Sign up and stay connected to your favorite communities.

sign uplog in
17.4k
Posted byu/[deleted]5 months ago
Soft paywall

FBI brands Apple 'jerks' for making iPhones too difficult to crack

1.1k comments
86% Upvoted
What are your thoughts? Log in or Sign uplog insign up
3.7k points · 5 months ago

Best advertising Apple could possibly have.

Or best thing make people think you don't have a crack.

Usually, the $5 wrench hack works.

[deleted]
31 points · 5 months ago

every sub, every post, look far enough and you'll eventually find it

1 more reply

11 more replies

251 points · 5 months ago

Seriously, I highly doubt they don't have a way to get in, they just don't have a way that they can tell people about. The government does a lot of shit and they really like to make people think that they play by the same rules we do.

They don't.

At the heart of Apple's security architecture is the Advanced Encryption Standard algorithm (AES), a data-scrambling system published in 1998 and adopted as a U.S. government standard in 2001. After more than a decade of exhaustive analysis, AES is widely regarded as unbreakable. The algorithm is so strong that no computer imaginable for the foreseeable future-even a quantum computer-would be able to crack a truly random 256-bit AES key. The National Security Agency has approved AES-256 for storing top-secret data.

-- https://gizmodo.com/5934234/ios-encryption-is-so-good-not-even-the-nsa-can-hack-it

Also there is not, and will never be, a golden key. It would make all their encryption worthless because of precedence and leaks.

There are other ways to implement backdoors though. Or weaken the key generation etc. I'm not saying they have done that, I'm just saying.

132 points · 5 months ago

The problem is not the encryption algorithms but end point security. Best encryption in the world if they have your password its worthless. And getting someones pass is easy, very easy, I can guarantee you your GF has seen you input your pass,

237 points · 5 months ago

your GF

I fucking wish

168 points · 5 months ago

GF can't see your password if you don't have a GF. -points to head-

Well the inly GF i have is in FF8 sooo.....

3 more replies

2 more replies

end point security

https://xkcd.com/538/

Meatware code is out of date in today's security environment.

1236 is my passcode and it has yet to be cracked.

Well now all of reddit knows! Ya dun goofd

1 more reply

2 more replies

15 more replies

8 more replies

39 more replies

What a very informed opinion. -_-

15 more replies

48 more replies

4 more replies

22 more replies

7.2k points · 5 months ago

"Bully brands student 'Nerd' after putting a lock on his lunchbox, after bully swears he was just going to rifle through his food without taking anything"

he was just going to rifle through his food without taking anything

unless he finds something that shouldn't be there... then... good ol' retroactive probable cause...

With a possible side of civil asset forfeiture...those damn crime committing assets...

219 points · 5 months ago

I couldn't help but take that sandwich sir, it was a necessary loss to ensure that you are a law abiding citizen. You should be thanking me for being so thorough at my job!

103 points · 5 months ago

That sandwich shot a guy just next week.

The Minority Sandwich Report

1 more reply

1 more reply

1 more reply

The United States vs. Six Homemade Cookies, found in a nerd's lunchbox

"Your honour, Grade 6 Bully Willie Obbleton on behalf of the government..."

Nelson the bully paces back and forth in front of Milhouse on the witness stand, pondering his questioning tactics before grabbing Milhouse and repeatedly punching him in the stomach

Lisa: "Objection, Your Honour!"

Bart: "I'm gonna allow it."

"You gimme those cookies!" thud thud thud

"Your honour, grade six bully was expressing concern for Timmy's well being when he asked " Why are you hitting yourself?"

I cite “United States v. Article Consisting of 50,000 Cardboard Boxes More or Less, Each Containing One Pair of Clacker Balls" Government ordered seizure of these toys under the Federal Hazardous Substances Act because children could hit themselves.

FIFY

3 more replies

Those cookies were asking for it! Look at how delicious they appear! Who wouldn’t eat them immediately?

1 more reply

4 more replies

But with a tough lock on an unbreakable box, the bully would have no way of knowing if there's a detailed plan to blow up the school or just a small carton of milk, plain strawberry jam sandwich and an apple inside. All the bully gets is a pretty looking box that may stink up after a while.

Unless the bully relentlessly beats the nerd with a $5 wrench

I imagine the bully would save the cash and just beat him with the box

Comment deleted5 months ago(2 children)
[deleted]
9 points · 5 months ago

Life has desensitized us, Reddit just proves it.

