 years, 2 months ago
      I dunno. I am just a technical writer, but I am active in the computer security community here in Austin.
      (I am on the planning committee for BSides Austin 2016 http://bsidesaustin.com/). It seems pretty clear to me that (1) this is about more than just one iPhone (2) the County IT manager is at fault for not requiring the necessary features (3) the folks with mohawks and pierces can do what the FBI cannot and (4) on the anniversary of the Robert Hanssen case, (http://www.nydailynews.com/news/crime..., it is important remember that the FBI has been hacked time and time again since the days of dial-up modems; therefore, they cannot be trusted to keep this secret, even if it were given to them.
      Reply | Mark as read | Parent | Best of... | Permalink  
  • Posted by $ nickursis 9 years, 2 months ago
    Well, here is a new wrinkle in the whole thing: Apple told them what to do to try to get a new backup made, but the FBI apparently told San Bernadino to reset the password to the iCloud account, screwing up that possibility. Could it be they are manipulating the situation to force Apple to give them an open door to all phones?

    http://www.cnet.com/news/apple-says-i...
    Reply | Mark as read | Best of... | Permalink  
  • Posted by $ Olduglycarl 9 years, 2 months ago
    From what I understand, the fbi is not interested in solely getting into this one phone...I think if they were there would not be an issue.

    I despise hackers because they have cost us a lot of money we might have used elsewhere...like preventive heal measures, savings for a rainy day or in case of an economic collapse...nowadays, it costs a lot of money to keep the same computer running well cause of all the garbage coming from the internet.

    There is always some creature out there that ruins a good thing.
    Reply | Mark as read | Best of... | Permalink  
  • Posted by Danno 9 years, 2 months ago
    How is McAffee going to social engineer a break-in on a physical hardware device? Did his hackers snoop that phone number and hack the communication stream that had password? Without that the newish iPhones use one-way hash encryption and does not store the user's password on the device or anywhere. Therefore, without the password which is needed to unencrypt the iPhone's stored data, the FBI needs direct access to the storage volume and then give it to NSA to brute force attack it.

    Did you understand what I just said? Translate: the FBI/NSA wants Apple to remove its strong encryption on all iPhones.
    Reply | Mark as read | Best of... | Permalink  
  • Posted by strugatsky 9 years, 2 months ago
    So, the FBI and other 3-letter agencies had all the information required to prevent the massacre. But they did nothing, knew nothing, saw nothing... Now, they want to create even more of a police state and acquire more control of the citizens so that, postmortem, they can definitely determine that this was a case of workplace violence!

    And the excuse that they need the contacts is total BS - all contacts are recorded and traced. The content of the messages may be encrypted, but they know whom the messages were addressed to. Shouldn't take much brains (admittedly, more than they have) to follow the leads.
    Reply | Mark as read | Best of... | Permalink  
    • Posted by $ AJAshinoff 9 years, 2 months ago
      Is this true? Do you have a link?
      Reply | Mark as read | Parent | Best of... | Permalink  
      • Posted by strugatsky 9 years, 2 months ago
        They were "radicalized" in their mosque - doesn't the FBI monitor those? They displayed their allegiance at work - but the leftists that they worked with (and slaughtered) found that quite acceptable. Their neighbor saw obvious signs of danger - but was prevented from voicing them due to political correctness.
        Aren't there plenty of areas for the FBI to concentrate on instead of further eroding the rights of all Americans in the hope of finding those pesky "right-wing Constitutionalists"?
        Reply | Mark as read | Parent | Best of... | Permalink  
        • Posted by $ AJAshinoff 9 years, 2 months ago
          If the FBI had intelligence that could have prevented what happened and did nothing I'm willing to change my position on the matter. If this is just supposition my initial impression stands. I have no doubt that the government is constantly at war with the Constitution and its Bill of Rights. I also have no doubt that after a crime, or in this care a terrorist act, the authorities collect as much evidence as they can. In this case the evidence could lead to others who may be willing and able to conduct future acts of terror on US soil.
          Reply | Mark as read | Parent | Best of... | Permalink  
          • Posted by strugatsky 9 years, 2 months ago
            They already have records of whom and when the terrorists corresponded with. Those logs are kept by all phone companies and Internet providers and regularly turned over to the government. In a month following the last Cloud backup, which the Feds have access to, there couldn't be that many leads that they can't follow. They are doing an "investigation" - they are doing theater. When the mentally unstable sicko had a murder spree in the Navy Yard, the FBI cut away walls and steel beams for "analysis" in the lab! Analysis!?! They were thoroughly analyzing what? The origins of the 12ga shot shells bought in Walmart? Really? The entire building was taken apart and forensically analyzed - and the determination? Yes, they confirmed the number of deaths and who was killed by which projectile! Impressive. Oh, yes, another $100M was requested and received to build a new building. Ya know, I would rather they did their jobs than postmortem theatrics.
            Reply | Mark as read | Parent | Best of... | Permalink  
            • Posted by 9 years, 2 months ago
              I'd rather they all were fired and the federal police ended forever. The state and local police have the ability to investigate and to share information. Federal police is just a power grab that is looking more every day like Naxi Germany and Soviet Russia.
              Reply | Mark as read | Parent | Best of... | Permalink  
  • Posted by term2 9 years, 2 months ago
    First of all, the government could care less about this particular phone. They want to be able to crack any and all encription to increase their power. This foray into the legal system is just a convenient excuse to get universal access to all of our secrets.

    Second of all, I cant believe the NSA cant pay some hacker (like McAfee) to do this. Snowden could probably do it also.

    Thirdly, This attack on apple is such a thinly disguised attempt to take away all our security that it should be seen and treated as such.

    If they do get to get Apple to capitulate, I will have to just not use their device's encription anymore and find another way to keep my info safe.
    Reply | Mark as read | Best of... | Permalink  
  • Posted by johnpe1 9 years, 2 months ago
    the govt doesn't want anyone to do the decryption
    for them -- they want the key. . they want the omniscience
    which they see in the mirror when they shave or apply
    make-up or brush their teeth or whatever. -- j
    .
    Reply | Mark as read | Best of... | Permalink  

FORMATTING HELP

  • Comment hidden. Undo