Re: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 

Apple runs a business where the sole reason is to make money, thats fine. They don't wish to compromise their security, thats also fine. Security is one of many reasons why Apple's products are desirable. 

The FBI also runs a business, national security. It has means to covertly spy on private information so that it can exercise its role in helping national security. Is it fair to expect them to disclose information so that a means of access gets blocked, thereby cutting into their business at hand? Is it their role to help Apple increase their security on their devices? Should the FBI also disclose to other enterprises what they are doing, so that those enterprises can block the FBI? May as well remove the FBI, if they are decreed to hand over any information they have so that it can be used to block them. 



From: "Jim Saklad jimdoc@icloud.com [iPad]" <iPad@yahoogroups.com>
To: iPad@yahoogroups.com
Sent: Saturday, 2 April 2016 10:57 AM
Subject: Re: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 
> Makes sense. Apple withheld, so the FBI will play the same game. Tit for tat.

No, it doesn't.

The FBI *demanded*, via court order, that Apple create software that did not exits.

Apple is *asking* that the FBI reveal the nature of a flaw/vulnerability *that they already know about*.

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jim Saklad mailto:jimdoc@icloud.com



__._,_.___

Posted by: Tony <tdale@xtra.co.nz>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (5)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

Re: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 

Demanded and asking is a red herring. If FBI asked same result. I recall they did ask and got turned down . So they took legal action . Apple asked and will get turned down do they can take legal action. Like Apple the FBI doesn't know either.

Sent from my iPhone 6 Plus 


On 2/04/2016, at 10:57 AM, Jim Saklad jimdoc@icloud.com [iPad] <iPad@yahoogroups.com> wrote:

 

> Makes sense. Apple withheld, so the FBI will play the same game. Tit for tat.

No, it doesn't.

The FBI *demanded*, via court order, that Apple create software that did not exits.

Apple is *asking* that the FBI reveal the nature of a flaw/vulnerability *that they already know about*.

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jim Saklad mailto:jimdoc@icloud.com

__._,_.___

Posted by: Tony <tdale@xtra.co.nz>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (4)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

Re: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 

> Makes sense. Apple withheld, so the FBI will play the same game. Tit for tat.

No, it doesn't.

The FBI *demanded*, via court order, that Apple create software that did not exits.

Apple is *asking* that the FBI reveal the nature of a flaw/vulnerability *that they already know about*.

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jim Saklad mailto:jimdoc@icloud.com

__._,_.___

Posted by: Jim Saklad <jimdoc@icloud.com>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (3)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

Re: [iPad] Re: New iOS 9.3 Monday March 28

 

Today, I got the 9.3.1 update on my iPhone 5, so that's now up to date. No update yet for my Mini.

Toby

Sent from my iPad

On Mar 30, 2016, at 11:18 AM, Carol floridabouvs@gmail.com [iPad] <iPad@yahoogroups.com> wrote:

 

So I guess that fix is on,y for older devices? I just checked my iPhone 6+ and iPad Air 2, which I already had updates. They say my devices are up to date.
Carol

Tony wrote:
I dont think its a poit release with anything new, i.e. 9.3.1 its a fix for 9.3 where iPad 2 would not allow activation. Maybe other devuices as well but iPad 2 would be bricked on the forst 9.3. Problem, fixed, done.

Sent from my iPad Air 2

__._,_.___

Posted by: Tobyel <tobyel@comcast.net>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (47)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

Re: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 

Makes sense. Apple withheld, so the FBI will play the same game. Tit for tat. Happens when 5 year olds play and when the other end of the food chain plays. While we can say that Apple is right by withholding to protect its security, FBI are also withholding to protect their interests.