1 more reply

1 more reply

Hello there xkcd! https://xkcd.com/538/

1 more reply

1 more reply

who needs probable cause when you can just do parallel reconstruction and manufacture it.

5 more replies

And the nerd is going to grab his dad's rifle to get his lunch back.

Plz don't put me on the list fbi.

Just a joke.

Right guys

36 points · 5 months ago

We're going to need you to hand over your lunchbox, unlocked.

1 more reply

If the nerd didn’t have anything to hide he shouldn’t need a lock on his lunchbox

108 points · 5 months ago

Maybe he has nothing to hide but wants a lock on his lunchbox to prevent people from stealing his lunch money and other personal information he happens to keep in his lunch box. Identity theft can ruin lives.

Saying that you don’t have anything to hide so you you’re not worried about having your right to privacy violated is akin to saying you’re fine with having your right to free speech violated because you don’t have anything to say.

1 more reply

Identity theft is not a joke Jim! Millions of families suffer every year!

Bears, Beets, Battlestar Galactica

what is going on? what are you doing?!

So, the nerd should have built an alternative entrance to the lunchbox so only the bully could open it, yet everyone else would think it was closed.

So the nerd put on a secret lock with a secret code that only the bully has, only the bully let slip that information and now everyone can get into the lockbox and the owner thinks only the bully can.

1 more reply

2 more replies

The bully would also like for the nerd not to lock his house or his car. Maybe the nerd doesn't have anything to hide, but the bully has no right to know what he's eating for lunch, and if he really wants to know, bully should get a warrant.

[deleted]
5 points · 5 months ago

Same reason I let strangers wander around inside my home

1 more reply

19 more replies

I don't hear the NSA complaining...

That’s because they are sharing a sleep number.

So theyre barely talking, and one of them is watching letterman?

Which one is the old man with erectile dysfunction?

The president.

Bravo, bravo

2 more replies

2 more replies

1 more reply

The point of the NSA is to not exist. They can’t be making statements all over the place so they get the FBI is scream and holler bc the FBI is to contain criminals and the NSA is to contain civilians.

86 points · 5 months ago

No Such Agency.

Comment deleted5 months ago(2 children)

2 more replies

24 points · 5 months ago · edited 5 months ago

Its a tad difficult to believe considering they have a website and logo, feature regularly on EFF's twitter feed and have a bunch of movies made about them. The real "No Such Agency" is something else says the tinfoil hat inside me.

11 points · 5 months ago

Well yeah, after a certain point that term became a joke instead of what people actually said. ;) For a while they tried to deny it existed, though.

1 more reply

DIA, they exist and it's known but the average civilian doesn't know about them.

This is more a throw back to when they were still trying to hide in plain sight. The government used to deny their existence. Unfortunately, every secret has a half-life based on the number of people who know it. The more people who know a secret, the sooner it becomes public. Ultimately, the NSA was just too big to keep under wraps. Towards the end of that time, the joke ran, "There's No Such Agency, just ask them, they'll tell you."

20 points · 5 months ago

The point of the NSA is to not exist

On this, I can support the NSA; I would love for them to not exist at all.

Careful what you wish for. Well probably end up with something even more intrusive...

1 more reply

1 more reply

3 more replies

dont be naive, they're hacking the shit out of those phones.

Yeah. That’s why they had to pay an Israeli firm to help crack on iPhone 5c...

Which was already obsolete, had an old version of iOS, and the processor wasn’t part of the generation that even had a Secure Enclave on it.

Real geniuses at work there, huh?

Or it was all for show, and they could have just handed it to the NSA to crack anyway. Instead THEY almost got the manufacturer to give them a back door. When Tim Cook did the world a solid, they had to save face and pretend they couldn't hack it themselves.

I think you're overestimating how often the NSA and FBI share tools.

Information? Yeah, sure they'll pass information around like cake. But tools? The FBI isn't getting them from the NSA.

Too true. If the FBI thinks they're the adults and local police are the children - then the NSA thinks they're the adults and the FBI are the children.

6 more replies

12 more replies

7 more replies

1 more reply

8 more replies

707 points · 5 months ago

I would use that in the next Apple ad.

Why not in this one? 😂

-Send using my 📲

1 more reply

1 more reply

6 more replies

684 points · 5 months ago

Oh, no. They are far too easy to crack -Typing on my shattered phone screen

50 points · 5 months ago

Glass is just a really fragile material. I got tired of my note 8's case and after a week of no case, the back cracked. Luckily the front didn't crack and I've put the case back on since then.

