I think it only becomes creepy to most people because until then, it's not something they can observe. Now, when it starts leaking all over in undeniable ways, THEN things get interesting.
That would make this whole lawsuit rather much meritless, and is something I've been trying to explain to a few people from the get go that this is being gone about all wrong...
I'm pretty sure that was true at some point, but once you let this particular genie out of the bottle... Or is it a borg cube that states "Resistance is Futile, all your creations are belong to us?"
Re: Re: Re: Re: How to turn off microsoft's notice
Then may I suggest Linux Mint? The stuff is QAed to hell and back, and if you take the business stable branch is supported for a decade. And even if you take the not-quite-as-stable branch, it's still not bleeding edge, everything is usually well finished, and a few clicks in the XFCE environment will reskin things to look like WinXP for the most part...
This smells like stupid... And actually, a better metaphor isn't trying to trademark Cafeteria in Spanish, it'd be trying to trademark 'cafe' which is short for cafeteria. And is Spanish.
The other assumption being made is that they didn't already have the data before making the filing to the court. At this point? I'm not saying they are lying bastards, but I wouldn't trust them with my bank PIN, much less my phone's.
The point is the 10 try count is, hilariously, one of those things that's being copied back, and thus reset. I'm personally hoping on the next iPhone that isn't already out, that the passcode count -and- the key are kept on flash memory directly attached or internal to the CPU.
"The solution is not, of course, that encryption should be weakened, let alone banned. But neither is it true that nothing can be done without weakening encryption," he said, adding that it was wrong to see every attempt to tackle the misuse of encryption by criminals and terrorists as a "backdoor".
If it can be used against someone 'misusing' it, it can be used against a legitimate user. Why is this so hard for some people to understand?
I'm pointing out that booting from external media does not, in general, require running from a ramdisk.
No, but it -does- require you either can A: Shove everything into ram to run the system (Command.com runs from RAM until you run something else.) or B: Have external media access to load things up from instead of onboard. And B is precluded because that'd require changing data on the phone, which -was- on the list of things they said had to be left alone.) Which makes this ... much more challening.
On the post: Once Again With Feeling: Cord Cutting Is Not A 'Myth'
Re: Would cut, but cannot figure how to
On the post: IBM Wants To Patent A Printer That Won't Let You Output Unauthorized Copies
On the post: Russia Provides Glimpse Of A Future Where Powerful Facial Recognition Technology Has Abolished Public Anonymity
Re:
On the post: Cable Lobbying Group Claims More Competition Would Hurt Consumers
Hmmm
This isn't exactly what one calls a high hurdle...
On the post: The Fight Over Copyrighting Klingon Heats Up, And Gets More Ridiculous
Re: edit:
On the post: The Fight Over Copyrighting Klingon Heats Up, And Gets More Ridiculous
Re: lawsuit
On the post: The Proper Channels For Whistleblowers Are Still A Joke
Re: Way to attract the best talent
On the post: Annoying Windows 10 Update Request Highlights Its Annoying-Ness On Live Weather Broadcast
Re: Re: Re: Re: How to turn off microsoft's notice
On the post: Blizzard Pretends IP Made It Kill Fan Server
Re:
On the post: Brewer Threatens Restaurant For Using The Word 'Hofbrau'
Hmmm
On the post: The FBI Doesn't Want To Share Details On The Exploit It Deployed While Running A Child Porn Site
Re: Re:
On the post: DOJ To Court: We Got Into The iPhone, So Please Drop Our Demand To Force Apple To Help Us... This Time
Re: Re: Re: The exploit works on one phone.
On the post: DOJ To Court: We Got Into The iPhone, So Please Drop Our Demand To Force Apple To Help Us... This Time
Re: Re: Re: Re: Re: Re: Re: Nice security
On the post: Router Company Lazily Blocks Open Source Router Firmware, Still Pretends To Value 'Creativity'
Netgear...
On the post: iPhone Forensics Experts Demonstrate Basic Proof Of Concept That The iPhone Hack The FBI Says 'Doesn't Work' Actually Does Work
Re: Re: It's the key, not the data
On the post: iPhone Forensics Experts Demonstrate Basic Proof Of Concept That The iPhone Hack The FBI Says 'Doesn't Work' Actually Does Work
Re: It's the key, not the data
On the post: GCHQ Boss Says Tech Companies, Government Should Work Together To Give The Government What It Wants
Re:
... Which means the US would have them how fast? Yeah, thought so.
On the post: DOJ To NY Court: Hey, Can We Have Another Judge Look Over That Ruling About Breaking Into iPhones?
Re: Re:
The scariest thing I've read this month.
On the post: French Parliament Votes For Law That Would Put Tech Execs In Jail If They Don't Decrypt Data
Speaking of Europe and Cryptography
If it can be used against someone 'misusing' it, it can be used against a legitimate user. Why is this so hard for some people to understand?
On the post: We Read Apple's 65 Page Filing Calling Bullshit On The Justice Department, So You Don't Have To
Re: Re: Re: Re: Re: Re: Re: Re: ...also IOS running entirely in RAM
No, but it -does- require you either can A: Shove everything into ram to run the system (Command.com runs from RAM until you run something else.) or B: Have external media access to load things up from instead of onboard. And B is precluded because that'd require changing data on the phone, which -was- on the list of things they said had to be left alone.) Which makes this ... much more challening.
Next >>