From iang@iang.org Fri Jul 6 02:33:01 2018 From: ianG To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [cryptography] ICIJ's project - comment on cryptography & tools Date: Fri, 06 Jul 2018 02:33:01 +0000 Message-ID: <172289283723.3881296.4562606206189572980.generated@mail.pglaf.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2338819779729890388==" --===============2338819779729890388== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable On 5/04/13 05:36 AM, James A. Donald wrote: > On 2013-04-05 10:47 AM, James A. Donald wrote: >> >> How does it work? Is it really secure, and if it is, how did they >> manage a "not one click for security" user interface? > > Already answered by others on this list. Not secure, apple can MIM it. Seems like. However, the barrier for that seems somewhat higher than an intercept or =20 pen register. (Entering into full speculation mode here) I suspect that =20 one would need a direct court order akin to a full search & seizure in =20 order to give the feds access to the messages; it seems to involve =20 handing over the entire device key to clone the full personality. The original CNN article doesn't pass muster, a far more skeptical and =20 analytical one is here: http://securitywatch.pcmag.com/none/310015-the-real-reason-the-feds-can-t-rea= d-your-imessages iang _______________________________________________ cryptography mailing list cryptography(a)randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- --=20 Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE --===============2338819779729890388==--