Re: [cryptography] ICIJ's project - comment on cryptography & tools
On 5/04/13 05:36 AM, James A. Donald wrote:
On 2013-04-05 10:47 AM, James A. Donald wrote:
How does it work? Is it really secure, and if it is, how did they manage a "not one click for security" user interface?
Already answered by others on this list. Not secure, apple can MIM it.
Seems like. However, the barrier for that seems somewhat higher than an intercept or pen register. (Entering into full speculation mode here) I suspect that one would need a direct court order akin to a full search & seizure in order to give the feds access to the messages; it seems to involve handing over the entire device key to clone the full personality. The original CNN article doesn't pass muster, a far more skeptical and analytical one is here: http://securitywatch.pcmag.com/none/310015-the-real-reason-the-feds-can-t-re... iang _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (1)
-
ianG