[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Shocking Video Shows Cop Execute Unarmed Grandpa for Walking Toward Him

A Michigan Police Task Force Is Playing Jurisdiction Games To Avoid Compensating an Innocent Man Cops Put in the Hospital

What is the 'boogaloo?' How online calls for a violent uprising are hitting the mainstream

Dealing with AGWs?

Movie Review: Vanishing Point (1971) : A libertarian perspective

Federal Judges Meeting Will Target Trump And Barr, Report Says

NSC adviser 'is to be reassigned' amid DC rumors SHE is the infamous 'Anonymous' behind anti-Trump NYTimes op-ed and book 'A Warning'

Off-Duty Cop Follows Woman Through Parking Lot, Attacks Her—Taxpayers Shell Out $125K

New Witness Corroborates Accusation That Mike Bloomberg Told Pregnant Employee to 'Kill It'

Cops Stop Veteran with PTSD for No Reason, Savagely Taser and Hit Him Over 30 Times

The Student Debt You Willingly Took On Is Not My Problem To Solve

Virginia: Gun Ban Bill Defeated!

Democrats fear Republican sabotage in key Senate race

Trump Supporters Are George W Bush Supporters LARPing As Ron Paul Supporters

US closes case against ex-FBI boss McCabe with no charges

Pelosi: A.G. Barr 'has deeply damaged the rule of law'

More Victims Discovered After Cop Caught on Video Planting Meth on Innocent People

PasTor Who Prophesized 4 Years Ago ... AbouT Kanye WesT’s ChrisTian Conversion Makes PredicTion --- AbouT PresidenT Trump’s Chances Of Re-elecTion

Senate Democrats queasy over Sanders as nomin

John Kelly Finally Lets Loose on Trump

Thursday, February 13, 2020 Trump breaks New Hampshire record for voter turnout for any incumbent president

Instrumental 9 year old guitarist Taj Farrant plays Chris Stapleton "Tennessee Whiskey" on his Gibson SG and Elixir strings Marshall amp

The Ten Most Destructive Americans of Eight Decades

Nancy Pelosi’s Staff Demands Takedown of ‘Deceptively Altered’ Video of Her SOTU Tantrum

OKC - A Conspiracy Theory

#FlashbackFriday when Vindman perjured himself and @RepBradWenstrup caught him.

Biden Calls Skeptical New Hampshire Voter ‘a Lying, Dog-Faced Pony Soldier’ (The dust-up came after the voter asked whether he can rebound from Iowa)

Trump's resilience ... causes DemocraTs --- To sound The alarm

Hillary Clinton Comments on Potentially Joining Democratic Ticket as VP Nominee

Cop Found Passed Out Drunk in Patrol Car On Duty in Traffic, 5X Over Legal Limit—No Charges

‘Clearly Guilty’: Fox News’ Judge Andrew Napolitano Says Trump Could Be Impeached Again

City Officials Want To Clamp Down on Dragon's Ascent, a Video Game That Pays Skillful Players

Trump touts Space Force, moon and Mars plans in State of the Union address

Horrifying Video Shows Cops Surround Sleeping Pregnant Mother and Execute Her

Police Called to School After 6-year-old Girl With Down Syndrome Made a ‘Gun’ with Her Finger

Midwife Gets Charged with 95 Felonies by State of New York for Delivering Babies

Pelosi’s Speech-ripping Stunt: a Perfect Metaphor for What She’s Done to America

Undercover Cops Hired 118 Handymen, Then Arrested Them All for Not Having Licenses

Florida trooper shot dead by stranded driver on interstate

Senate Acquits Trump on Impeachment But Romney Dissents

Stomach-Turning Video Catches Cops Abusing Kitten, Spitting Inside, Destroying Property

NO JAIL for Cop Guilty of Responding to Domestic Violence Call by Raping the Victim

Kirk Douglas, Indomitable Icon of Hollywood’s Golden Age, Dies at 103

Video Clearly Catches Cop Stealing Cash from a Home and He’s NOT Arrested

CNN is Angry That White People Are Trying to Stop the Coronavirus Spreading

Everyone's A Criminal

Nancy Pelosi rips paper after Donald Trumps's State of the Union Speech

2020 State of the Union

Incompetence

Court To Cop: We Don't Need On-Point Precedent To Deny You Immunity For Killing A Dog That Couldn't Hurt You


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: McAfee: I Will Decrypt Information on the San Bernardino Phone For Free
Source: The Truth in Media Project
URL Source: http://truthinmedia.com/mcafee-will ... ypt-san-bernardino-phone-free/
Published: Feb 18, 2016
Author: John McAfee
Post Date: 2016-02-18 13:06:13 by Hondo68
Keywords: 24-inch purple mohawk, not working for FBI, Chinese and Russians, hiring
Views: 590
Comments: 5

John McAfeeImage: Facebook

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation’s enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together.

