JOHN MCAFEE: I'll decrypt the San Bernardino phone free of charge so Apple doesn't need to place a back door on its product
Posted by freedomforall 9 years, 2 months ago to Government
"Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.
It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation's enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together."
It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation's enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together."
Previous comments... You are currently on page 2.
2. According to Maria Bartaromo on Fox Business News, Tim Cook's fight is all theatrics and he will comply as soon as the legal objections are exhausted, but to save face both in the industry and internationally, to make it clear that govt doesn't control corporations as they do in China.
This is another case of government using a situation to do something that destroys liberty and privacy, and again terrorism is the excuse. This time they are using Apple as the actor to cover the crime. It makes me wonder if this wasn't another NSA false flag.
Apple is taking the producer's stance. Remember that Hank Rearden employed Wesley Mouch as his lobbyist in Washington. Why should Rearden later refuse to sell his Metal at the market price to the State Science Institute for their Highly Important Project? Why object to the Gift Certificate? He went along "70 other times". Why draw the line here? Why draw it at all?
Frankly, were I the one pulling the strings, I'd pay someone to hack the phone, keep the program to myself for future use and then find another vendor for my phones.
ps
A library is just a committee which runs like a business. Every machine on those networks is open to scrutiny and forensic examination. Gates was a real **ick about unfettered websearch, uncovered a lot of stupid kids and adult pervs.
You must be referring to some instance that I do not know of.
A government agency owns the phones. (their property)
A government agency is seeking their phones to be hacked to obtain potentially critical and time sensitive information (their phones, their property)
A vendor of that government agency is denying them service, a service needed to collect potentially critical information - obstruction.
Apple had done this very thing 70 times for the fed gov in the past. Why take a stand on this instance? An instance where terrorism is confirmed, lives have been lost, and additional terrorist actions could be prevented."
I do not see how this targeted instance equates to the flood gates opening UNLESS the fed gov has to get someone like McAfee to create a hack, which they or he will then own (creating a vulnerability). Apple should provide this as an internal service for a large client with a very good need. Just as I would hack a client server to get by a lost password.
Are library computers private property too?
(I am on the planning committee for BSides Austin 2016 http://bsidesaustin.com/). It seems pretty clear to me that (1) this is about more than just one iPhone (2) the County IT manager is at fault for not requiring the necessary features (3) the folks with mohawks and pierces can do what the FBI cannot and (4) on the anniversary of the Robert Hanssen case, (http://www.nydailynews.com/news/crime..., it is important remember that the FBI has been hacked time and time again since the days of dial-up modems; therefore, they cannot be trusted to keep this secret, even if it were given to them.
If that government agency wants a back door into the phones it provides its people and are willing to pay for it apple should provide it (or the business should find other phones). The fedgov, following a successful terrorist attack, subpoena's apple to do something they've readily done before and they refuse - obstruction of justice.
This is not about privacy, the terrorist was not the owner. This is about politics and defiance.
Apple should comply TO SPECIFICALLY keep the hack out of the fedgov hands. If the fedgov gives McAfee a phone to hack they or he will own the backdoor (hack) and have it for future use, to use on whoever they want.
I wonder how funny the elections will be when Kanye West runs in 2020.