290 pointsby robin_reala2 hours ago23 comments
  • hnrayst2 hours ago
    This is actually a pretty big deal for journalists. Hannah Natanson (the WaPo reporter) had her home searched by FBI in Jan as part of a leak investigation - having Lockdown Mode enabled actually protected her sources and work product.

    It's a real world example of how these security features aren't just for "paranoid people" but serve a legit purpose for people who handle sensitive info. The San Bernardino case took months and cost $1M+ for the FBI to crack, and that was years ago. Apple's security has only gotten stronger since.

    Sure, there's valid concerns about locked down computing, but for journalists facing government pressure, this stuff matters.

    • skeptic_aian hour ago
      Still go to prison for not showing. So until devices have multiple pins for plausible deniability we are still screwed.

      What’s so hard to make 2-3 pins and each to access different logged in apps and files.

      • stousetan hour ago
        Absolutely every aspect of it?

        What’s so hard about adding a feature that effectively makes a single-user device multi-user? Which needs the ability to have plausible deniability for the existence of those other users? Which means that significant amounts of otherwise usable space needs to be inaccessibly set aside for those others users on every device—to retain plausible deniability—despite an insignificant fraction of customers using such a feature?

        What could be hard about that?

        • gabeioan hour ago
          > despite an insignificant fraction of customers using such a feature?

          Isn't that the exact same argument against Lockdown mode? The point isn't that the number of users is small it's that it can significantly help that small set of users, something that Apple clearly does care about.

          • PunchyHamster13 minutes ago
            now I want to know what dirty laundry are their upper management hiding on their devices...
        • NitpickLawyeran hour ago
          Truecrypt had that a decade+ ago.
          • ratg1312 minutes ago
            Not sure if you know the history behind it, but look up Paul Le Roux

            Also would recommend the book called The Mastermind by Evan Ratliff

        • hackerfoo26 minutes ago
          Maybe one PIN could cause the device to crash. Devices crash all the time. Maybe the storage is corrupted. It might have even been damaged when it was taken.

          This could even be a developer feature accidentally left enabled.

        • billfor39 minutes ago
          Android phones are multi-user, so if they can do it then Apple should be able to.
          • Gud36 minutes ago
            And how do you explain your 1TB phone that has 2GB of data, but only 700GB free?
            • davidwritesbugs4 minutes ago
              "Idunno copper, I'm a journalist not a geek"
            • heraldgeezer25 minutes ago
              System files officer ;)
            • morkalork29 minutes ago
              The same way when you buy a brand new phone with 200GB of storage that only has 50GB free on it haha
          • jb199136 minutes ago
            This is called whataboutism. This particular feature aside, sometimes there are very good reasons not to throw the kitchen sink of features at users.
        • greesil26 minutes ago
          Android has work profiles, so that could be done in Android. iPhone still does not.
          • reaperducer18 minutes ago
            Android has work profiles

            Never ever use your personal phone for work things, and vice versa. It's bad for you and bad for the company you work for in dozens of ways.

            Even when I owned my own company, I had separate phones. There's just too much legal liability and chances for things to go wrong when you do that. I'm surprised any company with more than five employees would even allow it.

            • PunchyHamster12 minutes ago
              you're surprise corporations are cheap
        • izzydataan hour ago
          It doesn't seem fundamentally different from a PC having multiple logins that are accessed from different passwords. Hasn't this been a solved problem for decades?
          • bsharper35 minutes ago
            You can have a multiuser system but that doesn't solve this particular issue. If they log in to what you claim to be your primary account and see browser history that shows you went to msn.com 3 months ago, they aren't going to believe it's the primary account.
            • inetknght18 minutes ago
              My browser history is cleared every time I close it.

              It's actually annoying because every site wants to "remember" the browser information, and so I end up with hundreds of browsers "logged in". Or maybe my account was hacked and that's why there's hundreds of browsers logged in.

          • paulryanrogersan hour ago
            Apple's hardware business model incentivizes only supporting one user per device.

            Android has supported multiple users per device for years now.

          • compiler-guyan hour ago
            Multi-user has been solved for decades.

            Multi-user that plausibly looks like single-user to three letter agencies?

            Not even close.

            • izzydata34 minutes ago
              Doesn't having standard multi-user functionality automatically create the plausible deniability? If they tried so hard to create an artificial plausible deniability that would be more suspicious than normal functionality that just gets used sometimes.
      • palmotea40 minutes ago
        > Still go to prison for not showing. So until devices have multiple pins for plausible deniability we are still screwed.

        > What’s so hard to make 2-3 pins and each to access different logged in apps and files.

        Besides the technical challenges, I think there's a pretty killer human challenge: it's going to be really hard for the user to create an alternate account that looks real to someone who's paying attention. Sure, you can probably fool some bored agent in customs line who knows nothing about you, but not a trained investigator who's focused on you and knows a lot about you.

        • davidwritesbugsa few seconds ago
          Background agent in the decoy identity that periodically browses the web, retrieves email from a banal account etc.?
      • ryanmcbride13 minutes ago
        It's more a policy problem than a phone problem. Apple could add as many pins as they want but until there are proper legal based privacy protections, law enforcement will still just be like "well how do we know you don't have a secret pin that unlocks 40TB of illegal content? Better disappear you just to be sure"

        For as long as law enforcement treats protection of privacy as implicit guilt, the best a phone can really do is lock down and hope for the best.

