[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Utopian Visionaries Who Won’t Leave People Alone

No - no - no Ain'T going To get away with iT

Pete Buttplug's Butt Plugger Trying to Turn Kids into Faggots

Mark Levin: I'm sick and tired of these attacks

Questioning the Big Bang

James Webb Data Contradicts the Big Bang

Pssst! Don't tell the creationists, but scientists don't have a clue how life began

A fine romance: how humans and chimps just couldn't let go

Early humans had sex with chimps

O’Keefe dons bulletproof vest to extract undercover journalist from NGO camp.

Biblical Contradictions (Alleged)

Catholic Church Praising Lucifer

Raising the Knife

One Of The HARDEST Videos I Had To Make..

Houthi rebels' attack severely damages a Belize-flagged ship in key strait leading to the Red Sea (British Ship)

Chinese Illegal Alien. I'm here for the moneuy

Red Tides Plague Gulf Beaches

Tucker Carlson calls out Nikki Haley, Ben Shapiro, and every other person calling for war:

{Are there 7 Deadly Sins?} I’ve heard people refer to the “7 Deadly Sins,” but I haven’t been able to find that sort of list in Scripture.

Abomination of Desolation | THEORY, BIBLE STUDY

Bible Help

Libertysflame Database Updated

Crush EVERYONE with the Alien Gambit!

Vladimir Putin tells Tucker Carlson US should stop arming Ukraine to end war

Putin hints Moscow and Washington in back-channel talks in revealing Tucker Carlson interview

Trump accuses Fulton County DA Fani Willis of lying in court response to Roman's motion

Mandatory anti-white racism at Disney.

Iceland Volcano Erupts For Third Time In 2 Months, State Of Emergency Declared

Tucker Carlson Interview with Vladamir Putin

How will Ar Mageddon / WW III End?

What on EARTH is going on in Acts 16:11? New Discovery!

2023 Hottest in over 120 Million Years

2024 and beyond in prophecy

Questions

This Speech Just Broke the Internet

This AMAZING Math Formula Will Teach You About God!

The GOSPEL of the ALIENS | Fallen Angels | Giants | Anunnaki

The IMAGE of the BEAST Revealed (REV 13) - WARNING: Not for Everyone

WEF Calls for AI to Replace Voters: ‘Why Do We Need Elections?’

The OCCULT Burger king EXPOSED

PANERA BREAD Antichrist message EXPOSED

The OCCULT Cheesecake Factory EXPOSED

Satanist And Witches Encounter The Cross

History and Beliefs of the Waldensians

Rome’s Persecution of the Bible

Evolutionists, You’ve Been Caught Lying About Fossils

Raw Streets of NYC Migrant Crisis that they don't show on Tv

Meet DarkBERT - AI Model Trained On DARK WEB

[NEW!] Jaw-dropping 666 Discovery Utterly Proves the King James Bible is God's Preserved Word

ALERT!!! THE MOST IMPORTANT INFORMATION WILL SOON BE POSTED HERE


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: McAfee: I Will Decrypt Information on the San Bernardino Phone For Free
Source: The Truth in Media Project
URL Source: http://truthinmedia.com/mcafee-will ... ypt-san-bernardino-phone-free/
Published: Feb 18, 2016
Author: John McAfee
Post Date: 2016-02-18 13:06:13 by Hondo68
Keywords: 24-inch purple mohawk, not working for FBI, Chinese and Russians, hiring
Views: 909
Comments: 5

John McAfeeImage: Facebook

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation’s enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together.

This is a black day and the beginning of the end of the US as a world power. The government has ordered a disarmament of our already ancient cybersecurity and cyberdefense systems, and it is asking us to take a walk into that near horizon where cyberwar is unquestionably waiting, with nothing more than harsh words as a weapon and the hope that our enemies will take pity at our unarmed condition and treat us fairly.

