Autore Topic: Apple vs FBI  (Letto 2245 volte)

Offline Presidente

  • Nabe Member
  • *****
  • Post: 8551
  • Sesso: Maschio
  • Dalla morte...vedete di farvi trovare vivi.
Re:Apple vs FBI
« Risposta #15 il: Marzo 03, 2016, 10:51:58 »
Quello che non ho capito e': da una parte qualcuno dice che l'FBI ha ordinato a Apple di mettere la backdoor, dall'altra qualcuno dice che l'FBI NON ha chiesto la backdoor, ma vogliono entrare SOLO nell'iPhone del terrorista. Chi sta dicendo la verita'? Inoltre vorrei sapere se sarebbe possibile per Apple accedere SOLO a quell'iPhone senza implementare la backdoor? Strafattone McAfee sostiene di si e se Apple non vuole, lui e il suo team di hackeroni possono farlo aggratis. Ma se Apple potesse davvero accedere senza creare la backdoor, allora perche' alzare tutto sto polverone?

Da quello che ho capito io è andata così:
Apple ha sempre collaborato con la giustizia, fornendo sempre tutti i dati disponibili.
Arrivati all'ultimo caso, è successo che siamo ormai ad iOS 9, e l'architettura è cambiata e la sicurezza è migliorata.
La discussione dovrebbe essere andata più o meno:

FBI-Ciao Apple mi dici cosa c'è in questo cellu?
Apple-zerella, non posso accedere ai dati.
F-Cosa? Cioè tu non hai il modo di accedere ai cellulari che fabbrichi?
A-No, sicurezza prima di tutto, ci entra il proprietario e basta, non c'è una backdoor.
F-Allora metti su un team e sviluppi un tool per farci entrare nel telefono. Ti promettiamo che lo useremo solo per questo (anche se l'FBI ha una lista di un centinaio di telefoni a cui vorrebbe dare un occhio).
A-Suca.

Offline RikkTheGaijin

  • Master of the Universe
  • Administrator
  • Nabe Member
  • *****
  • Post: 23636
  • Sesso: Maschio
  • Io i settaggi Ultra ce li ho di default
    • My Artstation page
Re:Apple vs FBI
« Risposta #16 il: Marzo 03, 2016, 10:56:44 »
 ;D

Online Qui-Gon Chris

  • Nabe Member
  • *****
  • Post: 11086
  • Sesso: Maschio
  • Really, Rey? REALLY?
Re:Apple vs FBI
« Risposta #17 il: Marzo 03, 2016, 11:12:57 »
In linea generale per me: avere accesso sempre a tutti i telefoni, no.
Accedere a singoli telefoni in base alle necessità di investigazione, sì.
Che Apple prima potesse e ora no, mi sembra una stronzata.
If the only thing keeping a person decent is the expectation of divine reward then, brother, that person is a piece of shit. And I’d like to get as many of them out in the open as possible. You gotta get together and tell yourself stories that violate every law of the universe just to get through the goddamn day? What’s that say about your reality?

Offline Presidente

  • Nabe Member
  • *****
  • Post: 8551
  • Sesso: Maschio
  • Dalla morte...vedete di farvi trovare vivi.
Re:Apple vs FBI
« Risposta #18 il: Marzo 03, 2016, 12:24:20 »
In linea generale per me: avere accesso sempre a tutti i telefoni, no.
Accedere a singoli telefoni in base alle necessità di investigazione, sì.
Che Apple prima potesse e ora no, mi sembra una stronzata.

Mah secondo me ha fatto in modo di non potere.
Se con i sistemi operativi precedenti c'era la backdoor, con questi nuovi non c'è.
Giusto o sbagliato come principio non saprei, però non esiste che lo stato venga ad imporre ad un privato di sviluppare qualcosa per loro. Fornire dati disponibili sì, dover sviluppare coattivamente qualcosa che possa essere dannoso per la società stessa no.

