The Lounge is rated Safe For Work. If you're about to post something inappropriate for a shared office environment, then don't post it. No ads, no abuse, and no programming questions. Trolling, (political, climate, religious or whatever) will result in your account being removed.
Wives and loved ones leaving seem to be theme for todays lounge. Let me lift the mood with a 90' turn. I have been working on a test rig for a company this week and have hadf some difficulty with the darn interface board, thanks to D@nish ( ) for giving me a link to the updated docs and to Velleman support who answered a question on Friday night(!)
I now have a version working on Win 10.
So hats off to D@nish and Velleman for giving help at a time when most companys are closed.!
I never said it will help or solve it. only dull the pain and somehting I do every year for the anniversary of the death of my Mum and younger Sister (dead 18 years in just under 8 months).
Sorry that I wrote this here, but it will soon be the anniversary. I will not do again.
Don't apologise and come back each year and post while you remember and have a drink.
"I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible." - Mr.Prakash One Fine Saturday. 24/04/2004
Maybe this sounds very strange now. Same I thought first about your comparison the situation with your dog… but there is really a big difference.
I’m/was not able to put my horse and also my cat to get them sleep (forever). This because it would be only my decision…
My wife has taken the decision by herself (and unfortunately I helped here on this, I still feel guilty about it...). And yes you are very very right, it is a very bravery decision, which I think I never would take, because I'm too cowardly.
So sorry to hear that - there aren't any words I can find to make it feel better: just remember the good times you had together. And don't be sorry you wrote here - what are friends for but to help and support each other through the black days?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
That is completely right....not to drink that much....
But the time with her (very well ) organized Suizid: according to Exit 10 Min. in our case about 20h. I do not see another Option than kill my brain with alcohol at the moment sorry for that...
«In art as in science there is no delight without the detail ... Let me repeat that unless these are thoroughly understood and remembered, all “general ideas” (so easily acquired, so profitably resold) must necessarily remain but worn passports allowing their bearers short cuts from one area of ignorance to another.» Vladimir Nabokov, commentary on translation of “Eugene Onegin.”
Maybe it's me, but I am pretty confident the FBI is on the completely wrong track with this iPhone business.
As I understand it they want Apple to create a customized version of iOS that disables the "self-destruct", reduces the artificially inflated time-interval between passcode attempts, and would allow the passcodes to be attempted electronically rather than through the touch screen.
Even if the FBI got what it wanted, the attempts would still be made via the iPhone itself, using its single 1.3GHz A6 chip. According to Apple, however, there is a minimum of 80 ms required between attempts by virtue of a large iteration count. The most logical conclusion is that they're taking the PID plus the passcode, running it through a SHA algorithm 10,000 or so times (probably more depending on the CPU speed), and using the result to encrypt/decrypt a permanent 256-bit AES key which actually gets you to the data.
With a 6-digit passcode, assuming just uppercase letters, lowercase letters, and 0-9, there are 56.8 billion possible combinations (62^6), which given the unavoidable 80 ms delay would take the iPhone 5C 4.5 billion seconds, or 144 years to complete. So in the worst case scenario, what the FBI is asking for may well wind up being useless.
Of course if the passcodes are just numeric, or 4 characters instead of 6, that changes things dramatically. A 4 digit numeric passcode would only take 22 hours for example. I tried but cannot find details on what kind of passcode the scumbag terrorists were using. But let's assume for the sake of argument it is something small enough to crack in a reasonable amount of time, even on the iPhone 5C.
There's still a compelling technical argument (leaving aside the legal and constitutional issues) for why the FBI's request is overbroad: with only modest help from Apple, they could wage the brute force attack themselves. Apple almost certainly has the capability of extracting the encrypted data from the storage device, and of extracting the PID off of the chip. I realize this would be an extremely delicate and risky process for a hacker who doesn't have the exact specs at hand, but are we really to believe Apple doesn't have the ability to do this safely and relatively easily? And if they do, this strikes me as a very reasonable thing to order Apple to do, especially when the owner of the phone supports doing so.
The only other piece of information needed would then be the precise hashing procedure employed by iOS - information which can hardly be considered a trade secret considering almost everyone uses the same algorithms and similar procedures for these sorts of locks, and which could likely be reverse engineered with relative ease anyway (if it hasn't been already). Clearly this would be fair game for a subpoena, even in a civil case, let alone a criminal one.
With that, the FBI could just take the data and try to decrypt it by brute force on their own machines and maybe 100 lines of code. With a GPU farm, the likes of which we all know the government has access to, even the 144 years for the 6-character case sensitive alphanumeric code could be brought down by a couple orders of magnitude. But most importantly, it would obviate the FBI's overreaching request and pretty much moot Apple's opposition. It truly would be a "one shot" thing as there would be no risk of some new piece of software leaking its way onto the Internet for others to exploit. It would be analogous to forcing a bank to let the police into the vault and telling them what kind of lock protects the safety deposit box.
Of course, I suspect neither side has any interest in this course of action. The FBI would almost certainly prefer a permanent iPhone skeleton key - even if it's controlled by Apple - for future cases and seems to be using the compelling facts of this case as its best chance to get it. Apple on the other hand no doubt benefits from the positive publicity of standing up for its customers, and is not about to volunteer a more reasonable way for the government to get what it wants when (and this is my personal opinion) it is likely to win in the courts because of the government's overreaching.
(I am a lawyer, incidentally, and the reason I think they should win legally is pretty much what they said in their response to the court - the government can't make them write code. That sort of thing is prohibited by the 13th amendment, among others. The only time I'm aware of that the government can draft a company into its service is during a genuine war, where it's a question of resources, and at minimum Congress would have to authorize it and compensate for it).
Those are just my $0.02 anyway. Would love to hear if there are opposing views or if any of my assumptions are wrong.
1) Gird yourself. A few of the Apple haters here will likely swarm.
2) The "compelling facts of this case" are part of the national narrative of fear stoked by our government and media. Lions and tigers and terrorists, oh my!
3) One area that isn't getting much press is the forensic rules that are likely to play out if/when the FBI's requested backdoor is used to unlock a living defendants iPhone. At trial his/her defense attorney will demand access to the source code of the backdoor so "experts" can decide if the data was corrupted. Might as well publish the hack in an article here at CP.
There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.
One area that isn't getting much press is the forensic rules that are likely to play out if/when the FBI's requested backdoor is used to unlock a living defendants iPhone. At trial his/her defense attorney will demand access to the source code of the backdoor so "experts" can decide if the data was corrupted. Might as well publish the hack in an article here at CP.
Interesting point. If the defendant were alive, I believe they could be compelled to unlock the phone pursuant to a valid search warrant, and if they refused, be jailed for contempt. One would also hope that the government had enough evidence to convict the person without data from the phone, and if they didn't, they probably have no business hacking the phone anyway.
But of course, if the government needed the data for other reasons - like a perceived imminent threat to the public - they may well use the tool. In that case I hope they'd be smart enough not to try to use whatever they find on the phone in a court case, because you're right, if they did, the defense would have a valid argument for being able to inspect every detail of "GovtOS". My understanding is they generally try not to actually use the evidence from their best sources in public court cases for precisely this reason. As long as they only use the phone data for leads and not directly to incriminate a particular person, I think they'd be able to keep the tool away from scrutiny.
Last Visit: 2-Jul-20 4:41 Last Update: 2-Jul-20 4:41