-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mar 28, 2013, at 10:27 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
There are a couple interesting lessons from LocationGate.
[...]
The second lesson has to do with the the status of iOS protection classes
that can leave things
On 29/03/13 08:27 AM, Jeffrey Goldberg wrote:
...
The scare story spread quickly, with the more hyperbolic accounts getting the
most attention. The corrective analysis probably didn't penetrate as widely.
The issue that I see is that because Apple runs a secret shop, they are
more
On 29/03/13 06:42 AM, Jon Callas wrote:
...
I don't believe that it is in the interests of a company to shaft its
customers. ...
Right, this is why I like Apple. This is the same secret as in the
gambling industry. The house always wins -- so why bother cheating?
Better to actually go
On 29/03/13 06:42 AM, Jon Callas wrote:
- From being there, Apple's culture and practices are such that everything they
do is focused on making cool things for the customers.
In a world of secrecy, media, spin, security complexity and so forth,
personal testimony from the inside as to bona
Jon Callas writes, in part:
-+-
| Let me ask again -- what could an LE or GOV offer that would be
| better than being cool? Being a snitch, being a sell-out isn't cool.
| Lots of people don 't get that. To them, money is more important
| than being cool. And all that
On Thu, Mar 28, 2013 at 11:42 PM, Jon Callas j...@callas.org wrote:
On Mar 28, 2013, at 6:59 PM, Jeffrey Walton noloa...@gmail.com wrote:
...
Apple designed the hardware and hold the platform keys. So I'm clear
and I'm not letting my imagination run too far ahead:
...
There are no means
[Reply-To set to cryptopolitics]
On 2013-03-28, at 12:37 AM, Jeffrey Walton noloa...@gmail.com wrote:
On Wed, Mar 27, 2013 at 11:37 PM, Jeffrey Goldberg jeff...@goldmark.org
wrote:
... In the other cases, the phones did have a passcode lock, but
with 1 possible four digit codes it
On Mar 27, 2013 11:38 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
http://blog.agilebits.com/2012/03/30/the-abcs-of-xry-not-so-simple-passcodes/
Days? Not sure about the algorithm but both ocl and jtr can be run in
parallel and idk why you'd try to crack a password on an arm device
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Not replied-to cryptopolitics as I'm not on that list -- jdcc]
On Mar 28, 2013, at 3:23 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
Do hardware manufacturers and OS vendors have alternate methods? For
example, what if LE wanted/needed iOS
On Mar 28, 2013, at 4:07 PM, shawn wilson ag4ve...@gmail.com wrote:
On Mar 27, 2013 11:38 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
http://blog.agilebits.com/2012/03/30/the-abcs-of-xry-not-so-simple-passcodes/
Days? Not sure about the algorithm but both ocl and jtr can be
On Thu, Mar 28, 2013 at 7:27 PM, Jon Callas j...@callas.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Not replied-to cryptopolitics as I'm not on that list -- jdcc]
Ditto.
On Mar 28, 2013, at 3:23 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
Do hardware manufacturers and
On Thu, Mar 28, 2013 at 7:24 PM, Kevin W. Wall kevin.w.w...@gmail.com wrote:
On Thu, Mar 28, 2013 at 7:27 PM, Jon Callas j...@callas.org wrote:
[Rational response elided.]
All excellent, well articulated points. I guess that means that
RSA Security is an insane company then since that's
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mar 28, 2013, at 5:24 PM, Kevin W. Wall kevin.w.w...@gmail.com wrote:
All excellent, well articulated points. I guess that means that
RSA Security is an insane company then since that's
pretty much what they did with the SecurID seeds.
On Thu, Mar 28, 2013 at 7:27 PM, Jon Callas j...@callas.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Not replied-to cryptopolitics as I'm not on that list -- jdcc]
On Mar 28, 2013, at 3:23 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
Do hardware manufacturers and OS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mar 28, 2013, at 6:59 PM, Jeffrey Walton noloa...@gmail.com wrote:
On Thu, Mar 28, 2013 at 7:27 PM, Jon Callas j...@callas.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Not replied-to cryptopolitics as I'm not on that list --
On 2013-03-29 8:23 AM, Jeffrey Goldberg wrote:
I suspect Apple has the methods/processes to provide it.
I have no more evidence than you do, but my guess is that they don't, for
the simple reason that if they did that fact would leak out. Secret
conspiracies (and that's what it would take) grow
On 2013-03-29 10:47 AM, Nico Williams wrote:
There is zero chance Apple would be backdooring anything for profit
They might, however, and very likely are, backdooring everything to
avoid getting their faces broken in with rifle butts.
___
On 2013-03-28, at 10:42 PM, Jon Callas j...@callas.org wrote:
On Mar 28, 2013, at 6:59 PM, Jeffrey Walton noloa...@gmail.com wrote:
We've seen it in the past with for example, Apple and location data,
Well, with locationgate at Apple, that was a series of stupid and unfortunate
bugs and
On Mar 24, 2013, at 5:30 PM, Jeffrey Walton noloa...@gmail.com wrote:
I wonder how they are doing it when other tools fails.
The article explained how they do it. The case they described said the phone
had no passcode lock, so the data on the phone would not have been encrypted.
In the
On Wed, Mar 27, 2013 at 11:37 PM, Jeffrey Goldberg jeff...@goldmark.org wrote:
On Mar 24, 2013, at 5:30 PM, Jeffrey Walton noloa...@gmail.com wrote:
I wonder how they are doing it when other tools fails.
... In the other cases, the phones did have a passcode lock, but
with 1 possible
Interesting point below is OS vendors are extracting data for law
enforcement. I wonder how they are doing it when other tools fails.
(Thanks to JM on another list for the link).
http://www.forbes.com/sites/andygreenberg/2013/02/26/heres-what-law-enforcement-can-recover-from-a-seized-iphone/
You
21 matches
Mail list logo