Offline RikkTheGaijin

  • Master of the Universe
  • Administrator
  • Nabe Member
  • *****
  • Post: 23636
  • Sesso: Maschio
  • Io i settaggi Ultra ce li ho di default
    • My Artstation page
Re:Apple vs FBI
« Risposta #19 il: Marzo 06, 2016, 01:24:44 »
 ;D




Offline Presidente

  • Nabe Member
  • *****
  • Post: 8551
  • Sesso: Maschio
  • Dalla morte...vedete di farvi trovare vivi.
Re:Apple vs FBI
« Risposta #20 il: Marzo 21, 2016, 11:01:18 »
Un bel recap

The Behind-the-Scenes Fight Between Apple and the FBI
Obama administration officials and Apple initially shared some common ground on data encryption. Then terrorists struck in San Bernardino, and everything changed.
By Adam Satariano and Chris Strohm
(Bloomberg) -- 
On June 2, 2014, Apple Inc. Chief Executive Officer Tim Cook took the stage at the company's Worldwide Developers Conference in San Francisco to tout the iPhone's latest mobile-operating system, iOS 8. With more than 6,000 developers and technology enthusiasts cheering them on, Cook and other executives showed off new text messaging features, a health-tracking tool and an updated photo app.

Not once during the two-hour presentation did Cook & Co. mention what would prove to be the most consequential software development of all. Tucked inside the new OS was a dramatic change to how Apple encrypts data on iPhones. The new system made it impossible for government investigators—and even Apple itself—to pull information from a device without a passcode. 

Following the event, Apple gave the Federal Bureau of Investigation early access to iOS 8 so it could study how the new system would change evidence-gathering techniques, according to people familiar with the software's development. The agency quickly realized Apple had closed an important access point used for years by agents to collect information about criminal suspects. Many in the FBI were stunned. Suddenly, photos, text messages, notes and dozens of other sources of information stored on phones were off-limits. 

The new encryption protections set off a behind-the-scenes battle that ultimately spilled into the open last month, when a California judge granted the Justice Department an order requiring Apple to help the FBI unlock an iPhone used by one of the shooters who killed 14 people in San Bernardino, California. Federal prosecutors and Apple will argue their cases before a magistrate judge on March 22.

This story, based on interviews with more than a dozen government officials, technology executives and attorneys tracking the case, charts the 18-month period between the iOS 8 release and San Bernardino attacks—revealing the complicated, up-and-down nature of Washington's relationship with Silicon Valley. At times, Apple and the White House enjoyed good ties, even working together to persuade China not to force phone makers to give authorities a key to unlock a handset's encryption.  The administration also didn't give in to FBI lobbying for new legislation that would make it easier to unlock data on mobile devices with warrants.  

But the San Bernardino attack changed the dynamic, ratcheting up tensions that had simmered ever since Edward Snowden's 2013 revelations that the U.S. was collecting Americans' personal data. Law enforcement officials had long warned that stronger encryption would eventually shut out criminal investigators. Now they had a case with national security implications they could use to press their argument that Apple had gone too far with iOS 8.

 "The reason the relationship went south is the government was expecting some degree of accommodation on the part of the technology companies," said Timothy Edgar, the former director of privacy and civil liberties for the White House National Security Staff from 2009 to 2010. "They were expecting the companies to essentially back down and not go forward with new security measures that would make it impossible for you to access devices or communications. They were caught off guard by basically being told to get lost."

The outcome of the debate, which may ultimately be decided by Congress or the Supreme Court, could set a legal precedent requiring Apple and other technology companies to provide federal investigators with tools to bypass security features. Other countries such as China could follow suit. The U.S. government, meanwhile, risks alienating technology companies who may make their products even more impenetrable. Google Inc., Facebook Inc., Microsoft Corp. and others have leaped to Apple's defense.  

"The stakes couldn't be higher," said Alex Abdo, an attorney for the American Civil Liberties Union's speech privacy and technology project, which has filed a brief supporting Apple. "This is an unprecedented legal question with extremely significant policy and technological implications."

Apple, the White House, Department of Justice and the FBI declined to make any officials available for interviews and instead pointed to previous public comments on encryption. 


Bruce Sewell testifies before a House Judiciary Committee Hearing on March 1, 2016.

Shortly after Apple previewed iOS 8 in 2014, the company's top lawyer, Bruce Sewell, traveled to Washington to discuss the changes with then-Attorney General Eric Holder and other administration officials. An unflappable intellectual property attorney hired by Steve Jobs in 2009, Sewell explained that the new protections were needed to protect customers' privacy. Hackers were becoming increasingly sophisticated at a time when people were sharing more financial, health and personal data on their mobile devices.