6 more replies

I hope Apple bricks this guy's smartphone.

They could technically clone it repeatedly and keep trying.

Except the encryption keys are held in hardware; with no way to know what they ware, and no way to extract them.

Which is why decryption attempts have to be performed on the hardware.

22 points · 5 months ago

Unlike my Surface Pro 4 that automatically backs up the hardware decryption keys to Microsoft. Its billed as a convenience allowing you to login to your account to retrieve them.

Keep in mind that Micro$oft cooperates with all intelligence requests, constitutional or not. your security is gone right there

3 more replies

1 more reply

12 points · 5 months ago · edited 5 months ago

I read somewhere there a two Israeli firms who are helping authorities around the world with iOS hardware locks.

Yes.

They probably found a bug in the SecureEnclave code and exploited it.

Hopefully Apple figured out the vulnerability and closed it. They were demanding the FBI turn over information on how it was done.

Fortunately any evidence the FBI obtain they won't care try to use in court - as they'd have to explain their chain of evidence - and how the phone was hacked. For now the FBI just realized that the San Bernadino terrorists phones contained nothing useful.

31 points · 5 months ago · edited 5 months ago

IIRC the device they unlocked was an iPhone 5c, so it didn’t have a Secure Enclave. I assume that made it easier to hack and that whatever method they used can’t be used on the iPhone 5S and above.

6 more replies

1 more reply

Modern systems have a secure part that is very hard to clone (Apple calls it secure enclave). This is basically what the FBI is complaining about.

Nope. Apple phones are 'hardware encrypted'. They really can't do shit to get into it.

1 more reply

3 more replies

But with the facial recognition feature, can’t a cop just hold the phone up to the persons face and bam! It’s unlocked!

Yea but it doesn’t work if you make a silly face.

Edit: Seriously I just tried it.

Nothing a taser can't fix.

That’s how you end up with permanent silly face.

Would it be apt to call that a... taser face?

What was your second choice... Scrotum Hat?

8 more replies

"Ha ha, copper, that was my taser face - my iPhone can only be unlocked with my orgasm face!"

"That can be arranged" ziiiip

Win win?

taser face

Sounds like a good street name

Good Ravager name too.

1 more reply

1 more reply

10 points · 5 months ago

Do you know how they milk semen from bulls?

Electrode to the testicle, I imagine a taser to the nuts would do similar...

Actually I heard it was an electrode up the butt, to stimulate the prostate.

they do this for sheep too.

1 more reply

Would be an amazing excuse to never resond to your s.o.'s texts

2 more replies

Eyes have to be open too, so they can't unlock your phone while your asleep

Most have their eyes open when they die

Bonus: Once you are dead you can't complain about your right to privacy.

1 more reply

28 points · 5 months ago

Solution: die with your tongue hanging out and X's for eyes, for security reasons

Or blinded by pepper spray.

Open your eyes and stop resisting!

6 more replies

1 more reply

1 more reply

I've always thought about this. The only reason I use fingerprint recognition is because it's convenient. If somebody really needed to get into my phone, it'll be easier to obtain my thumb than a complex password

Weirdly, the Supreme Court has decided that police can require you to open your phone using your fingerprint, but can't require you to give out your password.

Before handing your phone to the police, make sure the password is on.

177 points · 5 months ago

Biometrics are something you have/are, so they can be compelled by the court like regular fingerprints, etc.

Passwords are something you know, and you can't be compelled to testify against yourself.

So potentially, if we one day have 'brain scanners' (thinking black mirror), would someone be required to take it to find out your password since it is something you are/have (in your brain)?

I think the laws need to be updated to stay up to date with the technology.

[deleted]
37 points · 5 months ago(2 children)

My crim pro professor would try to do these but was too technologically illiterate to understand how something like this would work, which got frustrating quickly.

1 more reply

1 more reply

5 more replies

58 points · 5 months ago

On an iPhone you can press the power button 5 times quickly, and that locks it so it requires your passphrase.

I wish there was a way to set a specific finger to lock it down and require password. Like my thumbs and right index finger unlock the phone but if I use my left index finger, it locks it down. That way if I forget to hit the power button 5 times or whatever it is on Android, and the cop demands I unlock it I just use my left index and "Oh what? That's odd it's locked more now how did that happen?"