Any student of world history will tell you that this is a dream. Would Hitler have stopped invading Poland if the Polish people had sweetly asked him not to do so? Those who think yes should stand strongly by Hillary Clinton’s side, whose cybersecurity platform includes negotiating with the Chinese so they will no longer launch cyberattacks against us.

The FBI, in a laughable and bizarre twist of logic, said the back door would be used only once and only in the San Bernardino case.

Tim Cook, CEO of Apple, replied:

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over. In spite of the FBI’s claim that it would protect the back door, we all know that’s impossible. There are bad apples everywhere, and there only needs to be in the US government. Then a few million dollars, some beautiful women (or men), and a yacht trip to the Caribbean might be all it takes for our enemies to have full access to our secrets.

Cook said:

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The fundamental question is this: Why can’t the FBI crack the encryption on its own? It has the full resources of the best the US government can provide.

With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension. About 75% are social engineers. The remainder are hardcore coders. I would eat my shoe on the Neil Cavuto show if we could not break the encryption on the San Bernardino phone. This is a pure and simple fact.

And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won’t work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It’s why we are decades behind in the cyber race.

Cyberscience is not just something you can learn. It is an innate talent. The Juilliard school of music cannot create a Mozart. A Mozart or a Bach, much like our modern hacking community, is genetically created. A room full of Stanford computer science graduates cannot compete with a true hacker without even a high-school education.

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

John McAfee is currently running for president as a Libertarian.


Poster Comment:

Those dumbass FBI agents probably voted for Mitt!


(2 images)

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: hondo68 (#0)

Send the phone to Apple for them to decrypt. Apple decrypts the one phone behind closed doors and submits the data to the FBI.

Yes, the FBI loses chain of custody, but the owner of the phone is dead and cannot be harmed by the contents.

misterwhite  posted on  2016-02-18   13:36:56 ET  Reply   Trace   Private Reply  


#2. To: misterwhite (#1)

Send the phone to Apple for them to decrypt. Apple decrypts the one phone behind closed doors and submits the data to the FBI.

Yes, the FBI loses chain of custody ...

Never happen. If the FBI loses traceability to evidence of and about a terroristic act, the evidence may be considered "tampered." Make no mistake, the FBI is watching this process come HELL or HIGH WATER.

buckeroo  posted on  2016-02-19   21:09:11 ET  Reply   Trace   Private Reply  


#3. To: buckeroo (#2)


The D&R terrorists hate us because we're free, to vote second party
"We (government) need to do a lot less, a lot sooner" ~Ron Paul

Hondo68  posted on  2016-02-19   22:52:16 ET  Reply   Trace   Private Reply  


#4. To: buckeroo (#2)

"If the FBI loses traceability to evidence of and about a terroristic act, the evidence may be considered "tampered."

How is this any different than some citizen calling the FBI and saying he has a good reason to believe his neighbor is building bombs in his basement? That's nowhere near enough to arrest the neighbor, but it's enough trigger a search warrant.

Same thing with Apple. They could say, "We uncovered evidence that seems to indicate some kind of illegal activity. Here. You guys figure it out".

If the owner of the phone was alive, he could claim that Apple tampered with it and a judge would rightfully throw it out. But if the phone contains information that is useful, it's enough to trigger search warrant just like the information from the neighbor.

But the odds are greater that Apple would "accidentally" delete the contents of the phone as an act of defiance against the eeevil government.

misterwhite  posted on  2016-02-20   10:57:22 ET  Reply   Trace   Private Reply  


#5. To: misterwhite (#4) (Edited)

How is this any different than some citizen calling the FBI and saying he has a good reason to believe his neighbor is building bombs in his basement? That's nowhere near enough to arrest the neighbor, but it's enough trigger a search warrant.

The search warrant ensures evidence covered or uncovered is under the respective confiscation authorities complete control. If the evidence is released to others; it is normally considered "tampered" and is no longer relevent to the search.

buckeroo  posted on  2016-02-20   11:06:04 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com