Yes, Apple would still provide investigators with vast amounts of information, such as e-mail and pictures stored on its iCloud servers. But with iOS 8 the company would no longer have access to information stored on the actual device.

Apple has been deluged with government requests for data. The FBI has agents assigned to work with Apple, and the company has a growing team of lawyers around the world whose only job is to respond to law enforcement orders. Apple received more than 5,000 requests from the government in the first six months of 2015, the most recent figures made public by the company.

Within the Obama administration, Apple found some receptive to its arguments for strong encryption. "As a general matter, they laid out a reasonable basis for what they were doing," said James Cole, who served as deputy attorney general from 2011 to 2015 and was involved in discussions between Apple and the government. "In many respects, they had a legitimate interest for what they were trying to protect."


Yet long before iOS 8 was launched, U.S. law enforcement and intelligence agencies had fretted about Apple's encryption, according to a person familiar with the matter. In 2010, the company introduced the video-calling app FaceTime. It encrypted conversations between users. The following year, the iMessage texting application arrived; it, too, featured encryption. While neither of these developments caused a public stir, the U.S. government was now aware how much of a premium Apple put on privacy. The encryption technology made it impossible for investigators or Apple to peek at the contents of FaceTime and iMessage communications, the person said. It's unclear what steps, if any, the government took directly with Apple to address the concerns.

For several years, the FBI pushed the White House to propose new laws that would ensure investigators could access data on phones and other devices with court orders.  Officials were close to an agreement on legislation to update communications and privacy laws in 2013, but the Snowden revelations blew up the deal, according to a former U.S. official. After that, there was never again a serious effort to pass the legislation, the official said.

In fact, the bureau's efforts were never universally supported inside the administration, according to Edgar, now a senior fellow at Brown University, who attended some of those early meetings. Officials from the Commerce Department raised concerns about the proposed legislation's impact on U.S. companies, while the State Department worried about issues such as exposing foreign dissidents. The Defense Department didn't want to create new vulnerabilities for its operations, he said. "There was a real split, and there still is," Edgar said.

Added Cole, who is now a partner with the law firm Sidley Austin LLP, which filed an amicus brief in support of Apple: "The United States government is not uniform on this. It's a highly charged issue."

Soon after the iOS 8 launch, FBI Director James Comey blasted Apple's position. "Encryption isn’t just a technical feature; it’s a marketing pitch," he said in an Oct. 16, 2014 speech at the Brookings Institution in Washington. "But it will have very serious consequences for law enforcement and national security agencies at all levels."

"Sophisticated criminals will come to count on these means of evading detection," Comey said. "It’s the equivalent of a closet that can’t be opened, a safe that can’t be cracked. And my question is, at what cost?"


Tim Cook gestures to U.S. First Lady Michelle Obama before President Obama delivers the State of the Union address to a joint session of Congress in Washington, D.C. on Feb. 12, 2013.

Even as the FBI publicly criticized Apple, the company believed it was approaching common ground with the White House. It didn't hurt that Cook had maintained a constructive relationship with the Obama team. He contributed money to both of Obama's presidential campaigns and has attended major events, including state dinners held for the leaders of China and Canada. In 2013, Obama invited Cook to sit near First Lady Michelle Obama during the State of the Union address. According to government records, Cook has met at least 14 times with White House officials since 2010, including a meeting with Obama on Dec. 2, 2014.   

In late 2014, Apple began working closely with administration officials to lobby China against adopting new anti-encryption policies, according to two people familiar with the effort. Under the proposed rules, any company selling smartphones in the country would have to provide the Chinese government with a key to unlock the handset's encryption.

The lobbying worked and China backed off.  But Apple took away the wrong impression. The White House hadn't reached any conclusion when it came to what encryption meant for the needs of U.S. law enforcement agencies, one former official said. 

The encryption debate festered inside the White House in the following months, consuming meetings and leading the National Security Council staff to draft a memo in the summer of 2015 laying out possible options, including seeking more voluntary cooperation from companies. The administration ultimately decided not to pursue or advocate for any of the proposals, according to a senior U.S. official. A formal decision not to seek legislation was officially made on Oct. 1. 

When it became clear that the administration wouldn't support a new law that would help investigators gain access to iPhones and other devices, many FBI agents became frustrated and disappointed. Some recalled that the bureau was pilloried for not connecting the dots to prevent the Sept. 11, 2001, terrorist attacks, according to Leo Taddeo, the former special agent in charge of the New York FBI special operations and cyber division. 

