Hacker News new | past | comments | ask | show | jobs | submit login

Why not? Police can search your house or seize your mail with a court order. Why can't they search your phone or computer?



They can search my phone and computer with a court order. What they should not be able to do is force companies to compromise proper encryption so they always have the ability to find something.


That's not the only angle here. Apple was asked to aide the FBI in attacking a phone, not to design bad crypto. (They may have also been asked to design bad crypto, but that's not what is happening here)


Except that the authorities do want companies to use bad crypto. The only reason they've had to fall back on demanding an attack vector is because they haven't yet been able to force their preferred solution (bad crypto) to be implemented.

Demanding an attack vector should be seen as the same concept as demanding bad crypto, because the intent behind the request is the same. They're trying to convince us that these are different requests, but the end result is the same. A workaround to attack good security is the same as having bad security to begin with. I can't imagine why anybody would think that "bad crypto" and "attack vector" are not very nearly the same thing.


But what you are forgetting is that Apple has been fully compliant and cooperative throughout this investigation. The problem with building a backdoor into a highly encrypted security system gives pathways for others to find the same backdoor. If other hackers knew there is a for-sure way to gain access and hack an iPhone, they will find that path. With today's plethora of technology, a line needs to be crossed in order to protect our privacy. We hold so many personal details inside of our phones and if by some chance the backdoor were to be released, chaos and panic would run ramped. I can understand completely why Apple deems this process "too dangerous".


The pathway is obvious- build a signed image that lets you guess unlimited passwords at maximum speed. Apple doesn't have to do it to make it apparent it would work. The avenue is already in use:

As many jailbreakers are familiar, firmware can be loaded via Device Firmware Upgrade (DFU) Mode. Once an iPhone enters DFU mode, it will accept a new firmware image over a USB cable.

The special "backdoor" Apple has access to:

Before any firmware image is loaded by an iPhone, the device first checks whether the firmware has a valid signature from Apple. This signature check is why the FBI cannot load new software onto an iPhone on their own — the FBI does not have the secret keys that Apple uses to sign firmware.

http://blog.trailofbits.com/2016/02/17/apple-can-comply-with...

As for "the attack firmware could leak"- well, so could the signing keys.


Because they can't. A court order can't let them fly. Nor can it compel you to build them wings. (Though you may have to buy them a can of Red Bull.)

The police were already searching you and your house so we enacted rules to try to control that. Those rules didn't enable the searching - they placed restrictions on the applicability of evidence to reduce the desire to search improperly.


If they can get in. Suppose your house is made of some material (10' thick steel?) which cannot be broken into without a use of a nuke (bear with me....). Is the government allowed to nuke that neighborhood just to get into the house?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: