FBI Director: Ban Encryption to Counter Domestic Extremism

The #1 community for Gun Owners in Indiana

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,148
    77
    Porter County
    For Apple, they were probably using the method that was just patched to get into phones.

    Beyond that, if there is a .gov agency that has some abilities in that area, it would be the NSA. I doubt they are sharing with the other alphabet agencies though.

    Why would they would hesitate to use it if they had it? With a warrant, they can break into a vault. Why wouldn't they be able to break into your phone if they could?
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    25,895
    113
    Except for that time they were pressuring apple into giving them a back door, claiming they couldn't get into a phone.

    Apple denied them, then once the story went silent, they got into that phone.
    Almost like they're just lazy assholes who were wanting a faster and easier way to spy on every citizen.

    Your alternate history didn't happen.

    The story was far from silent, the fight was in SCOTUS, and a 3rd party (Azimuth Security from Australia) developed a method to defeat the encryption.

     

    Keith_Indy

    Master
    Rating - 95.2%
    20   1   0
    Mar 10, 2009
    3,232
    113
    Noblesville
    Yep. As per my post, there is no doubt they can already do it. Its whether they will admit on the record they can in order to obtain legal status. (warrants, present evidence in court, etc)

    So currently they can do it, and can see anything they want... but in a HARD only 'off the record' context, and only for the consumption of the intelligence community internally. This push is only to dot the i's and cross the t's so they can use the evidence against us in court.
    And leak to fellow travelers in the press and government against anyone not in their club.
     

    Tombs

    Grandmaster
    Rating - 0%
    0   0   0
    Jan 13, 2011
    12,062
    113
    Martinsville
    Your alternate history didn't happen.

    The story was far from silent, the fight was in SCOTUS, and a 3rd party (Azimuth Security from Australia) developed a method to defeat the encryption.


    Clearly it did happen, you just spelled out how it happened.
     

    jkaetz

    Master
    Rating - 100%
    3   0   0
    Jan 20, 2009
    1,961
    83
    Indianapolis
    I guess I always assumed companies developing encryption technology retained the ability or "keys" to unencrypt data on their systems. I didn't think that was the definition of a backdoor.
    Only the algorithm/app is developed by a third party. The keys are generated by you on your device and plugged in. So long as the app or another bad actor doesn't steal them they are not available to anyone else. In most cases the keys can also be changed at will.

    A backdoor would be the equivalent of a master key that would always work and couldn't be changed. This would of course make the encryption useless after the key was discovered/leaked/stolen.
     

    foszoe

    Grandmaster
    Site Supporter
    Rating - 100%
    24   0   0
    Jun 2, 2011
    16,052
    113
    When my son's were deployed they were told to use Signal for the encryption and security the app provides. My niece is currently deployed to Africa and she is now using Signal app.

    The encryption works. However, if there is a way for the feds to get in than anyone with the proper skills will be.


    If the feds can get in they wouldn't be asking for congress to regulate the technology.
    Signal...it's not just a mouthwash anymore
     

    Tombs

    Grandmaster
    Rating - 0%
    0   0   0
    Jan 13, 2011
    12,062
    113
    Martinsville
    Only the algorithm/app is developed by a third party. The keys are generated by you on your device and plugged in. So long as the app or another bad actor doesn't steal them they are not available to anyone else. In most cases the keys can also be changed at will.

    A backdoor would be the equivalent of a master key that would always work and couldn't be changed. This would of course make the encryption useless after the key was discovered/leaked/stolen.

    The presence of a back door makes the encryption worthless from inception.
     

    AtTheMurph

    SHOOTER
    Rating - 0%
    0   0   0
    Jan 18, 2013
    3,147
    113
    The presence of a back door makes the encryption worthless from inception.
    We must ban privacy to keep you safe.
    We must confiscate weapons to keep you safe.
    We must steal your money to give back to you later to keep you safe.
    You must do this or that to keep you safe.
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    25,895
    113
    Clearly it did happen, you just spelled out how it happened.

    The event happened. Your account of it is not what happened. The story did not "go silent", the media covered it blow by blow. They could not get into the phone when they went to court. They were still fighting with Apple when someone else stood up and said they'd figured it out. They then used that someone else and stopped trying to get Apple to help since it was then moot.
     

    thompal

    Master
    Rating - 0%
    0   0   0
    Sep 27, 2008
    3,545
    113
    Beech Grove
    Feds can already "backdoor". There is no doubt of this. The issue is Feds presenting the evidence obtained via backdoor in court and trying to explain where/ how the evidence was obtained. It's stunning really. Personal papers offered protection when in locked briefcase. Personal papers locked in phone? Sh***********t. *=i

    There's a Supreme Court case from the 80's or 90's which may cloud that issue. Look up Acevedo. I think the spelling is right.
     

    thompal

    Master
    Rating - 0%
    0   0   0
    Sep 27, 2008
    3,545
    113
    Beech Grove
    Except for that time they were pressuring apple into giving them a back door, claiming they couldn't get into a phone.

    Apple denied them, then once the story went silent, they got into that phone.
    Almost like they're just lazy assholes who were wanting a faster and easier way to spy on every citizen.

    It's possible that the feds cracked it on their own. Way back in the early 90s, it was estimated that the NSA could crack a 1024 bit PGP encrypted message in a couple of months if they dedicated enough CPU power to it. The thought on Fidonet was that if everyone encrypted enough messages constantly, the feds would get so backlogged that they would never be able to do anything in close to real time.

    I'm pretty sure that the computing power of the NSA has increased by orders of magnitude since then, so true "privacy" of any particular message may be only a matter of days. And if the feds have cracked whatever backdoors have been put in (or the companies handed them over voluntarily), then they will have near instant access to any message they want. After all, you don't need to spend time picking an individual lock if you have the master key to all of the locks.
     

    Cameramonkey

    www.thechosen.tv
    Staff member
    Moderator
    Site Supporter
    Rating - 100%
    35   0   0
    May 12, 2013
    31,822
    77
    Camby area
    There's a Supreme Court case from the 80's or 90's which may cloud that issue. Look up Acevedo. I think the spelling is right.
    And it gets even more murky in more recent rulings.

    Biometric protections (something you have): You can be compelled to unlock the device.
    Password protected (something you may or may not remember) : you cannot be compelled to unlock the device.
     

    BugI02

    Grandmaster
    Rating - 0%
    0   0   0
    Jul 4, 2013
    32,041
    149
    Columbus, OH
    yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements
    Was there anything in Wray's statements that overtly lead you to believe that those are the people they wish to target?

    Banning all guns is manifestly not the solution to their misuse

    Banning all privacy from government surveillance is not the solution to any form of terrorism, it is itself a form of terrorism applied to its own citizens

    Name one increase in government authority/power that was ultimately never abused
     

    BugI02

    Grandmaster
    Rating - 0%
    0   0   0
    Jul 4, 2013
    32,041
    149
    Columbus, OH
    It's possible that the feds cracked it on their own. Way back in the early 90s, it was estimated that the NSA could crack a 1024 bit PGP encrypted message in a couple of months if they dedicated enough CPU power to it. The thought on Fidonet was that if everyone encrypted enough messages constantly, the feds would get so backlogged that they would never be able to do anything in close to real time.

    I'm pretty sure that the computing power of the NSA has increased by orders of magnitude since then, so true "privacy" of any particular message may be only a matter of days. And if the feds have cracked whatever backdoors have been put in (or the companies handed them over voluntarily), then they will have near instant access to any message they want. After all, you don't need to spend time picking an individual lock if you have the master key to all of the locks.
    Why bother to go this route or brute force decrypt when you can just surreptitiously install spyware that can screenshot the decrypted message on the recipient device and pass it along

    See: Pegasus/NSO group
     

    BugI02

    Grandmaster
    Rating - 0%
    0   0   0
    Jul 4, 2013
    32,041
    149
    Columbus, OH
    Then he just made the case against "backdoors"
    But currently, NSA would have no plausible deniability

    Make backdooring no more difficult than unmasking a name in FISA surveillance, where any government official seemingly can do so, and when needed you can push responsibility as far down the chain of command as possible and hang that minor player out to dry
     

    BugI02

    Grandmaster
    Rating - 0%
    0   0   0
    Jul 4, 2013
    32,041
    149
    Columbus, OH
    The question is, do the situations where it might be needed outweigh the situations where would be used inappropriately?
    Agreed, in the specific case as well as pointing out this test should be used in SO many situations

    How many 80 year old people of color who don't drive and have no secure ID or ability to get to the polls actually exist? Are the voting changes instituted to prevent 'voter suppression' used appropriately more than inappropriately

    Essentially cost/benefit analysis. Should be done on everything .gov wants to do
     
    Top Bottom