If you just use a wrong finger a few times it will lock out Touch ID.

7 points · 5 months ago

Though in the scenario where you're being compelled to unlock it using your fingerprint, wouldn't purposely using the wrong finger (presuming that could be proven) lead to an obstruction charge?

They could only prove purpose if you admit it.

Plus, my proper finger has trouble with TouchID fairly often.

1 more reply

You can propably do it with root.

3 more replies

1 more reply

Comment deleted5 months ago(3 children)
13 points · 5 months ago

That is a setting you have to enable. Don’t enable it :P See Settings -> Emergency SOS

You should see it did actually lock out your touchID

2 more replies

5 more replies

This is not true in the UK though

9 points · 5 months ago

UK doesn't have protection against self-incrimination?

35 points · 5 months ago · edited 5 months ago

Not since section 49 of the regulation of investigatory powers act came into force in 2007 - it's up to 5 years in prison if you don't decrypt data on demand, and potdntially an extra 5 years if you tell anyone about the section 49 notice after being told not to.

This isn't exactly news, but for some reason no one cared about these bizarre information security policies until the Tories came to power.

12 points · 5 months ago

Wow I feel terrible for the people who have actually forgotten encryption keys.

I had a laptop I had to reformat last year because I forgot my disk encryption password. I'd have been screwed if I was being investigated and lived in the UK.

Holy balls! Are you sure about that? That's insane really. What would happen if you forgot a password to an encrypted device that you hadn't been using for years (and therefore legitimately could have forgotten the pass key)?

1 more reply

5 more replies

1 more reply

8 more replies

If you are ever detained - turn your phone OFF (hold down the button). This conserves battery of course and the passcode is required on boot and a fingerprint or faceprint won't work until the passcode is used.

[deleted]
8 points · 5 months ago

And for iPhone X if you hold the power and volume up button to get to that menu where you can shut off. That’s all you actually need. You can exit that menu without turning off and then faceid is turned off

Don’t wait until you’re detained.

On iPhones, click your power button five times before you go through airport security, or a border crossing, or when you get pulled over. Basically anytime you expect to interact with authorities.

1 more reply

TouchID doesn't work with severed fingers, although I think you'd let them into your phone before you let them do that.

Yeah Touch ID actually detects the natural static that your pulse produces as a security feature to stop a severed thumb or somebody trying to hijack your fingerprints somehow

Because what really matters here, is making sure they can't get into your phone.

To be fair, this also disincentivizes dismemberment.

If it's gotten to that point, at least your phone contents, bank information, contact phone numbers, etc. are not an open book.

2 more replies

My pixel will sometimes make me use my pin. Usually when I reboot it or when it thinks I've died and someone's pressed my dead finger on the scanner.

Mine often does if I have any amount of sweat on my hands

1 more reply

14 points · 5 months ago

Like Sixpack has said below - US law dictates that biometrics is not legally exempt.

If the police require your facial id to open your phone, they have the legal right to require you to do it. This applies to fingerprints too.

A password however, they cannot

That's why i dont use that stuff. I dont have anything to hide. But its none of their fucking business.

2 more replies

What if I told you I was going to cut your thumb off if you didn't give me the password.

“Go for it, it’s impossible to get in if my thumb is cut off”

Then sue for cruel and unusual punishment

Think of it as a trade-off. Consider what is worse - they cut off your thumb which won't work, or they have the information on your phone? If it's that classic spy-thriller scenario where the phone has the list of double agents or the plans to the super-bomb, maybe a thumb is worth it.

or, don't use your thumb. Wait, you have two thumbs... which one is it?

2 more replies

[deleted]
23 points · 5 months ago

After a few tries it will make you enter the passcode.

There’s also a button combo that will disable it quickly.

1 more reply

[deleted]
21 points · 5 months ago

I think they still require you to enter the passcode at regular intervals.

16 points · 5 months ago

Pretty long interval actually (some 24 or 48h I don’t remember exactly). But there’re option required attention (ie open eyes looking into the screen) or just quickly turn off the biometric security (press power button 5 times).

[deleted]
17 points · 5 months ago

To be honest, biometric security is a step backward anyways. We're constantly broadcasting the information needed to unlock biometric security. The password + auto-wipe combo is a must if security is a priority.

That's because biometrics should have always been the username, never the password.