        Even if there was a phone that existed that perfectly protected your privacy and was impossible to crack or was easy to spoof content on, law enforcement would just move the goal post of guilt so that owning the phone itself is incriminating.

        Edit: I wanna be clear that I'm not saying any phone based privacy protections are a waste of time. They're important. I'm saying that there is no perfect solution with the existing policy being enforced, which is "guilty until proven dead"

      • jibean hour ago
        Hannah Natanson is not in prison though.
      • Cthulhu_an hour ago
        How does "go to prison for not showing" work when a lot of constitutions have a clause for a suspect not needing to participate in their own conviction / right to remain silent?

        A detective can have a warrant to search someone's home or car, but that doesn't mean the owner needs to give them the key as far as I know.

        • SoftTalker42 minutes ago
          It does mean that. You can't be forced to divulge information in your head, as that would be testimonial. But if there are papers, records, or other evidentiary materials that are e.g. locked in a safe you can be compelled to open it with a warrant, and refusal would be contempt.
          • Steltek27 minutes ago
            They need to prove that those materials exist on the device first. You can't be held in contempt for a fishing expedition.
            • SoftTalker4 minutes ago
              You need "probable cause to believe" which is not as strong as "prove" but yes, it can't be a pure fishing expedition.
          • lostlogin26 minutes ago
            FaceID and TouchID aren’t protected by that as I understand it.
            • plagiarist8 minutes ago
              That's correct, they are not. A complete failing of legislation and blatant disregard of the spirit of the 5th Amendment.

              So do not have biometrics as device unlock if you are a journalist protecting sources.

              • SoftTalker4 minutes ago
                They are considered to be more like keys to a safe than private knowledge. They also can't be changed if compromised. A sufficiently unguessable PIN or passphrase is better than biometrics.
          • parineum29 minutes ago
            I know it seems like an incredibly dubious claim but the "I forgot" defense actually works here.

            It's not really that useful for a safe since they aren't _that_ difficult to open and, if you haven't committed a crime, it's probably better to open your safe for them than have them destroy it so you need a new one. For a mathematically impossible to break cipher though, very useful.

      • Blackthorn38 minutes ago
        They are willing to kill people and then justify it by calling them terrorists. Plausible deniability is pointless.
        • jb199134 minutes ago
          Uh, that escalated quickly.
          • ryanmcbride7 minutes ago
            Actually it's been escalating pretty steadily for 250 years
      • cr125rideran hour ago
        Fourth and Fifth amendments disagree
        • lm28469an hour ago
          Sure but in the real world it can take months or years, Francis Rawls stayed 4 years in jail because he didn't want to unlock hard drives.
        • twelvedogsan hour ago
          I don't think we're doing amendments any more
          • ddtayloran hour ago
            And if we are it will be a new one with a high number and it will be pure insanity
        • kyrraan hour ago
          People are jailed for contempt of court for failing to provide passwords.

          https://reason.com/2017/05/31/florida-man-jailed-180-days-fo...

      • DamnInteresting34 minutes ago
        > What’s so hard to make 2-3 pins and each to access different logged in apps and files.

        I've been advocating for this feature for years, as evidenced by this HN comment I made about 9 years ago: https://news.ycombinator.com/item?id=13631653

        Maybe someday.

      • lm28469an hour ago
        Yep, you need an emergency mode that completely resets the phone to factory settings, maybe triggered with a decoy pin. Or a mode that physically destroys the chip storing the keys
      • bitexploderan hour ago
        You do not. We have this thing in our constitution called the 5th amendment. You cannot be forced to divulge the contents of your mind, including your pin or passwords. Case law supports this. For US citizens at least. Hopefully the constitution is still worth something.
        • lm28469an hour ago
          That's in the fantasy world of constitution maximalists. In real world it doesn't work like that and you might still lose money/time/your sanity fighting a system who cares less and less about your rights
          • bitexploderan hour ago
            The case law on this specific topic is convincing. If you are ever in that situation it is usually going to be worth your time and money to assert the right and see it through. Case law supports this. The general maximum “penalty” is being held in contempt of court. And if the government is wrongly persecuting you, it is lose / lose if you divulge.
          • carlosjobim44 minutes ago
            Do you think this is for fighting parking tickets? It is for journalists to not reveal their sources, whom might be at risk of severe consequences including death.

            That's a whole lot more to loose than your money and time.

            • lm2846913 minutes ago
              That's not what we're discussing here, you can't just say "I plead the fifth" and walk away if the people in charge decided you wouldn't walk away, no matter what's right or "legal"

              Francis Rawls stayed 4 years in jail despite pleading the fifth all day long

              • bitexploder8 minutes ago
                That case also established 18 months as an upper limit. If you are in that situation it is usually better to simply jot divulge. Especially if there is incriminating evidence. Or you are a journalist being harassed by the DOJ. It can only bring you more pain. They will always find something.
        • lostlogin21 minutes ago
          > You cannot be forced to divulge the contents of your mind, including your pin or passwords.

          Biometric data doesn’t need the password.

          And good luck depending on the US constitution.

