They say it fits "a 2.5 inch form factor", not "the 2.5 inch form factor". Looking at the picture, it certainly looks like the drive is 'taller' than a normal 11mm or so SSD designed for laptops, taking up a larger volume than normal. Not sure what "the" 2.5 inch form factor allows. While probably not taking up half the volume of a 3.5 inch drive, it may be close enough to not allow more than 2 in the same space, especially given the need for connectivity to the drive for power and data.
Rather than assist the effort to fully investigate a deadly terrorist attack by obeying this Court's Order of February 16, 2016, Apple has responded by publicly repudiating that Order. Apple has attempted to design and market its products to allow technology, rather than the law, to control access to data which has been found by this Court to be warranted for an important investigation. Despite its efforts, Apple nonetheless retains the technical ability to comply with the Order, and so should be required to obey it.This part is only marginally misleading. The key point: of course Apple has designed a product that allows technology to control access because that's how encryption works. It's as if the DOJ still doesn't understand that. Here's a simple, if unfortunate, fact for the DOJ: there are always going to be some forms of communications that it doesn't get to scoop up. Already we know that Farook and his wife destroyed their two personal iPhones. Why not just recognize that fully encrypted phones are the equivalent of that? No one seems to be whining about the destroyed iPhones and what may have been lost even though the very fact that they were destroyed, and this one was not, suggests that if there was anything important on any of his phones, it wasn't this one. There are also things like communications between, say, a husband and wife in their own home. The DOJ can never get access to those because the two people are dead. Think of that like their brains were encrypted and their death made the key get tossed.
The government has reason to believe that Farook used that iPhone to communicate with some of the very people whom he and Malik murdered. The phone may contain critical communications and data prior to and around the time of the shooting that, thus far: (1) has not been accessed; (2) may reside solely on the phone; and (3) cannot be accessed by any other means known to either the government or Apple. The FBI obtained a warrant to search the iPhone, and the owner of the iPhone, Farook's employer, also gave the FBI its consent to the search. Because the iPhone was locked, the government subsequently sought Apple's help in its efforts to execute the lawfully issued search warrant. Apple refused."May contain" is a pretty weak standard, especially noting what I said above. Furthermore, if there were communications with Farook's victims, then shouldn't that information also be accessible via the phones of those individuals as well? And if they already know that there was communications between the two, much of that data should be available elsewhere, in terms of metadata of a phone call, for example.
Apple left the government with no option other than to apply to this Court for the Order issued on February 16, 2016.Actually, there are plenty of other options, including traditional detective work, looking for information from other sources or just recognizing that sometimes you don't get every piece of data that exists. And that's okay.
The Order requires Apple to assist the FBI with respect to this single iPhone used by Farook by providing the FBI with the opportunity to determine the passcode. The Order does not, as Apple's public statement alleges, require Apple to create or provide a "back door" to every iPhone; it does not provide "hackers and criminals" access to iPhones; it does not require Apple to "hack [its] own users" or to "decrypt" its own phones; it does not give the government "the power to reach into anyone's device" without a warrant or court authorization; and it does not compromise the security of personal information. To the contrary, the Order allows Apple to retain custody of its software at all times, and it gives Apple flexibility in the manner in which it provides assistance. In fact, the software never has to come into the government's custody.And here's where the misleading stuff really starts flowing. It absolutely is a backdoor. Anything that makes it easier for a third party to decrypt data without knowing the key is a backdoor. That's the definition of a backdoor. That it comes in the form of making it substantially easier to brute force the passcode doesn't change the fact that it's still a backdoor.
In the past, Apple has consistently complied with a significant number of orders issued pursuant to the All Writs Act to facilitate the execution of search warrants on Apple devices running earlier versions of iOS. The use of the All Writs Act to facilitate a warrant is therefore not unprecedented; Apple itself has recognized it for years. Based on Apple's recent public statement and other statements by Apple, Apple's current refusal to comply with the Court's Order, despite the technical feasibility of doing so, instead appears to be based on its concern for its business model and public brand marketing strategy.And the misleading bullshit gets ratcheted up a notch. First of all, we already went through why the "Apple helped us in the past" story is wrong. This is totally different. One is giving access to unencrypted information that Apple had full access to. The other is building a system to hack away security features in order to hack into an encrypted account. Very, very different. Second, the whole idea that better protecting its customers is nothing more than "a brand marketing strategy" is insulting. Should the US government want the American public to be protected from criminals and malicious hackers and attacks? The best way to do that is with encryption. The fact that consumers are demanding that they be safer is not an "Apple marketing strategy" it's Apple looking out for the best interests of its customers.