1 more reply

Apple already knows this. TouchID was implemented for two reasons, both of which boil down to “people are lazy”. The first was Apple Pay, because there’d be significantly less adoption from users if it instead required a PIN or password. The second is that people were just leaving their phones unsecured and unencrypted because they didn’t want to have to type in a password every time they opened it.

And as much as a password is better than biometrics, biometrics is better than nothing.

4 more replies

1 more reply

Not really. Just like finger print unlock, if you press the wake button 5 times, it will require you to enter password before allowing finger and facial recognition unlock to be used again. So a quick 5 taps is all you need to counter your proposal.

1 more reply

11 points · 5 months ago · edited 5 months ago

Doesn't work if you have your eyes closed.

Also, before you hand it to the cop, hit the side button five times and it locks down the phone, requiring a password.

There's a lockdown option like this on all iPhones.

8 points · 5 months ago

*on all iPhones running iOS 11

4 more replies

No, actually. You have to make eye contact (part of why a mask model of a person won’t work either) . And if you hit the lock button five times it disables Face ID and starts a countdown to call emergency services.

2 more replies

You can disable it and force a password.

20 more replies

How dare those jerks stand up to our tyrannical, unconstitutional surveillance state.

11 more replies

I cant handle this week. "Shithole" and now "jerks"... it offends my sensibilities!

Just wait till they break out the leather.

-clutches pearls-

-clutches penis-

Please let go.

2 more replies

26 more replies

86 points · 5 months ago

ITT: Everything is a conspiracy and the goverment is a genius, well oiled, competent and effective institution.

37 points · 5 months ago

Alternatively, anything remotely positive about Apple is a planted ad.

Don't forget stable.

One FBI forensic agent != official stance of the FBI

And making it harder to crack!=too difficult to crack

"Harder" and "more difficult" is NOT impossible.

Apple recently made its iPhones even harder to access.  It has recently added a trick that makes password cracking software much slower, making it more difficult for law enforcement to break into phones, he said. 

2 more replies

Those jerks, protecting people's privacy and all that shit. What kind of dick does that?

Notice they don't complain about Android

68 points · 5 months ago · edited 5 months ago

Apple does have a better design than Android.

The data sitting in the Android filesystem is encrypted. This is true today when you use full-disk encryption (FDE) provided by dm-crypt. It is also true of file based encryption provided by ext4 filesystem. Data at rest is encrypted.

On the other hand, encryption keys on Android are not wiped from memory when the phone is locked.

The phone needs keys in memory in order to function:

  • It's how it can check your email while locked

  • it's how it can connect to wifi networks

  • it's how it can show who's sending the text

The dm-crypt key is entered during boot, and is not wiped from memory when the phone is locked. Otherwise the OS couldn't function.

Apple does have a better design

Apple iOS does not use FDE, they use per-file encryption of users files. The extraordinarily interesting (ingenious) thing about their implementation is that there are three different levels of keys. This allows different level of access to files:

  • files that are unlocked as soon as the device boots

  • files that are unlocked the first time your unlock your phone (and remain unlocked until the device is rebooted)

  • files that are unlocked when you unlock your phone, and locked again when the device is locked (I.e. the key is wiped from memory when the device is locked)

It's important to note:

  • some files (encrypted at rest) always have the key available

  • some files (encrypted at rest) remain available even after you lock your phone

  • some files (encrypted at rest) are only available while the phone is unlocked

It's also important to note that even though Apple does wipe some keys from memory on lock: it doesn't wipe all user keys. Otherwise the phone couldn't function.

For Apple system applications, they always tried to use the the key that is wiped from memory on lock. By default, 3rd party apps were encrypted with the key that not wiped during device lock. Any third party app had to opt-in to the "only while device unlocked" key. The concern was compatibility - that some apps would fail if their files were not available when the app first runs at boot (when the user hasn't yet unlocked the phone, releasing the app data).

It was 2 or 3 years ago, when Apple finally defaulted "all* apps to the "available while unlocked" key. And that caused the big stink with the FBI because now data is being encrypted, and the keys are wiped when locked.

But not all data is locked when phone is locked. Reboot your Apple phone, do not unlock it yet, and get a text message. The phone will not be able to show you your contact's picture. Now unlock the phone by entering your pin, lock the phone again, and receive a text: the phone can show you your contact picture. That is because your contacts are unlocked when you first enter your PIN and that key is not wiped from memory until reboot. The data it is still encrypted at rest: the key is just available in memory.