        • stackghostan hour ago
          You're forgetting about the Constitution-Free Zone within 100 miles of all points of entry including international airports that covers essentially all of the 48.
          • Zak38 minutes ago
            This is a misunderstanding. That's the area in which the border patrol has jurisdiction to can conduct very limited searches of vehicles and operate checkpoints without individualized suspicion in order to enforce immigration law. It does not allow searches of electronic devices.

            There is a separate border search exception at the point a person actually enters the country which does allow searches of electronic devices. US citizens entering the country may refuse to provide access without consequences beyond seizure of the device; non-citizens could face adverse immigration actions.

            To be clear, I do think all detentions and searches without individualized suspicion should be considered violations of the 4th amendment, but the phrase "constitution-free zone" is so broad as to be misleading.

            • lostlogin18 minutes ago
              With ICE on the prowl, I’d have thought ‘Constitution Free Zone’ a fitting description of how they operate.
          • bitexploderan hour ago
            I am not. You can still assert your rights at border points. It is very inconvenient. I have done it. If you are returning from international travel there is little they can do. If you are trying to leave the country they can make that difficult to impossible. Otherwise your rights still apply.
      • eduction40 minutes ago
        Completely separate decision with a higher legal bar for doing that.

        It's one thing to allow police to search a phone. Another to compel someone to unlock the device.

        We live in a world of grays and nuance and an "all or nothing" outlook on security discourages people from taking meaningful steps to protect themselves.

      • frogcommanderan hour ago
        Why are you on a website for programmers and software developers if you arent a software developer and you know nothing of the subject?
        • 14 minutes ago
          undefined
    • ExoticPearTree15 minutes ago
      > It's a real world example of how these security features aren't just for "paranoid people" but serve a legit purpose for people who handle sensitive info.

      Because they're in the US things might be easier from a legal standpoint for the journalist, but they also have precedent on forcing journalist to expose their sources: https://en.wikipedia.org/wiki/Branzburg_v._Hayes

      In other parts of the world this applies https://xkcd.com/538/ when you don't provide the means to access your phone to the authorities.

      It just depends on how much a government wants the data that is stored there.

      • nickff10 minutes ago
        Which countries actually grant reporters immunity from having to reveal information related to criminal investigations (where others would be compelled to, and without criminal penalties)? Such immunity may be desirable (at least in some circumstances), but I am not aware of any jurisdiction that actually grants it.
    • pc862 hours ago
      Serious question: What are the "valid concerns" about people securing their computing devices against third parties?
      • hypfer2 hours ago
        This (I think) refers not to the people securing their devices against third parties but the vendors "securing" the devices against loss of profits.

        Essentially, the question referenced here is that of ownership. Is it your device, or did you rent it from Apple/Samsung/etc. If it is locked down so that you can't do anything you want with it, then you might not actually be its owner.

        ___

        _Ideally_ you wouldn't need to trust Apple as a corp to do the right thing. Of course, as this example shows, they seem to actually have done one right thing, but you do not know if they will always do.

        That's why a lot of people believe that the idea of such tight vendor control is fundamentally flawed, even though in this specific instance it yielded positive results.

        For completeness, No, I do not know either how this could be implemented differently.

        • pbhjpbhj38 minutes ago
          We don't know if they did the right thing here. With a previous case it seemed (to me) like Apple might have pushed an update to give access ... they presumably could do that, remotely copy all the data, then return the device to the former state. One can't know, and this sort of thing seems entirely tenable.

          FBI don't have to tell anyone they accessed the device. That maintains Apples outward appearance of security; FBI just use parallel construction later if needed.

          Something like {but an actually robust system} a hashed log, using an enclave, where the log entries are signed using your biometric, so that events such a network access where any data is exchanged are recorded and can only be removed using biometrics. Nothing against wrench-based attacks, of course.

          • hypfer22 minutes ago
            I mean arguably, we do not even fully know if even if they did as claimed, they did the _right_ thing.

            The underlying assumption we base our judgement on is that "journalism + leaks = good" and "people wanting to crack down on leaks = bad". Which is probably true, but also an assumption where something unwanted and/or broken could hide in. As with every assumption.

            Arguably, in a working and legit democracy, you'd actually want the state to have this kind of access, because the state, bound by democratically governed rules, would do the right thing with it.

            In the real world, those required modifiers unfortunately do not always hold true, so we kinda rely on the press as the fourth power, which _technically_ could be argued is some kind of vigilante entity operating outside of the system.

            I suppose it's also not fully clear if there can even be something like a "working and legit democracy" without possibly inevitable functionally vigilantes.

            Lots of stuff to ponder.

            ____

            Anyway, my point is that I have no point. You don't have to bother parsing that, but it might possibly be interesting if you should decide to do so.

            It might also confuse the LLM bots and bad-faith real humans in this comment section, which is good.

        • mschuster91an hour ago
          > Essentially, the question referenced here is that of ownership. Is it your device, or did you rent it from Apple/Samsung/etc. If it is locked down so that you can't do anything you want with it, then you might not actually be its owner.

          Both goals actually are possible to implement at the same time: Secure/Verified Boot together with actually audited, preferably open-source, as-small-as-possible code in the boot and crypto chain, for the user, the ability to unlock the bootloader in the EFI firmware and for those concerned about supply chain integrity, a debug port muxed directly (!) to the TPM so it can be queried for its set of whitelisted public keys.