If the White House wasn't going to push for new legislation, Comey and other FBI officials decided to become more outspoken about their concerns with encryption, said Taddeo, who is now the chief security officer for cybersecurity company Cryptzone. He said FBI officials were determined to air a "deliberate and open understanding of the risks."


The FBI searches the San Bernardino shooter's home in Redlands, Calif. on Dec. 3, 2015.
In October, Apple also signaled that it was digging in its heels. The company filed an objection to provide data from an iPhone used by a New York drug dealer. The little-noticed disagreement in a New York courtroom foreshadowed what would come a few months later in California. 

Even as the behind-the-scenes debate simmered, Apple continued to work with FBI agents when issued a warrant for evidence that could be accessed on its servers. After the San Bernardino attacks in December, Apple pulled data backed up to its iCloud service from the iPhone used by the shooter, Syed Farook. The company also sent engineers to San Bernardino to help with the data-recovery effort. But when the FBI wanted to override the encryption on Farook's iPhone, the company said it didn't have a special key to unlock the device.

With the investigation underway, Cook attended a meeting in January between Silicon Valley executives and members of the White House national security team to discuss ways the industry and Washington could work more closely to combat terrorism. With Comey, Attorney General Loretta Lynch and White House Chief of Staff Denis McDonough on hand, Cook urged the administration to come out in favor of strong encryption because it would set an example for other countries. The message echoed Cook's statements in earlier months linking privacy to civil rights. 

 Lynch focused on the detrimental effects of encryption on national security and emphasized the importance of a continuing dialogue to find solutions, according to a Justice Department official. She said that was a priority for law enforcement and intelligence agencies charged with protecting public safety and national security, the official said.


Protesters demonstrate outside the FBI headquarters building in Washington, D.C. on Feb. 23, 2016.

In early February, Sewell, Apple's top attorney, got a call from FBI general counsel James Baker to let Sewell know the agency might file a subpoena seeking Apple's help unlocking Farook's phone. Baker said a final decision hadn't been made, but a few days later Comey testified before a Senate subcommittee that the iPhone carried by Farook might contain evidence that couldn't be accessed because the device was encrypted.  The FBI couldn't confirm what was said during the phone call. 

On Feb. 16, a magistrate judge in Riverside, California, ordered Apple to help the FBI unlock the phone. Apple executives were shocked the agency had gone public. For years, they had worked closely with the agency in private. In at least two previous instances, including a case in Baltimore, the government had decided against seeking a court order forcing Apple to unlock a phone running iOS 8. Over the next several hours, Apple crafted a response that was posted on the Apple website late at night.

A battle that had been simmering beneath the surface for almost two years was now very public.

The fight shows no signs of ending soon. Obama, a former constitutional law professor, has come out in support of the FBI, calling Apple's view "absolutist." Meanwhile, technology companies including Apple are taking steps to make it even harder to penetrate digital communication. According to Edgar, the former White House official, there isn't much common ground between those points of view.

"Lawyers think privacy is you can't listen to my conversation without a warrant; technologists think privacy is you can't listen to my conversation, period," Edgar said. "It's hard to reconcile those two points of view." 

-- With Jordan Robertson in Washington

 



Offline Presidente

  • Nabe Member
  • *****
  • Post: 8551
  • Sesso: Maschio
  • Dalla morte...vedete di farvi trovare vivi.
Re:Apple vs FBI
« Risposta #21 il: Marzo 22, 2016, 09:19:41 »
Ahahahahahahah

I punti salienti:

-l'FBI ha fatto saltare il face off in tribunale perché a quanto pare qualcuno si è fatto avanti proponendo un metodo di hacking
-la Apple ha detto 'uh non ne sapevamo niente, fateci vedere'
-L'FBI non ha mai chiesto aiuto all'NSA (quelli di Snowden), che molto probabilmente sono la cricca di hacker più forte al mondo, e l'NSA potrebbe essere riluttante a rispondere ad una chiamata...perché ciò li costringerebbe a rendere pubblici i loro metodi da superspioni






IPhone Hearing Canceled as FBI Tests Hack Without Apple Help (1)
Tuesday's California court face-off with tech giant called off
Government says it might have new method for unlocking phone
By Edvard Pettersson, Chris Strohm and Alex Webb
(Bloomberg) -- 
The U.S. government said it may not need Apple Inc.’s help to unlock a terrorist’s iPhone after all.

