- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged apple
Oppose the Surveillance of the EARN IT Act
From EFF:
While Apple’s plan would have put the privacy and security of its users at risk, the EARN IT Act compromises security and free speech for everyone. The bill would create serious legal risk for business that hosts content—messages, photos stored in the cloud, online backups—and, potentially, even cloud-hosting sites like those using Amazon Web Services, unless they use government-approved scanning tools.
Apple Backs Down On Phone Scanning Plans
The Coming Biden Fascism
From Glenn Greenwald:
That’s one point I think has been lost. Dems are about to take over the Exec Branch & Congress. Some of their most powerful & famous politicians used social media to demand the monopolies they’re about to regulate silence adversaries & remove from the internet an entire platform
Corporate Censorship Of Alex Jones
From Spiked:
 Radicals and liberals declared themselves ‘very glad’ that these business elites enforced censorship against Jones and Infowars. We should be ‘celebrating the move’, said Vox, because ‘it represents a crucial step forward in the fight against fake news’. Liberals for capitalist censorship! The world just got that bit odder, and less free.
Social Media Purge Has Begun
Posted by Brian in Comms, News, Threat Watch on 7/Aug/2018 23:26
From Zero Hedge:
One day after what appeared to be a coordinated attack by media giants Facebook, Apple, Spotify and Google on Alex Jones, whose various social media accounts were banned or suspended in a matter of hours, the crackdown against alternative media figures continued as several Libertarian figures, including the Ron Paul Institute director, found their Twitter accounts suspended.
Apple’s Lip Service To Freedom
Posted by Brian in News, Threat Watch on 11/Jul/2018 13:01
From Wired:
In the months since, Wardle has worked on and off to deconstruct that emoji mystery. What he found—and helped Apple fix—wasn’t the targeted hacking of his friend’s iPhone. Instead, it was an unintentional bug in a very intentional censorship feature, one that Apple includes in every iPhone in the world in an apparent attempt to placate the Chinese government. “Basically, Apple added some code to iOS with the goal that phones in China wouldn’t display a Taiwanese flag,” Wardle says, “and there was a bug in that code.”
Data Should Be Covered By Fourth Amendment Says Silicon Valley
From Ars Technica:
A group of prominent tech companies and lawyers has come together in new friend-of-the-court filings submitted to the Supreme Court on Tuesday. The group is arguing in favor of stronger legal protections for data generated by apps and digital devices in an important privacy case pending before the court.
The companies, which include Apple, Google, and Microsoft among many others, argue that the current state of the law, which distinguishes between “content” (which requires a warrant) and “non-content” (which does not) “make[s] little sense in the context of digital technologies.”
FBI Director Equate Encryption Debate To Gun Debate
From The Wall Street Journal:
“Some of the emotion that I’ve received around this issued remind me sometimes, in the absolutist and slippery slope arguments, reminds me of some of the rhetoric we hear in the gun debate,†Mr. Comey said, according to the Associated Press.
How Did The FBI Break Into iPhone?
From the EFF:
In addition, this new method of accessing the phone raises questions about the government’s apparent use of security vulnerabilities in iOS and whether it will inform Apple about these vulnerabilities. As a panel of experts hand-picked by the White House recognized, any decision to withhold a security vulnerability for intelligence or law enforcement purposes leaves ordinary users at risk from malicious third parties who also may use the vulnerability. Thanks to a lawsuit by EFF, the government has released its official policy for determining when to disclose security vulnerabilities, the Vulnerabilities Equities Process (VEP).
The Apple Case Could Violate The Thirteenth Amendment
If Apple is compelled to create a program that doesn’t exist for the government, that would be a type of slavery.
From Reason.com:
Instead, the DOJ has obtained the most unique search warrant I have ever seen in 40 years of examining them. Here, the DOJ has persuaded a judge to issue a search warrant for A THING THAT DOES NOT EXIST, by forcing Apple to create a key that the FBI is incapable of creating.
There is no authority for the government to compel a nonparty to its case to do its work, against the nonparty’s will, and against profound constitutional values. Essentially, the DOJ wants Apple to hack into its own computer product, thereby telling anyone who can access the key how to do the same.
If the courts conscripted Apple to work for the government and thereby destroy or diminish its own product, the decision would constitute a form of slavery, which is prohibited by our values and by the Thirteenth Amendment.
Apple, Privacy and the FBI
It’s way more complicated than the pundits are saying. To be fully informed read these articles.
From the EFF:
…the FBI’s demands reflect a familiar pattern of security agencies leveraging the most seemingly compelling situations—usually the aftermath of terror attacks—to create powers that are later used more widely and eventually abused. The government programs monitoring the telephone system and Internet, for example, were created in the wake of the 9/11 attacks. Those programs came to undermine the rights of billions of people, doing more damage to our security than the tragic events that prompted their creation.
ArsTechnica discusses Fifth Amendment issues:
But the Fifth Amendment goes beyond the well-known right against compelled self-incrimination. The relevant part for the Apple analysis is: “nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”
The idea here is that the government is conscripting Apple to build something that it doesn’t want to do. That allegedly is a breach of its “substantive due process.” The government is “conscripting a company’s employees to become agents for the government,” as one source familiar with Apple’s legal strategy told Ars. The doctrine of substantive due process, according to Cornell University School of Law, holds “that the 5th and 14th Amendments require all governmental intrusions into fundamental rights and liberties be fair and reasonable and in furtherance of a legitimate governmental interest.”
Reason discusses the political battle over encryption:
This incident is only the latest conflict in a years-long encryption and security war waging between privacy- and security-minded groups and the law enforcement community. As more communications are digitized, authorities have been calling for industry assistance to build so-called government “backdoors” into secure technologies by hook or by crook.
Those in law enforcement fear a scenario where critical evidence in a terrorism or criminal case is beyond the reach of law enforcement because it is protected by strong encryption techniques that conceal data from anyone but the intended recipient. Hence, leaders at agencies like the Department of Justice, the Department of Homeland Security, and the National Security Agency, along with President Obama, have weighed in against strong encryption.
Law Enforcement Upset Over New Smartphone Security
From Bloomberg:
The dispute is the latest flare-up that pits the federal government against the nation’s leading technology companies since National Security Agency contractor Edward Snowden disclosed last year the extent of U.S. snooping on phone and Internet communications — and how companies cooperated.
U.S. Justice Department and FBI officials are trying to understand how the new Apple and Google Android systems work and how the companies could change the encryption to make it accessible when court ordered. Their requests to the companies may include letters, personal appeals or congressional legislation, said a federal law official who requested anonymity to discuss the sensitive issue.