          • pbhjpbhj35 minutes ago
            The TPM can be programmed (ie designed) to lie about the whitelist though.
      • zuminatoran hour ago
        In this case I think "valid concerns about locked down computing" is referring to the owner's use of the phone being restricted, so that they can't download applications they want to use, they don't have unrestricted access to the filesystem, they are forced to pay an Apple commission to engage in certain forms aloft commerce, etc. These may be acceptable tradeoffs but they're valid concerns nonetheless.
      • nicoburns2 hours ago
        One valid concern about "locked down computing" is the potential for 3rd parties to secure computing devices against their owners.
      • bayindirhan hour ago
        I don't have to have any concern to be able to secure my device against third parties, it's just good operational discipline.

        I don't do anything classified, or store something I don't want to be found out. On the other hand, equally I don't want anyone to be able to get and fiddle a device which is central to my life.

        That's all.

        It's not "I have nothing to hide" (which I don't actually have), but I don't want to put everything in the open.

        Security is not something we shall earn, but shall have at the highest level by default.

      • shaky-carrousel2 hours ago
        Corrupt government officials gunning down inconvenient people.
        • pc86an hour ago
          I'd love to hear what you think that has to do with this?
          • nutjob2an hour ago
            If we've learned anything from this administration it is that the government can ignore the law longer than you can stay alive. Arming yourself against lawless government in every legal way is advisable.
            • pc86an hour ago
              I'm not even saying you're wrong, I'm saying what does that have to do with a valid search warrant being executed?
              • macintuxan hour ago
                There's a fair bit of dispute about whether this is valid. The active criminalization of journalism is worrisome.
                • pc8629 minutes ago
                  It's signed by a judge, it's valid. What is in dispute, exactly?
                • extraaccountsan hour ago
                  [dead]
      • blitzar5 minutes ago
        Oh, come on. Don't look at another man's Portal Gun history. We all go to weird places.
      • buckle80172 hours ago
        Lockdown mode significantly effects the usability of the phone.

        It completely disables JIT js in Safari for example.

        • pc86an hour ago
          "Don't secure your phone it might mess up JavaScript" is not something I had on my 2026 bingo card.
          • buckle8017an hour ago
            I mean I tried it for a bit and I have to say it was a significant compromise.

            All kinds of random things don't work.

        • prophesian hour ago
          You can choose to exclude Safari from these protections[0]. Honestly, looking at the list of "limitations" you'll have while running Lockdown mode, I'm surprised most of them aren't the system default.

          [0] https://support.apple.com/en-us/105120 - under "How to exclude apps or websites from Lockdown Mode"

          • buckle801733 minutes ago
            Sure but the JIT js disable and limiting of image/video decoders are combined basically all the security from lockdown mode, so disabling it seems pointless.
            • prophesi21 minutes ago
              I do wish it worked more like GrapheneOS, but the other protections outside of web browsing seem to make it worth enabling lockdown mode. Personally, I'm only reading articles on my phone's browser so I'd wonder if I'd be fine with disabled JIT and crippled decoders.
        • blibblean hour ago
          you can enable it for certain trusted websites
      • Joel_Mckayan hour ago
        Some platforms will side-load anything the telecom carrier sends.

        It is naive to assume iOS can be trusted much more than Android. =3

        • pc86an hour ago
          Let's assume for the sake of argument you're making a valid point. What does that have to do with my question?
          • Joel_Mckayan hour ago
            Location telemetry, listening devices, and exfiltration of protected sources.

            A 3rd party locked down system can't protect people from what the law should. =3

      • ambicapter2 hours ago
        Think of the children
        • horacemoracean hour ago
          The leaders of US government certainly do. Much too fondly.
      • whynotminot2 hours ago
        I get so annoyed by this Socratic line of questioning because it’s extremely obvious.

        Terrorist has plans and contacts on laptop/phone. Society has a very reasonable interest in that information.

        But of course there is the rational counter argument of “the government designates who is a terrorist”, and the Trump admin has gleefully flouted norms around that designation endangering rule of law.

        So all of us are adults here and we understand this is complicated. People have a vested interest in privacy protections. Society and government often have reasonable interest in going after bad guys.

        Mediating this clear tension is what makes this so hard and silly lines of questioning like this try to pretend it’s simple.

        • anonymous908213an hour ago
          The better rational counter argument is that "privacy is a human right enshrined in international law". Society has zero business knowing anyone's private communications, whether or not that person is a terrorist. There is nothing natural about being unable to talk to people privately without your speech being recorded for millions of people to view forever. Moreover, giving society absolute access to private communications is a short road to absolute dystopia as government uses it to completely wipe out all dissent, execute all the Jews or whatever arbitrary enemy of the state they decide on, etc.

          You do not get to dispense with human rights because terrorists use them too. Terrorists use knives, cars, computers, phones, clothes... where will we be if we take away everything because we have a vested interested in denying anything a terrorist might take advantage of?