A court hearing set for Tuesday over a magistrate judge’s order requiring Apple Inc. to help the FBI bypass the phone’s security was canceled at the Justice Department’s request. The government said in a court filing Monday that it wanted to test a possible method for accessing data on the phone, which was used by one of the attackers who killed 14 and wounded 22 at a holiday party in San Bernardino, California, on Dec. 2.

The cancellation avoids a courtroom face-off -- at least for now -- in a case that may yet redraw the boundary between personal privacy and national security in the mobile Internet age. Apple has vigorously opposed the government’s effort to force it to create software to undercut iPhone security features, saying doing so would threaten the privacy and data security of millions of iPhone users.

The Justice Department didn’t identify who stepped forward with a new technique for unlocking the phone.

“The FBI has continued in its efforts to gain access to the phone without Apple’s assistance, even during a monthlong period of litigation with the company,” Melanie Newman, a Justice Department spokeswoman, said Monday in an e-mailed statement. “An outside party demonstrated to the FBI this past weekend a possible method for unlocking the phone. We must first test this method to ensure that it doesn’t destroy the data on the phone, but we remain cautiously optimistic.”

The government was ordered by Magistrate Judge Sheri Pym in Riverside, California to file a report on the status of its efforts by April 5. Pym also put on hold her order for Apple to cooperate.

People ‘Curious’

“There’s a lot of people right now who are curious who this third party is,” said David O’Brien, a senior researcher with the Berkman Center for Internet and Society at Harvard University. “It appears the FBI turned away from the opportunity to test its case in court and get a ruling that could have set a precedent.”

Apple attorneys told reporters on a conference call that they have no information about the Federal Bureau of Investigation’s new claim that it may be able to access the iPhone without the company’s help. They only found about it Monday, they said.

The lawyers added that they would want the government to share the nature of the security vulnerability with the company if the case proceeds.

New Method

The Justice Department won’t need Apple’s help in running tests and should know by April 5 whether it works, said a law enforcement official who asked not to be identified.

The entity that approached the Justice Department on Sunday isn’t part of the U.S. government, said the official, who declined to provide any other details about it.

If the method works, it will eliminate the need for the court case against Apple to continue, but it’s too early to say if the technique could also be applied to other cases, the official said.

Security experts have said there are many ways the FBI could hack into the iPhone 5c used by Syed Rizwan Farook, who with his wife carried out the attack in San Bernardino. Both were killed hours later in a police shoot-out.

Exploiting Cracks

Jonathan Zdziarski, a cybersecurity researcher who consults with law enforcement, says the FBI might be able to copy the contents of the phone onto a chip and swap it out. Other potential solutions include finding and exploiting cracks in the software. All systems contain flaws and they continue to be found every month in Apple’s software, according to Jason Syversen, a former manager at the Defense Advanced Research Projects Agency (DARPA) and now chief executive officer of cyber security firm Siege Technologies.

Some experts have argued that the FBI should ask the National Security Agency for help. They note that the NSA is the best-funded spy agency on Earth, employs legions of hackers and almost certainly can break into secure computer systems. But in testimony before Congress this month, Worcester Polytechnic Institute cybersecurity professor Susan Landau said the NSA may be reluctant to help the FBI, since the secretive agency’s hacking abilities could become public should it be hauled into court.

Chief Executive Officer Tim Cook, at Apple’s product launch Monday announcing the release of a smaller iPhone, opened the event by wading into the political debate over privacy and encryption, saying “We believe strongly we have a responsibility to help you protect your data and your privacy.”

Cook went on to introduce a new, smaller iPhone that will start at $399, seeking to jump-start sales of Apple’s flagship product by enticing more users to upgrade, especially in high-growth markets such as China and India. The iPhone SE has a 4-inch-screen and will include the same encryption features, such as Touch ID fingerprint-recognition, as the larger iPhone 6S.

Apple’s product release event closed with rocker Tom Petty’s “I Won’t Back Down” blaring over over the sound system.

The case is In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203, 16-00010, U.S. District Court, Central District of California (Riverside).