From: "Kris Murray krismurray@gmail.com [iPad]" <iPad@yahoogroups.com>
To: iPad Yahoo Group <iPad@yahoogroups.com>
Sent: Saturday, 2 April 2016 8:55 AM
Subject: [iPad] FBI's secret method of unlocking iPhone may never reach Apple

 
FBI's secret method of unlocking iPhone may never reach Apple | Reuters

FBI's secret method of unlocking iPhone may never reach Apple | Reuters

By Dustin Volz
WASHINGTON (Reuters) - The FBI may be allowed to withhold information about how it broke into an iPhone belonging to a gunman in the December San Bernardino shootings, despite a U.S. government policy of disclosing technology security flaws discovered by federal agencies.
Under the U.S. vulnerabilities equities process, the government is supposed to err in favor of disclosing security issues so companies can devise fixes to protect data. The policy has exceptions for law enforcement, and there are no hard rules about when and how it must be applied.
Apple Inc has said it would like the government to share how it cracked the iPhone security protections. But the Federal Bureau of Investigation, which has been frustrated by its inability to access data on encrypted phones belonging to criminal suspects, might prefer to keep secret the technique it used to gain access to gunman Syed Farook's phone.
The referee is likely to be a White House group formed during the Obama administration to review computer security flaws discovered by federal agencies and decide whether they should be disclosed.
Experts said government policy on such reviews was not clear-cut, so it was hard to predict whether a review would be required. "There are no hard and fast rules," said White House cybersecurity coordinator Michael Daniel, in a 2014 blog post about the process.
If a review is conducted, many security researchers expect that the White House group will not require the FBI to disclose the vulnerability it exploited.
Some experts said the FBI might be able to avoid a review entirely if, for instance, it got past the phone's encryption using a contractor's proprietary technology.
Explaining the policy in 2014, the Office of the Director of National Security said the government should disclose vulnerabilities "unless there is a clear national security or law enforcement need."
The interagency review process also considers whether others are likely to find the vulnerability. It tends to focus on flaws in major networks and software, rather than individual devices.
During a press call, a senior Justice Department official declined to disclose whether the method used on Farook's phone would work on other phones or would be shared with state and local law enforcement.
Apple declined to comment beyond saying it would like the government to provide information about the technique used.
PROTECTING "CRUCIAL INTELLIGENCE"
The government reorganized the review process roughly two years ago and has not disclosed which agencies regularly participate other than the Department of Homeland Security and at least one intelligence agency. A National Security Council spokesman did not respond to a request for comment about agency participation.
In his April 2014 blog post, White House cybersecurity coordinator Daniel, who chairs the review group, said secrecy was sometimes justified.
"Disclosing a vulnerability can mean that we forego an opportunity to collect crucial intelligence that could thwart a terrorist attack stop the theft of our nation's intellectual property," Daniel wrote.
On Tuesday, a senior administration official said the vulnerability review process generally applies to flaws detected by any federal agency.
Paul Rosenzweig, a former deputy assistant secretary at the Department of Homeland Security, said he would be "shocked" if the Apple vulnerability is not considered by the group.
"I can't imagine that on one of this significance that the FBI, even if it tried to, would succeed in avoiding the review process," said Rosenzweig, founder of Red Branch Consulting, a homeland security consulting firm.
He predicted the FBI would not be forced to disclose the vulnerability because it appears to require physical possession of a targeted phone and therefore poses minimal threat to Internet security more broadly.
Many security researchers have suggested that the phone's content was probably retrieved after mirroring the device's storage chip to allow data duplication onto other chips, effectively bypassing limitations on the number of passcode guesses.
Kevin Bankston, director of the think tank Open Technology Institute, said there is no public documentation of how the review process has worked in recent years. He said Congress should consider legislation to codify and clarify the rules.
Stewart Baker, former general counsel of the NSA and now a lawyer with Steptoe & Johnson, said the review process could be complicated if the cracking method is considered proprietary by the third party that assisted the FBI.
Several security researchers have pointed to the Israel-based mobile forensics firm Cellebrite as the likely third party that helped the FBI. That company has repeatedly declined comment.
If the FBI is not required to disclose information about the vulnerability, Apple might still have a way to pursue details about the iPhone hack.
The Justice Department has asked a New York court to force Apple to unlock an iPhone related to a drug investigation. If the government continues to pursue that case, the technology company could potentially use legal discovery to force the FBI to reveal what technique it used, a source familiar with the situation told Reuters.
At least one expert thinks a government review could require disclosure. Peter Swire, a professor of law at the Georgia Institute of Technology who served on the presidential intelligence review group that recommended the administration disclose most flaws, said there is "a strong case" for informing Apple about the vulnerability under the announced guidelines.
"The process emphasizes the importance of defense for widely used, commercial software," he said.
(Reporting by Dustin Volz in Washington; Additional reporting by Dan Levine and Joseph Menn in San Francisco; Editing by Sue Horton, Peter Henderson and David Gregorio)