          • PatentlyDC12310 minutes ago
            Usually such "international laws" are only advisory and not binding on member nations. After decades of member nations flouting UN "laws" I can't see them as reliable or effective support in most arguments. I support the policy behind the privacy "laws" of the UN, but enforcing them seems to fall short.
          • whynotminotan hour ago
            Who decided absolute privacy in all circumstances is a fundamental human right? I don’t think any government endorses that position. I don’t know what international law you speak of. You’re basing your argument on an axiom that I don’t think everyone would agree with.

            This sounds like a Tim Cook aphorism (right before he hands the iCloud keys to the CCP) — not anything with any real legal basis.

            • anonymous908213an hour ago
              Article 12 of the United Nation's Declaration of Human Rights:

              > No one shall be subjected to arbitrary interference with his privacy [...]

              which has later been affirmed to include digital privacy.

              > I don’t think any government endorses that position.

              Many governments are in flagrant violation of even their own privacy laws, but that does not make those laws any less real.

              The UN's notion of human rights were an "axiom" founded from learned experience and the horrors that were committed in the years preceding their formation. Discarding them is to discard the wisdom we gained from the loss of tens of millions of people. And while you claim that society has a vested interest in violating a terrorist's privacy, you can only come to that conclusion if you engage in short-term thinking that terminates at exactly the step you violate the terrorist's rights and do not consider the consequences of anything beyond that; if you do consider the consequences it becomes clear that society collectively has a bigger vested interest in protecting the existence of human rights.

              • whynotminotan hour ago
                > No one shall be subjected to arbitrary interference with his privacy

                “Arbitrary” meaning you better have good reasons! Which implies there are or can be good reasons for which your privacy can be violated.

                You’re misreading that to mean your privacy is absolute by UN law.

                • anonymous908213an hour ago
                  Admittedly "arbitrary" is something of a legal weasel word that leaves a lot of room for interpretation. I lean towards a strong interpretation for two reasons: the first is because it is logically obvious why you must give it a strong interpretation; if the people responsible for enforcing human rights can arbitrarily decide you don't have them, you don't have human rights. The second is because we have seen this play out in the real world and it is abundantly clear that the damage to society is greater than any potential benefits. The US in particular has made an adventure out of arbitrarily suspending human rights, giving us wonderful treats like Guantanamo Bay and the black sites across the Middle East. I don't know what part of that experiment looked remotely convincing to you, but to me they only reinforced how clearly necessary inviolable human rights are for the greater good of society.
                  • pbhjpbhj23 minutes ago
                    >if the people responsible for enforcing human rights can arbitrarily decide you don't have them, you don't have human rights

                    But the "arbitrary" there is too account for the situation where the democratic application of the law wants to inspect the communications of suspected terrorists, and where a judge agrees there is sufficient evidence to grant a warrant.

                    Unfortunately, that law does nothing against situations like the USA/Russia regime where a ruler dispenses with the rule of law (and democratic legal processes too).

                    You can't practically have that sort of liberalism, where society just shrugs and chooses not to read terrorists communications, those who wish to use violence make it unworkable.

                • danarisan hour ago
                  But if you want to make it possible for the Feds to break into a terrorist's secure phone, you have to make it impossible for anyone to have a secure phone.

                  That is arbitrary interference with all our privacy.

            • an hour ago
              undefined
        • hypferan hour ago
          > I get so annoyed by this Socratic line of questioning because it’s extremely obvious.

          Yeah after seeing the additional comments, my gut also says "sea lion".

          Truly a shame

        • pc86an hour ago
          At the risk of being kind of ass, which I've been trying to be better about lately, I'm going to offer some advice. If you can't even respond to a question about secure computing without bringing American presidential politics into things, perhaps you need to take a break from the news for a few weeks.

          The reason I asked that question is because I don't think it's complicated. I should be able to lock down my device such that no other human being on the planet can see or access anything on it. It's mine. I own it. I can do with it whatever I please, and any government that says otherwise is diametrically opposed to my rights as a human being.

          You are more likely to be struck by lightning while holding two winning lottery tickets from different lotteries than you are to be killed by an act of terrorism today. This is pearl-clutching, authoritarian nonsense. To echo the sibling comment, society does not get to destroy my civil rights because some inbred religious fanatics in a cave somewhere want to blow up a train.

          Edit: And asking for someone to says "there are concerns!" to proffer even a single one is not a Socratic line of questioning, it's basic inquiry.

          • adleyjulian33 minutes ago
            The line of reasoning is more like this: if you make and sell safe-cracking tools then it would not be unreasonable for the government to regulate it so only registered locksmiths could buy it. You don't want people profiting from the support of criminal acts.

            The government could similarly argue that if a company provides communication as a service, they should be able to provide access to the government given they have a warrant.

            If you explicitly create a service to circumvent this then you're trying to profit from and aid those with criminal intent. Silkroad/drug sales and child sexual content are more common, but terrorism would also be on the list.

            I disagree with this logic, but those are the well-known, often cited concerns.

            There is a trade-off in personal privacy versus police ability to investigate and enforce laws.

          • whynotminotan hour ago
            This article is about the Trump admin seizing a reporter’s phone. The politics was here from the start.
        • Brian_K_Whitean hour ago
          This means there are no valid concerns.

          There are just things some people want and the reasons they want them.

          So the question that you are so annoyed by remains unanswered (by you anyway), and so, valid, to all of us adults.