While the Order in this case requires Apple to provide or employ modified software, modifying an operating system which is essentially writing software code in discrete and limited manner is not an unreasonable burden for a company that writes software code as part of its regular business. The simple fact of having to create code that may not now exist in the exact form required does not an undue burden make. In fact, providers of electronic communications services and remote computing services are sometimes required to write some amount of code in order to gather information in response to subpoenas or other process. Additionally, assistance under the All Writs Act has been compelled to provide something that did not previously exist the of the contents of devices seized pursuant to a search warrant. In United States v. Fricosu..., a defendant's computer whose contents were was seized, and the defendant was ordered pursuant to the All Writs Act to assist the government in producing a copy of the contents of the computer. Here, the type assistance does not even require Apple to assist in producing the contents; the assistance is rather to facilitate the FBI's attempts to test passcodes.Again, this is both ridiculous and extremely misleading. Creating brand new software -- a brand new firmware/operating system is fraught with challenging questions and potential security issues. It's not just something someone whips off. If done incorrectly, it could even brick the device entirely, and can you imagine how the FBI would react then? This is something that would require a lot of engineering and a lot of testing -- and still might create additional problems, because software is funny that way. Saying "you guys write software, so writing a whole new bit of software isn't a burden" is profoundly ignorant of the technological issues.
As noted above, Apple designs and implements all of the features discussed, writes and signs the routinely patches security or functionality issues in its operating system, and releases new versions of its operating system to address issues. By comparison, writing a program that turns off features that Apple was responsible for writing to begin with would not be unduly burdensome.This shows a profound technological ignorance. Yes, Apple updates its operating system all the time, but yanking out security features is a very different issue, and could have much wider impact. It might not, but to simply assume that it's easy seems profoundly ignorant of how software and interdependencies work. Again, the DOJ just pretends it's easy, as if Apple can just check some boxes that say "turn off these features." That's not how it works.
Moreover, contrary to Apple's recent public statement that the assistance ordered by the Court "could be used over and over again, on any number of devices" and that "[t]he government is asking Apple to hack our own users," the Order is tailored for and limited to this particular phone. And the Order will facilitate only the FBI's efforts to search the phone; it does not require Apple to conduct the search or access any content on the phone. Nor is compliance with the Order a threat to other users of Apple products. Apple may maintain custody of the software, destroy it after its purpose under the Order has been served, refuse to disseminate it outside of Apple, and make clear to the world that it does not apply to other devices or users without lawful court orders. As such, compliance with the Order presents no danger for any other phone and is not "the equivalent of a master key, capable of opening hundreds of millions of locks."We discussed some of this above, but the issue is not the specific code that Apple will be forced to write, but rather the very fact that it will be (contrary to the DOJ's claim) forced to hack their own phones to eliminate key security features, in order to allow the FBI to get around the security of the phone and access encrypted content. If the court can order it for this phone, then yes, it can order it for any iPhone, and that's the key concern. Furthermore, again having Apple tinker with the software can introduce security vulnerabilities -- and already this discussion has revealed a lot about how hackers might now attack the iPhone. I'm all for full disclosure of how systems work, so that's okay. But the real issue is what happens next. If Apple looks to close this "loophole" in how its security works in the next iPhone update, will the court then use the All Writs Act to stop them from doing so? That's the bigger issue here, and one that the DOJ completely pretends doesn't exist.
To the extent that Apple claims that the Order is unreasonably burdensome because it undermines Apple's marketing strategies or because it fears criticism for providing lawful access to the government, these concerns do not establish an undue burden. The principle that "private citizens have a duty to provide assistance to law enforcement officials when it is required is by no means foreign to our traditions."Again, this is a made up talking point. Protecting user privacy, as they demand it, is not a "marketing strategy." It's a safety and security strategy. You'd think, of all agencies, the FBI would appreciate that.
I am in the midst of building my treadmill/standing desk workspace now. I work at home, so have lots of leeway, but a few of the ideas I have come up with might be worth contemplating, if a bit expensive. I am trying to remove as many of the impediments to my using this as possible. Just standing all day or walking all day leads to pain and suffering, just as much as sitting all day does. The idea is to mix it up. The solution I have come with is to combine a treadmill desk with a standing chair, on a raised platform level with the treadmill.
I have a Lifespan TR1200DT treadmill (http://www.lifespanfitness.com/tr1200-dt3-under-desk-treadmill ), the 'best' option available right now...you can get two TR1200's for the price if you are thinking of getting the TR5000. There is a new brand of treadmills coming out from iMovR soon that will be designed from the ground up for under desk walking assuming the quality pans out.( http://www.imovr.com/imovr-the... )
I also have a Focal Locus leaning/standing seat chair as well.( http://www.focaluprightfurnitu... ) This will help relief some of the pressure from standing or walking all day, without the same downsides of sitting.
I am still working on a desk, though the iMovr ThermoDesk ( www.imovr.com/omega-everest-electric-sit-stand-walk-desk-with-embedded-ergo-tilt-keyboard-tray-48-tabletop.html ) is the one I am leaning towards. I am still figuring out the keyboard tray aspect given my personal preferences.
What ties it all together is a custom raised floor around the treadmill (2x4's, plywood and some nice hardwood looking vinyl flooring for a couple of hundred bucks). This allows me to easily wheel the Focal Locus on top of the treadmill or off to the side on the raised floor without lifting or strain, and quickly in seconds. The wheels of the Locus sit on the side rails, while the rear T which is rubber sits on the plenty sturdy enough treadmill belt. You could also have a semi-hard but light foam board cut to size to drop over the belt if you were worried about damage/wear.