This is a black day and the beginning of the end of the US as a world power. The government has ordered a disarmament of our already ancient cybersecurity and cyberdefense systems, and it is asking us to take a walk into that near horizon where cyberwar is unquestionably waiting, with nothing more than harsh words as a weapon and the hope that our enemies will take pity at our unarmed condition and treat us fairly.

Any student of world history will tell you that this is a dream. Would Hitler have stopped invading Poland if the Polish people had sweetly asked him not to do so? Those who think yes should stand strongly by Hillary Clinton’s side, whose cybersecurity platform includes negotiating with the Chinese so they will no longer launch cyberattacks against us.

The FBI, in a laughable and bizarre twist of logic, said the back door would be used only once and only in the San Bernardino case.

Tim Cook, CEO of Apple, replied:

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over. In spite of the FBI’s claim that it would protect the back door, we all know that’s impossible. There are bad apples everywhere, and there only needs to be in the US government. Then a few million dollars, some beautiful women (or men), and a yacht trip to the Caribbean might be all it takes for our enemies to have full access to our secrets.

Cook said:

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The fundamental question is this: Why can’t the FBI crack the encryption on its own? It has the full resources of the best the US government can provide.

With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension. About 75% are social engineers. The remainder are hardcore coders. I would eat my shoe on the Neil Cavuto show if we could not break the encryption on the San Bernardino phone. This is a pure and simple fact.

And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won’t work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It’s why we are decades behind in the cyber race.

Cyberscience is not just something you can learn. It is an innate talent. The Juilliard school of music cannot create a Mozart. A Mozart or a Bach, much like our modern hacking community, is genetically created. A room full of Stanford computer science graduates cannot compete with a true hacker without even a high-school education.

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

John McAfee is currently running for president as a Libertarian.


Poster Comment:

Those dumbass FBI agents probably voted for Mitt!


(2 images)

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: hondo68 (#0)

Send the phone to Apple for them to decrypt. Apple decrypts the one phone behind closed doors and submits the data to the FBI.

Yes, the FBI loses chain of custody, but the owner of the phone is dead and cannot be harmed by the contents.

misterwhite  posted on  2016-02-18   13:36:56 ET  Reply   Trace   Private Reply  


#2. To: misterwhite (#1)

Send the phone to Apple for them to decrypt. Apple decrypts the one phone behind closed doors and submits the data to the FBI.

Yes, the FBI loses chain of custody ...

Never happen. If the FBI loses traceability to evidence of and about a terroristic act, the evidence may be considered "tampered." Make no mistake, the FBI is watching this process come HELL or HIGH WATER.

buckeroo  posted on  2016-02-19   21:09:11 ET  Reply   Trace   Private Reply  


#3. To: buckeroo (#2)


The D&R terrorists hate us because we're free, to vote second party
"We (government) need to do a lot less, a lot sooner" ~Ron Paul

Hondo68  posted on  2016-02-19   22:52:16 ET  Reply   Trace   Private Reply  


#4. To: buckeroo (#2)

"If the FBI loses traceability to evidence of and about a terroristic act, the evidence may be considered "tampered."

How is this any different than some citizen calling the FBI and saying he has a good reason to believe his neighbor is building bombs in his basement? That's nowhere near enough to arrest the neighbor, but it's enough trigger a search warrant.

Same thing with Apple. They could say, "We uncovered evidence that seems to indicate some kind of illegal activity. Here. You guys figure it out".

If the owner of the phone was alive, he could claim that Apple tampered with it and a judge would rightfully throw it out. But if the phone contains information that is useful, it's enough to trigger search warrant just like the information from the neighbor.

But the odds are greater that Apple would "accidentally" delete the contents of the phone as an act of defiance against the eeevil government.

misterwhite  posted on  2016-02-20   10:57:22 ET  Reply   Trace   Private Reply  


#5. To: misterwhite (#4) (Edited)

How is this any different than some citizen calling the FBI and saying he has a good reason to believe his neighbor is building bombs in his basement? That's nowhere near enough to arrest the neighbor, but it's enough trigger a search warrant.

The search warrant ensures evidence covered or uncovered is under the respective confiscation authorities complete control. If the evidence is released to others; it is normally considered "tampered" and is no longer relevent to the search.

buckeroo  posted on  2016-02-20   11:06:04 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com