          @hypfer gives a valid concern, but it's based on a different facet of lockdown. The concern is not that the rest of us should be able to break into your phone for our safety, it's the opposite, that you are not the final authority of your own property, and must simply trust Apple and the entire rest of society via our ability to compel Apple, not to break into your phone or it's backup.

        • handedness32 minutes ago
          > ...the Trump admin has gleefully flouted norms around that designation...

          One would have to hold a fairly uninformed view of history to think the norms around that designation are anything but invasive. The list since FDR is utterly extensive.

          • whynotminot15 minutes ago
            I didn’t say he was the first to abuse powers. Indeed it’s kind of silly to even have to clarify “but other administrations…” because that’s fairly obvious to anyone old enough to have seen more than one president.

            But the article is literally referencing the Trump administration seizing a reporter’s phone so the current administration’s overreach seems relevant here.

            • handedness11 minutes ago
              But that's not what I said.

              My point was that your stated assumption of what the norms are is inaccurate. If nearly every modern administration does it, that is literally the norm. The present administration, like many before it, is following the norm. The norm is the broader issue.

              Which makes the rest of it (and your followup) come across as needlessly tribal, as both major parties are consistently guilty of tending to object to something only when the other side does it.

    • boston_clone2 hours ago
      Both of your comments here, posted just one minute apart yet with completely different content, reek of LLM output.
      • Jensson2 hours ago
        People probably didn't see the other post, but both posts are several paragraphs and posted the same minute. No human would do that.

        Its also a new account that only posted these two posts.

        • coldpiean hour ago
          Good spot, thanks for pointing it out. I normally don't like the LLM accusation posts, but two posts from a brand new user in the same minute is a pretty huge red flag for bad behavior.

          https://news.ycombinator.com/item?id=46886472

          https://news.ycombinator.com/item?id=46886470

          • roban hour ago
            This is another bot I pointed out yesterday:

            https://news.ycombinator.com/threads?id=Soerensen

            Their comment got flagged, but looks like they made a new one today and is still active.

            That account ('Soerensen') was created in 2024 and dormant until it made a bunch of detailed comments in the past 24-48 hrs. Some of them are multiple paragraph comments posted within 1 minute of each other.

            One thing I've noticed is that they seem to be getting posted from old/inactive/never used accounts. Are they buying them? Creating a bunch and waiting months/years before posting?

            Either way, both look like they're fooling people here. And getting better at staying under the radar until they slip up in little ways like this.

            • josefrescoan hour ago
              I wonder if it's actual users with dormant accounts who just setup their Moltbot?
              • hypferan hour ago
                Some, maybe, but that's just another nice layer of plausible deniability.

                The truth is that the internet is both(what's the word for 'both' when you have three(four?) things?) dead, an active cyber- and information- warzone and a dark forest.

                I suppose it was fun while it lasted. At least we still have mostly real people in our local offline communities.

        • datsci_est_2015an hour ago
          Old account, fresh comments - to make it more clear. Freaky.
      • tonyedgecombe2 hours ago
        Posting sibling comments is unusual.
        • crazygringoan hour ago
          Funny, you're definitely right -- I've done it probably just 2 or 3 times over a decade, when I felt like I had two meaningful but completely unrelated things to say. And it always felt super weird, almost as if I was being dishonest or something. Could never quite put my finger on why. Or maybe I was worried it would look like I was trying to hog the conversation?
          • xpe10 minutes ago
            [delayed]
      • an hour ago
        undefined
    • Joel_Mckay2 hours ago
      Indeed, likely as secure as the VPNs run by intelligence contractors.

      1. iOS has well-known poorly documented zero-click exploits

      2. Firms are required to retain your activity logs for 3 months

      3. It is illegal for a firm to deny or disclose sealed warrants on US soil, and it is up to 1 judge whether to rummage through your trash. If I recall it was around 8 out of 18000 searches were rejected.

      It is only about $23 to MITM someones phone now, and it is not always domestic agencies pulling that off. =3

      • quesera3 minutes ago
        > 1. iOS has well-known poorly documented zero-click exploits

        PoC || GTFO, to use the vernacular.

        If you're talking about historical bugs, don't forget the update adoption curves.

    • sigmoid10an hour ago
      With the US descending more and more into fascism (as this case highlights yet again), I wonder what will happen to these features in the future. Especially now that the tech moguls of silicon valley stopped standing up to Trump and instead started kissing his ass. Tim Cook in particular seems to be the kind of person that rather is on the rich side of history than the right side. What if the administration realizes they can easily make Apple et al. give up their users by threatening their profits with tariffs and taxes?
      • vincenzothgreatan hour ago
        How is it turning into fascism?
        • text0404an hour ago
          - Concentration of power in the executive, dismantling checks and balances

          - Hyper-nationalism and white supremacist messaging

          - Scapegoating of minorities

          - Attacks on the press

          - Attacks on constitutional rights

          - Militarization of police, violence normalized

          - Expansion of surveillance state

          - Combination of state and corporate power

          - Strongman authoritarianism

          - Historical revisionism

          - Interference in elections

          Cheers!

