« BAF Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next

Re: Here : where Apple is with respect to privacy.....

By: zzstar in BAF | Recommend this post (0)
Fri, 30 Mar 18 10:55 PM | 67 view(s)
Boardmark this board | Bash-a-Farter
Msg. 01829 of 06530
(This msg. is a reply to 01827 by Decomposed)

Jump:
Jump to board:
Jump to msg. #

You’re mistepresenting the facts, and you are ignorant to boot.

The FBI, RESET THE ICLOUD PASSWORD, AND BY DOING THAT MADE THE BACKUPS OF THE DEVICE ON THE CLOUD FAIL, SO THEY COULD NOT GET THE BACKUPS FOR THE LAST DAYS BEGORE THE EVENT, BUT THEY DID GET THE BACKUPS OF TNE PERIOD PRIOR TO THAT FROM APPLE.

AND THAT IS A FACT!

THERE WAS NO WAY FOR THEM TO GET IN, AND THEY STUPIDLY RESET THE PASSWORD AND THE DEVICE COULD NOT BACKUP VIA WIFI AUTOMATICALLY AT NIGHT WHEN PLUGGED IN TO POWER TO RECHARGE. THAT’S HOW ICLOUD BACKUPS WORK, IGNORAMUS.

ALL THEY HAD TO DO WAS BRING THE PHONE INTO A PLACE WHERE IT WAS POSSIBLE IT HAD CONNECTED TO WIFI BEFORE, THE WORKPLACE OR HOME, AND LEAVE IT OVERNIGHT TO CHARGE, AND THEY WOULD HAVE ITS LATEST BACKUP DATA WHICH APPLE WOULD ALSO PROVIDE.

There can never be anyone entrusted with encryption keys otner than Oneself. And that is what Apple is saying. The Israeli security company that was able to hack that older phone, was HACKED ITSELF FOLLOWING THAT TIME!!!

NO ENCRYPTION KEY IS SAVE ANYWHERE, OTHER THAN IN YOUR FU GERPRINT, FACE, AND PASSWORD, ALL OF THEM WITH YOU AND NO ONE ELSE.

THAT IS APPLE’S POSITION. You are snarter than Apple, eh?

Your ignorance is bliss.

ANY TYPOS CAN BE ADDRESSED TO AUTOCORRECT.

HAAAAAAABWA HAAHAHAHA


- - - - -
View Replies (3) »



» You can also:
- - - - -
The above is a reply to the following message:
Re: Here : where Apple is with respect to privacy.....
By: Decomposed
in BAF
Fri, 30 Mar 18 8:38 PM
Msg. 01827 of 06530

zz:

Re: “Beyond that, no one can get to your device without the password or faceid, or fingerprint. No one.”

A few years ago, there was a terror attack in California. Afterward, the FBI took the terrorist's cell phone to Apple and asked them to decrypt it. Apple refused. They didn't say they couldn't; they said they WOULDN'T. A battle ensued.

After a few weeks, the FBI dropped the matter, stating that they had decrypted it themselves.

Don't you remember that? Maybe you need to be educated.

Quite apart from that, Apple controls both the hardware and the software on its devices. There is nothing preventing it from building secondary BACKUP cryptographic modules into its devices, modules to which Apple has the requisite key. Nothing.

You're obviously a very trusting soul. But when it comes to security, being trusting is S-T-U-P-I-D. Really, Apple should be building hardware encryption into its devices, then implementing an independent vendor's software to encrypt the cipher text. Only the independent vendor could initiate the decryption. THAT is how solid security is implemented.

But Apple doesn't do that. They want to retain control.

Authority that you claim to be, you really ought to know this.


« BAF Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next