Could Android adopt this kind of multi-level key model? Sure. But it would require completely violating the existing programming model, breaking the API promises given to every app that already exists.


The Apple A7 has a customized version of the ARM's "TrustZone" - that Apple named the "Secure Enclave".

The TrustZone/SecureEnclave is a separate area of the phone that runs a different, miniature, operating system. It is smaller so that there's less chance of being able to root-kit it with exploits (less code, less possibility for bugs).

  • The SecureEnclave operating system can see and access the entire phone

  • The iOS operating system cannot access the Secure Enclave area

The Secure Enclave is where the code exists that enforces a time delay when you manually try to bruteforce keys. And it's the code in the Secure Enclave that wipes the phone if you exceed your number of failed attempts. And it is the code in the Secure Enclave that encrypts the user's password with the hardware bound key in order to create the file-encryption key.

Without the hardware-bound private-key, and the Secure Enclave on that phone to run it, you cannot re-create the encryption key needed to decrypt files.

The FBI is unable to modify the code in the Secure Enclave, because it must be digitally signed in order to run, and only Apple has the private key.

What needs to happen in the next iteration of all phones, is that the hardware itself - before transferring control to the SecureEnclave/TrustZone/TEE operating system - needs to calculate the hash of the entire Secure Enclave firmware. That hash needs to be kept in memory of the hardware - unwriteable by any code running in the Secure Enclave.

In this way, the encryption key for files on the phone are the "entangled" mixture of:

  • the user's pin/password

  • the hardware-bound private key

  • the fingerprint of the Secure Enclave code

That way if anyone modifies the code of the Secure Enclave, the original encryption key cannot be recovered.

Such a concept (a piece of dedicated hardware storing a hash of the code that makes up the operating system) already exists in the PC universe: It's the TPM. The TPM allows you to "bind" a password to the current state of the system. Modifying the BIOS, the boot sector, or core operating system files, will mean you cannot recover the original encrypted data.

I assume Apple engineers already know this, are already thinking about it, and are in already in contact with ARM (the designers of the iPhone processors), to investigate doing it.

Unfortunately it would probably be like a 2 year cycle to design and test new hardware. We need it now!

Other phones have the equivalent of the Secure Enclave. It's ARM's TrustZone.

  • Apple called it "Secure Enclave"

  • Samsung called it "Trusted Execution Environment"

But Apple was the only one to employ

  • per-file encryption

  • on by default

  • with a key that is wiped from memory every time you lock your phone.

The best Android has is dmcrypt - whole volume encryption, which doesn't dismount when you lock your phone. Android needs to adopt an entirely new filesystem in order to support per-file encryption.

6 points · 5 months ago

I think Android 8 introduced per-file encryption.

It's been in the OS since Android 7. There are many problems with it however - see this article.

in 2016 Android is still struggling to deploy encryption that achieves (lock screen) security that Apple figured out six years ago. And they’re not even getting it right.

I really do hope that they can get it right however; a cheaper and equally high-quality alternative is a good thing.

4 points · 5 months ago

Excellent post - thanks.

wow, TIL a lot about phone security

As an Android partisan I want to thank you for explaining an area where Apple has inarguably implemented a superior technology.

So... thanks!

1 more reply

13 more replies

[deleted]
222 points · 5 months ago

Doesn’t help that Google’s entire business model is selling your personal data.

Comment deleted5 months ago(4 children)
23 points · 5 months ago · edited 5 months ago

part of that, though, was the discovery that Apple-to-Apple(Id) texts go via encrypted internet traffic, so standard "wiretap" was not picking up all texts sent via iPhone.

(IIRC, now that texting is encrypted, so Apple can't tell the police what's in your texts.)

But really, Apple got 971 requests and gave info in 81 of those cases. The other number is more metadata. Where the phone was bought (probably 90% of the time, all Apple has is activation date) and more succinctly, when it was used to access Apple services. (App store, I assume; and iCloud texting, etc.) 3,800 requests out of 350,000,000 people if only 1% own an iPhone so 3,500,000 phones? That standard data, any court can compel any company to turn over and generally they can't say no. Presumably they follow the law, and don't typically turn over data without a warrant - because then they could be sued by the phone's owner.

Holy shit if you don't post that link I'd not believe you!

Wonder howuch data the carrier's hand over

"Where was this iemi hardware between this time on these dates, triangulate between the three cell towers they reported in with"

Oh hey banks, where were these cards used on this date/time range.