~KLM
"The one who follows the crowd will usually get no further than the crowd. The one who walks alone, is likely to find himself in places no one has ever been." ~ Albert Einstein //


__._,_.___

Posted by: Tony <tdale@xtra.co.nz>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (2)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

[iPad] FBI's secret method of unlocking iPhone may never reach Apple

 

FBI's secret method of unlocking iPhone may never reach Apple | Reuters

FBI's secret method of unlocking iPhone may never reach Apple | Reuters

By Dustin Volz

WASHINGTON (Reuters) - The FBI may be allowed to withhold information about how it broke into an iPhone belonging to a gunman in the December San Bernardino shootings, despite a U.S. government policy of disclosing technology security flaws discovered by federal agencies.

Under the U.S. vulnerabilities equities process, the government is supposed to err in favor of disclosing security issues so companies can devise fixes to protect data. The policy has exceptions for law enforcement, and there are no hard rules about when and how it must be applied.

Apple Inc has said it would like the government to share how it cracked the iPhone security protections. But the Federal Bureau of Investigation, which has been frustrated by its inability to access data on encrypted phones belonging to criminal suspects, might prefer to keep secret the technique it used to gain access to gunman Syed Farook's phone.

The referee is likely to be a White House group formed during the Obama administration to review computer security flaws discovered by federal agencies and decide whether they should be disclosed.

Experts said government policy on such reviews was not clear-cut, so it was hard to predict whether a review would be required. "There are no hard and fast rules," said White House cybersecurity coordinator Michael Daniel, in a 2014 blog post about the process.

If a review is conducted, many security researchers expect that the White House group will not require the FBI to disclose the vulnerability it exploited.

Some experts said the FBI might be able to avoid a review entirely if, for instance, it got past the phone's encryption using a contractor's proprietary technology.

Explaining the policy in 2014, the Office of the Director of National Security said the government should disclose vulnerabilities "unless there is a clear national security or law enforcement need."

The interagency review process also considers whether others are likely to find the vulnerability. It tends to focus on flaws in major networks and software, rather than individual devices.

During a press call, a senior Justice Department official declined to disclose whether the method used on Farook's phone would work on other phones or would be shared with state and local law enforcement.

Apple declined to comment beyond saying it would like the government to provide information about the technique used.

PROTECTING "CRUCIAL INTELLIGENCE"

The government reorganized the review process roughly two years ago and has not disclosed which agencies regularly participate other than the Department of Homeland Security and at least one intelligence agency. A National Security Council spokesman did not respond to a request for comment about agency participation.

In his April 2014 blog post, White House cybersecurity coordinator Daniel, who chairs the review group, said secrecy was sometimes justified.

"Disclosing a vulnerability can mean that we forego an opportunity to collect crucial intelligence that could thwart a terrorist attack stop the theft of our nation's intellectual property," Daniel wrote.

On Tuesday, a senior administration official said the vulnerability review process generally applies to flaws detected by any federal agency.

Paul Rosenzweig, a former deputy assistant secretary at the Department of Homeland Security, said he would be "shocked" if the Apple vulnerability is not considered by the group.

"I can't imagine that on one of this significance that the FBI, even if it tried to, would succeed in avoiding the review process," said Rosenzweig, founder of Red Branch Consulting, a homeland security consulting firm.

He predicted the FBI would not be forced to disclose the vulnerability because it appears to require physical possession of a targeted phone and therefore poses minimal threat to Internet security more broadly.

