Big claims require big proof. But I bet all you have is a hunch.
I work alongside law enforcement. Part of my job involves helping detectives follow the instructions Apple/Google provide to them for downloading and unencrypting people’s phone data once a judge has given permission for them to request it from Apple/Google.
Now, I’m not familiar with “Lockdown Mode”. Maybe that uses separate encryption to encrypt data stored on your phone that ISN’T cloud synced data. But even then, if that Lockdown Mode is software created by the manufacturer, then they could have the decryption algorithm to decrypt it and I wouldn’t trust it. I would only trust open-source encryption software, like Veracrypt.
Bottom line is I’m here to guarantee you that if the data is synced with a cloud, it absolutely can be obtained by law enforcement.
Not that it’s particularly relevant, but typically when law enforcement get into the data, it’s usually because they have reasonable suspicion and it’s usually kiddie porn or chat logs proving they were trying to meet up with underage individuals. And I’m here to tell you that shit is way more prevalent than I think most people realize.
Zamboni_Driver@lemmy.ca 1 day ago
The big claim is that they couldn’t get into the reporters iPhone. You are right to demand proof before believing something so obviously made up.
cley_faye@lemmy.world 1 day ago
Unless there’s an incredible amount of people “not in” on some universal secret, maths gonna maths, and physics gonna physics. Actual encryption works well in a proven way, computational power isn’t as infinite as some people think, and decent software implementations exists.
Getting hold of anything properly encrypted with no access to the key still requires an incredible amount of computing power to brute force. Weak/bad implementations can leave enough info back to speed this up, malicious software can make use of an extra, undocumented encryption key, etc. but a decent implementation would not be easy to break in.
Now, this does not say anything about what Apple actually do. They claim to have proper encryption, but with anything closed source, you only have your belief to back you up. But it’s not an extraordinary claim to say that this can be done competently. And Apple would have a good incentive in doing so: good PR, and no real downside for them since people happily unlock their phone to keep their software running and doing whatever it wants locally.
Zamboni_Driver@lemmy.ca 1 day ago
Or, they walk in through the back door.
cley_faye@lemmy.world 21 hours ago
Math have little room for backdoors.