Oops you're now invisibly tracked and watched and can be placed at the scene of many crimes

My reading of the data: this just means that Apple is willing to play ball, if the government comes correct.

Bring a warrant and probable cause, with a reasonable scope, and apple will give you the data. But attempting to backdoor their gear will be met with resistance.

Google doesn't sell your personal data.

As someone who has used Googles ad network, I can attest to that.

Google uses your personal data to target ads. But no one outside of Google ever gets to see it. If anything, Google is incentivised to keep your data under very high security, because your data is such a competitive advantage to them.

53 points · 5 months ago · edited 5 months ago

because your data is such a competitive advantage to them.

I am overcome by a warm and fuzzy feeling and I wish the modern world wasn't so fucked up that I could be joking.

I'm not saying it's good. I'm just saying it is what it is.

7 points · 5 months ago

Something has to pay for them servers

Yeah, I'm just talking about how strangely reassuring it is that my data is worth something and worth protecting.

Incentives drive the world, feelings aren't worth much.

I wish the modern world wasn't so fucked up

Which non-fucked up point in history would you prefer?

2 more replies

Comment deleted5 months ago(1 child)

This is why I rarely use FB

8 more replies

12 more replies

Mostly because you have to enable much of the encryption and most dont. Also 'android' is too broad to be meaningful.

Depends on the phone. Some have proper encryption and security and some can easily just be plugged in and messed with. The way manufacturers ditch a phone's support for their newest models so fast really pisses me off.

24 more replies

That would make the Apple Store the "Jerk" Store

They called, and they’re running out of you!!!

And they’re all out of you!

“FBI convinces morons that iPhones are unhackable.” No, really, go ahead and speak freely - we are so totally not listening to you....

I always give the “noNSA” label to my questionable messages, so it’s cool.

Yea it just reads like an ad and nothing else.

1 more reply

Comment deleted5 months ago(1 child)

1 more reply

4 points · 5 months ago

If one FBI employee calls apple jerks, is that the entire FBI calling apple jerks?

1 more reply

4 points · 5 months ago · edited 5 months ago

The FBI are jerks for forcing tech companies to create back doors which hackers use to cause HUNDREDS OF BILLIONS of dollars in damages. Damages that taxpayers have to pay for... Including Millions of stolen IDs. Apple... Is ultimately saving taxpayers billions of dollars and a whole lot of headaches. Thanks Apple...

this sounds more like fake news advertising than anything. omg guise, iphones are so hard to crack now.

Seriously—they even mention brute forcing a password to unlock a phone, but iPhones have had the “everything gets erased after x attempts” thing for years, I don’t know what they’re talking about when they say “apple slows the number of attempts per minute”

If you continuously input an incorrect password the phone locks up for 1 minute, then 5, then 10, then an hour, and so on.

...if you put in 10 incorrect passwords, the device wipes itself. Maybe they’re saying if you disable that? It’s enabled by default.

1 more reply

24 points · 5 months ago

Well tbf, they are. To gain root access, aka crack the iPhone you need an exploit that bypasses iBoot and KPP, like how people use exploits to create Jailbreaks. It’s literally 1 in a million to find a working exploit for one version of IOS

5 more replies

I could see that.

"Hey, random FBI employee, I'll give you $500 to bitch publicly about how great my product is."

1 more reply

That is both of their jobs so... I guess this is news.

corrupt government agency with too much power gets angry at tech company for making their products too difficult to crack and spy on citizens

I HATE apple products but I hate corrupt govt. alphabet agencies even worse.

453 more replies

Community Details

16.2m

Subscribers

41.4k

Online

/r/news is: real news articles, primarily but not exclusively, news relating to the United States. /r/news isn't: editorials, commercials, political minutiae, shouting, justin bieber updates, kitty pictures. For a subreddit for all news-related content (editorials, satire, etc.) visit /r/inthenews.

Create Post

r/news Rules

1.
Not news
2.
Opinion/analysis or advocacy piece
3.
Politics
4.
Title not from article/editorialized title
5.
Paywall or is blogspam/steals content
6.
Covers an already-submitted story
7.
Racist, sexist, vitriolic, or overly crude
8.
Unnecessarily rude or provocative
9.
Cheap or distracting joke or meme
10.
Breaks sitewide rules, witchhunting
Cookies help us deliver our Services. By using our Services or clicking I agree, you agree to our use of cookies. Learn More.