Many security researchers have suggested that the phone's content was probably retrieved after mirroring the device's storage chip to allow data duplication onto other chips, effectively bypassing limitations on the number of passcode guesses.

Kevin Bankston, director of the think tank Open Technology Institute, said there is no public documentation of how the review process has worked in recent years. He said Congress should consider legislation to codify and clarify the rules.

Stewart Baker, former general counsel of the NSA and now a lawyer with Steptoe & Johnson, said the review process could be complicated if the cracking method is considered proprietary by the third party that assisted the FBI.

Several security researchers have pointed to the Israel-based mobile forensics firm Cellebrite as the likely third party that helped the FBI. That company has repeatedly declined comment.

If the FBI is not required to disclose information about the vulnerability, Apple might still have a way to pursue details about the iPhone hack.

The Justice Department has asked a New York court to force Apple to unlock an iPhone related to a drug investigation. If the government continues to pursue that case, the technology company could potentially use legal discovery to force the FBI to reveal what technique it used, a source familiar with the situation told Reuters.

At least one expert thinks a government review could require disclosure. Peter Swire, a professor of law at the Georgia Institute of Technology who served on the presidential intelligence review group that recommended the administration disclose most flaws, said there is "a strong case" for informing Apple about the vulnerability under the announced guidelines.

"The process emphasizes the importance of defense for widely used, commercial software," he said.

(Reporting by Dustin Volz in Washington; Additional reporting by Dan Levine and Joseph Menn in San Francisco; Editing by Sue Horton, Peter Henderson and David Gregorio)



~KLM
"The one who follows the crowd will usually get no further than the crowd. The one who walks alone, is likely to find himself in places no one has ever been." ~ Albert Einstein //

__._,_.___

Posted by: Kris Murray <krismurray@gmail.com>
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!


.

__,_._,___

[FullyFun.in] File - FullyFun Niyam (Rules)

 


Hello FullyFun-Club member,

We created this group with objective of having fun with our friends by sharing funny stuffs like jokes, sms, quotes, facts, shaayris, images, Hollywood and Bollywood pictures, and much more.

Few Rules you must follow :

1) Do NOT post more that 1 message a day.

2) Do NOT reply to groups, Reply only to particular memeber, and also reply them only if you like the mails, like to make friends, like to provide constructive criticism, but DON'T mail if it's going to hurt them.

3) Do NOT advertise product or promote any other YahooGroups or GoogleGroups or any Blogs, Remember this group is for having fun and not for promotion.

4) Be creative and come up with some original stuffs, and try to reduce just copying and forwarding messages from other groups.

5) If you are forwarding any mail then please remove history like header, '>' symbol, footer etc from the mail and make it more readable, presentable and viewable.

6) Keep only one email-id in 'To' field and keep all other ids in 'Bcc' field, it will reduce junk mail and virus mail to you and your friends Inbox.

7) Do NOT post any religious messages, chain mails etc.

Your suggestions, comments and ideas are important to enhance group experience.
So please mail them to me.

Have Fun,

with best regards,
FullyFun Moderator.
http://www.FullyFun.in/

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (113)

Have you tried the highest rated email app?
With 4.5 stars in iTunes, the Yahoo Mail app is the highest rated email app on the market. What are you waiting for? The Yahoo Mail app is fast, beautiful and intuitive. Try it today!

===========================================================================
===========================================================================

http://www.JobSpot.co.in :-> Spot the Professional Jobs in India
http://www.FullyFun.in :-> Fully Fun Where Fun Never Ends
http://www.confession.co.nr :-> Confess to Relieve Tension

FF Advice :- Plaese Do not Open any attach file ending with .pif, .com,.scr,.UU, .UUE , .B64, .HRX , .Mim , .BHX coz these type of files may contain VIRUSes. So please be careful.

http://babe-fun.blogspot.com :-> Cute Hot and Beautiful Babes

===========================================================================
===========================================================================

.

__,_._,___