![]() |
Quote:
because next step its North Korea The family member must die for our freedom |
Quote:
A New Case FBI are trying to stop a Nuke Bomb in White Van going off. The Data is on the iPhone Under Dezzy's Logic that Nuke will Destroy the USA City its in. As Dezzy wants phones Kept Locked. Feck Me Whatever Next |
Quote:
You can't use the threat of a missing person to justify potentially invading everyone's privacy. You can, however, do pretty much anything as long as you link terrorism to it because it's the ol' saying at work, you can use 9/11 and/or terrorism to justify anything in American politics. |
Quote:
|
Quote:
Yes Ammi Samsung are better Feck Apple Stopping Terrorism is America's Right |
I am quite sure Donald McTrump would say
hack the phone and lets make America great again he is a man of action |
Quote:
You can be sure making a way in for anyone (even Apple themselves) people with bad intentions will find it almost instantly. The amount of crime it would facilitate and danger it would put people in would dwarf any good that could come of creating a back door to let the FBI in. |
Quote:
It all boils down to gaining information, we can't pick and choose which scenarios we "give up our freedom for" |
Quote:
|
Quote:
Its Not Silly Dezzy anything can happen. Nothing to do with Film Scripts You must Answer if a iPhone that has Data to Stop a Terrorist from setting off his Nuke Bomb in a White Van Under Your Solid Logic No you can not look into that phone Millions Will Die You must change your View if the situation becomes so Deadly Either you want to Stop Terrorists or you do not want to bother I am Sorry to be So Crude Please Reply Dezzy Make My Day......, |
Quote:
Yes Changes are on the Way Bring Him On. |
I'm kind of interested in knowing what the point of 'civil liberties' is?
|
Quote:
It's dumb and I refuse to take your B-movie action plot seriously. |
Quote:
|
Quote:
Looking through a missing person's phone to find them is completely different to using the excuse of terrorism to potentially allow the government to hack whoever they please. If you can't see the difference between the two scenarios then there's nothing I can do to help you. |
Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin And anyway, if they ban or hack into encrypted messages, terrorists will just start using steganography and there are loads of apps http://www.jjtc.com/Steganography/tools.html. So we sacrifice encryption, allowing the not so good people a back door into our data, whilst doing absolutely nothing to stop terrorists using steganography and other methods to communicate in secret. |
Quote:
OK you can not Stand the Heat thank for Your Reply. Getting a Nuke to go off in a Van, inside America - would not be public knowledge How Isis get one , built, is through Criminals that trade parts for Big Cash and no concern for it use. Getting into into USA via Canada Any Size Bomb can be set by a mobile phone signal Fact |
So to break this down, if a family member went unexpectedly missing would you want the police to access their phone and PC or not?
The position of any mobile phone which is switched on and connected to any network (wifi or phone) as long as you know the phones SIM id then you can find it. I would recommend all parents either keep info of their childs SIM or have a 'find my phone' app connected to their phone. You can follow the tracks of someone by using triangulation from cell towers and that will tell you where their phone has been and when. The ridiculous thing is, even Apple can't by-pass encryption because they never built a back door in the first place. The reason a back door (hook) has never been made is because it would completely destroy all security in online banking. Presently, the most secure way of doing your banking is to do it by phone connected to a phone network and not a wifi network because the whole process has end to end encryption. Allowing and making a hook would be opening the door to every other criminal in the world. If this is ever allowed, the banks will immediately switch off all mobile banking, they would have to. It doesn't matter what the government say in response to this nonsense, they are reliant on people not understanding how encryption works and what will happen if and when hooks fall into the wrong hands. |
It is unclear who helped the FBI access the phone and what was stored on the device.
No its not! Its a company in Israel who specialize in this sort of stuff. The thing is, this company is so secure that America will of had to send the phone to them and the company will of sent back information that was stored on that phone. This is why its taken as long as it has. |
Quote:
It does not matter who helped the FBI it is not going public. Thats fine |
Quote:
Thats for Non Terrorists |
Quote:
You can't buy Uranium in the blackest of black markets and nuclear materials are watched over with a keen eye. You can't just go out and buy nuclear material and making a nuclear bomb isn't exactly something that anyone could do. you need nuclear scientists with the correct equipment on top of the materials and none of IS' territories even have Nuclear capabilities. There's no way to smuggle a nuke into the US, to suggest it could be done through Canada is dumb. Finally, how would the FBI get hold of the phone before the attack happens? That kind of evidence only comes to light after the fact, not before. Nothing about your fantastical scenario would ever happen in real life. It's dumb beyond belief. |
Quote:
Any Parts can be shipped in, Isis then use White Folks because its in Parts and its not detected once in USA its assembled, nothing Dumb about that , Dezzy 24 was Great on Sky1HD |
Quote:
|
Quote:
Yes it can be under something else "Sealed" its not complex for professional handlers |
All times are GMT. The time now is 06:07 PM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
User Alert System provided by
Advanced User Tagging (Pro) -
vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.