Beyond that I am working on using 'light' voice recognition, additional mouse input options (handheld adesso easycat for when I am just browsing around...I'm disappointed with the wireless offerings being so large or requiring 2 finger scrolling) , x-keys buttons, etc. to help reduce the sheer volume of buttons and clicks I press each day, hopefully by 20-40%.
Hopefully someone else's lightbulb goes on from this idea.
Like I said, I don't care, just the attitude that somehow the victim is in the wrong, and the faux scolding of 'I am better than you' your attitude implied. If you reread your sentence
"Of course I havent had to use it, because I generally dont run into issues with apps asking for insane levels of access. Maybe its the apps you're using?"
and can honestly say it doesn't sound remotely douchey, then I apologize.
"Of course I haven't ever had an STD, but I generally don't use the low end hookers you obviously use..."
TIKL:
read your contacts
approximate location (network-based)
read call log
It is definitely better than most, but that doesn't make it good.
I don't like any of them being grabby, which is why I use Privacy Guard, which is actually just the Google hidden App Ops.
"Of course, I need to sound like a douche, and I have to blame the victim."
Try to install any PushToTalk app from the play store, like Voxer, etc...
Try to install Yahoo Mail.
Try to install FB.
Try to install anything supported by ads and watch it ask for 'fine location', contacts, phone number, etc.
Not sure what you are using your phone for that you aren't running across apps ask for things that they probably shouldn't, and honestly I don't care, because I am sure it is a perfectly valid use case.
Hot topics as I write this: Why doesn't Bruce resurrect Technocrat.net now that Slashdot is owned by Dice.com and stinks more than the last two times I've shut down Technocrat.net due to lack of readership?
Think it would really work this time? You've got my email and phone.
So yes, email him to give him an idea of how much actual interest there is so he knows the readership will be there.
Nothing to worry about. It's just a 50th Anniversary tribute to Dr. Strangelove.
Interesting sentiment, considering things got to a point in Dr. Strangelove where soldiers breaking the law was the only hope for saving the world:
Group Capt. Lionel Mandrake: Colonel... that Coca-Cola machine. I want you to shoot the lock off it. There may be some change in there.
Colonel "Bat" Guano: That's private property.
Group Capt. Lionel Mandrake: Colonel! Can you possibly imagine what is going to happen to you, your frame, outlook, way of life, and everything, when they learn that you have obstructed a telephone call to the President of the United States? Can you imagine? Shoot it off! Shoot! With a gun! That's what the bullets are for, you twit!
Colonel "Bat" Guano: Okay. I'm gonna get your money for ya. But if you don't get the President of the United States on that phone, you know what's gonna happen to you?
Group Capt. Lionel Mandrake: What?
Colonel "Bat" Guano: You're gonna have to answer to the Coca-Cola company.
Perhaps encouraging these officers to come up with outside the box solutions is a good idea. Not that it worked in the movie, but they need to be prepared to piss on a spark plug if they think it will do any good.
Certain United States export control regulations prohibit U.S. businesses, such as MOOC providers like Coursera, from offering services to users in sanctioned countries, including Cuba, Iran, Sudan, and Syria. Under the law, certain aspects of Coursera’s course offerings are considered services and are therefore subject to restrictions in sanctioned countries...
Facebook is a "U.S. business" that is "offering services" to users in sanctioned countries. Only it's the Iranian government that tries to block it and redirects you to a page informing users the Web site they are trying to access is "bad for your health." I suppose the difference is that Facebook can be used to help people organize to overthrow the regime the U.S. government does not want, so that makes it OK. Plus, more people using it in a sanctioned country gives the NSA a clearer picture of the trends, attitudes and threats in that country.
I'm not saying Facebook should be restricted from offering services in countries like Iran. I'm saying laws should be applied equally, not politically.
I'll be in trouble if I'm ever raided -- I have several USB devices and CD-R's that I used in the past to make a backup of something, and have lost or forgotten the passwords.
Forget your CDs, it's your DVD collection you should be worried about. "All I remember is the first part! 09 F9... then the hex code for some shade of red... I swear!" This is why everyone should have that number handy.
All the other side needs to know is that you have something to hide, and depending on the level of society you live on, water boarding, lead pipes, or court order to make you divulge what it is.
Unsophisticated societies use lead pipes to force people to divulge information.
Sophisticated societies use court orders.
Modern societies use waterboarding.
Postmodern societies use facebook.
Think about it.
But it uses a new form of steganography based on cryptographic hashes to make the presence of a hidden message far harder for an eavesdropper to detect than in traditional stego.
I think steganography is far more likely to be used to track the people who leak information. When information gets out that was apparently available to multiple people, the leaker may not realize that his copy had a specific steganographic signature that identifies him as the source. It could be a pattern of extra spaces or line breaks in the code of document that he doesn't even see. The increased availability of the technology will likely mean smaller companies or government agencies will use it to suppress leaks.
01101110 01101111 00100000 01101101
01101111 01110010 01100101 00100000
01110011 01100101 01100011 01110010
01100101 01110100 01110011
Outside of a dog, a book is man's best friend. Inside of a dog, it is too dark to read.