          • shermantanktop36 minutes ago
            - State-aligned media outlets, where media consumption choice is a political act

            - Grandiose architecture projects for historically important sites

            - Obsession with massive monuments - the tallest, the most gold, the most expensive

            - Military parades and lionization of the military, while demanding political support from military leadership

            - A population which become keenly interested in whether something does or doesn’t benefit the leader personally

            I think the terms fascism or authoritarianism are close enough to be helpful, even if some of the specifics don’t align perfectly. But the ones that do align are oddly specific sometimes.

        • pbhjpbhj19 minutes ago
          It turned.
        • thatswrong029 minutes ago
    • learingscian hour ago
      Apple seems to strongly discourage the use of lockdown mode. Presumably it is in conflict with their concern over share price and quarterly earnings.
      • groundzeros2015an hour ago
        Didn’t they make it?
      • robot_jesusan hour ago
        Citation needed?

        Apple does a lot of things I don't agree with in the interest of share price (like cozying up to authoritarian governments) but this seems like a reach to criticize them for a feature they have put extensive effort into, rather than applauding that they resist spying and enhance customer privacy. Sure, it's an optional feature and maybe they don't push broad acceptance of it, but it's important for those that need it.

      • Analemma_an hour ago
        How do they discourage it? It’s a clearly-labeled button in the Settings app, which brings up one modal sheet explaining what will change if you turn it on, then one more button press and it’s on.
  • nova220336 minutes ago
    Remember...they can make you use touch id...they can't make you give them your password.

    https://x.com/runasand/status/2017659019251343763?s=20

    The FBI was able to access Washington Post reporter Hannah Natanson's Signal messages because she used Signal on her work laptop. The laptop accepted Touch ID for authentication, meaning the agents were allowed to require her to unlock it.

  • nxobjectan hour ago
    Sadly, they still got to her Signal on her Desktop – her sources might still be compromised. It's sadly inherent to desktop applications, but I'm sad that a lot more people don't know that Signal for Desktop is much, much less secure against adversaries with your laptop.
    • pbhjpbhj16 minutes ago
      Did she have Bitlocker or FileVault or other disk encryption that was breeched? (Or they took the system booted as TLAs seek to do?)
  • macintux2 hours ago
    > Natanson said she does not use biometrics for her devices, but after investigators told her to try, “when she applied her index finger to the fingerprint reader, the laptop unlocked.”

    Curious.

    • QuantumNomad_2 hours ago
      Probably enabled it at some point and forgot. Perhaps even during setup when the computer was new.
      • NewsaHackOa minute ago
        I want to say that is generous of her, but one thing that is weird is if I didn’t want someone to go into my laptop and they tried to force me to use my fingerprint to unlock it, I definitely wouldn’t use the finger I use to unlock it on the first try. Hopefully, Apple locks it out and forces a password if you use the wrong finger “accidentally” a couple of times.
    • b1122 hours ago
      Very much so, because the question is... did she set it up in the past?

      How did it know the print even?

    • ezfean hour ago
      Why is this curious?
    • dyauspitran hour ago
      She has to have set it up before. There is no way to divine a fingerprint any other way. I guess the only other way would be a faulty fingerprint sensor but that should default to a non-entry.
      • quesera7 minutes ago
        > faulty fingerprint sensor

        The fingerprint sensor does not make access control decisions, so the fault would have to be somewhere else (e.g. the software code branch structure that decides what to do with the response from the secure enclave).

      • giraffe_lady30 minutes ago
        Could be a parallel construction type thing. They already have access but they need to document a legal action by which they could have acquired it so it doesn't get thrown out of court.

        I think this is pretty unlikely here but it's within the realm of possibility.

        • tsol26 minutes ago
          Seems like it would be hard to fake. The was she tells it she put her finger on the pad and the OS unlocked the account. Sounds very difficult to do
          • operator-name14 minutes ago
            I think they mean if they already have her fingerprint from somewhere else, and a secret backdoor into the laptop. Then they could login, setup biometrics and pretend they had first access when she unlocked it. All without revealing their backdoor.
  • throwmeaway8202 hours ago
    It seems unfortunate that enhanced protection against physically attached devices requires enabling a mode that is much broader, and sounds like it has a noticeable impact on device functionality.

    I never attach my iPhone to anything that's not a power source. I would totally enable an "enhanced protection for external accessories" mode. But I'm not going to enable a general "Lockdown mode" that Apple tells me means my "device won’t function like it typically does"

    • jonpalmiscan hour ago
      There is a setting as of iOS 26 under "Privacy & Security > Wired Accessories" in which you can make data connections always prompt for access. Not that there haven't been bypasses for this before, but perhaps still of interest to you.
    • pkteisonan hour ago
      It isn’t. Settings > Privacy & Security > Wired Accessories

      Set to ask for new accessories or always ask.

      • sodality22 minutes ago
        I have to warn you, it does get annoying when you plug in your power-only cable and it still nags you with the question. But it does work as intended!
    • H8crilAan hour ago
      GrapheneOS does this by default - only power delivery when locked. Also it's a hardware block, not software. Seems to be completely immune to these USB exploit tools.
      • aaronmdjones29 minutes ago
        It also has various options to adjust the behaviour, from no blocks at all, to not even being able to charge the phone (or use the phone to charge something else) -- even when unlocked. Changing the mode of operation requires the device PIN, just as changing the device PIN does.

        Note that it behaves subtly differently to how you described in case it was connected to something before being locked. In that case data access will remain -- even though the phone is now locked -- until the device is disconnected.

    • UltraSane2 hours ago
      Computer security is generally inversely proportional to convenience. Best opsec is generally to have multiple devices.
    • ur-whale2 hours ago
      > I never attach my iPhone to anything that's not a power source.

      It's "attached" to the wifi and to the cell network. Pretty much the same thing.

  • an hour ago
    undefined
  • 2 hours ago
    undefined
  • PunchyHamster13 minutes ago
    They just need to ask apple to unlock it. And they can't really refuse under US law
  • kittikitti10 minutes ago
    It sounds like almost all of our devices have security by annoyance as default. Where are the promises of E2E encryption and all the privacy measures? When I turned on lockdown mode on my iPhone, there were a few notifications where the random spam calls I get were attempting a FaceTime exploit. How come we have to wait until someone can prove ICE can't get into our devices?
  • boring-humanan hour ago
    Can a hacked phone (such as one that was not in Lockdown Mode at one point in time) persist in a hacked state?

    Obviously, the theoretical answer is yes, given an advanced-enough exploit. But let's say Apple is unaware of a specific rootkit. If each OS update is a wave, is the installed exploit more like a rowboat or a frigate? Will it likely be defeated accidentally by minor OS changes, or is it likely to endure?

    This answer is actionable. If exploits are rowboats, installing developer OS betas might be security-enhancing: the exploit might break before the exploiters have a chance to update it.

    • quenixan hour ago
      Forget OS updates. The biggest obstacle to exploit persistence: a good old hard system reboot.

      Modern iOS has an incredibly tight secure chain-of-trust bootloader. If you shut your device to a known-off state (using the hardware key sequence), on power on, you can be 99.999% certain only Apple-signed code will run all the way from secureROM to iOS userland. The exception is if the secureROM is somehow compromised and exploited remotely (this requires hardware access at boot-time so I don't buy it).

      So, on a fresh boot, you are almost definitely running authentic Apple code. The easiest path to a form of persistence is reusing whatever vector initially pwned you (malicious attachment, website, etc) and being clever in placing it somewhere iOS will attempt to read it again on boot (and so automatically get pwned again).

      But honestly, exploiting modern iOS is already difficult enough (exploits go for tens millions $USD), persistence is an order of magnitude more difficult.

      • doublerabbitan hour ago
        It's why I keep my old iPhone XR on 15.x for jail breaking reasons. I purchased an a new phone specially for the later versions and online banking.

        Apple bought out all the jail breakers as Denuvo did for the game crackers.

        • noname1204 minutes ago
          > Apple bought out all the jail breakers > Denuvo did for the game crackers

          Do you have sources for these statements?

    • nxobjectan hour ago
      Re: reboots – TFA states that recent iPhones reboot every 3 days when inactive for the same reasons. Of course, now that we know that it's linked to inactivity, black hatters will know how to avoid it...
    • digiownan hour ago
      Secure boot and verified system partition is supposed to help with that. It's for the same reason jailbreaks don't persist across reboots these days.
  • PlatoIsADisease18 minutes ago
    Little too late for 1000 people hacked by pegasus.
  • KKKKkkkk140 minutes ago
    What is she investigated for?
    • buckle801737 minutes ago
      They're not actually investigating her, they're investigating a source that leaked her classified materials.
  • 5 minutes ago
    undefined
  • aquiran hour ago
    We need a Lockdown mode for MacBooks as well!
    • steve-atx-7600an hour ago
      Looks like it’s a feature: https://support.apple.com/en-us/105120
      • LordGrey38 minutes ago
        To save a click:

        * Lockdown Mode needs to be turned on separately for your iPhone, iPad, and Mac.

        * When you turn on Lockdown Mode for your iPhone, it's automatically turned on for your paired Apple Watch.

        * When you turn on Lockdown Mode for one of your devices, you get prompts to turn it on for your other supported Apple devices.

  • ChrisArchitectan hour ago
    Previously, direct link to the court doc:

    FBI unable to extract data from iPhone 13 in Lockdown Mode in high profile case [pdf]

    https://storage.courtlistener.com/recap/gov.uscourts.vaed.58...

    (https://news.ycombinator.com/item?id=46843967)

  • mrexcess2 hours ago
    I trust 404 media more than most sources, but I can’t help but reflexively read every story prominently showcasing the FBI’s supposed surveillance gaps as attempted watering hole attacks. The NSA almost certainly has hardware backdoors in Apple silicon, as disclosed a couple of years ago by the excellent researchers at Kaspersky. That being the case, Lockdown Mode is not even in play.
    • chuckadamsan hour ago
      The NSA is not going to tip its hand about any backdoors it had built into the hardware for something as small as this.
      • ddtayloran hour ago
        It depends on if parallel reconstruction can be used to provide deniability.
        • chuckadams36 minutes ago
          Even a parallel construction has limited uses, since you can't use the same excuse every time. The NSA probably doesn't trust the FBI to come up with something plausible.
  • dist-epoch2 hours ago
    [flagged]
    • bob0012 hours ago
      Do you disagree with the facts of the article? Or is it propaganda simply because the facts doesn't support your narrative and ideological inclinations?
      • summa_tech2 hours ago
        Selective amplification of true events as well as selective reporting are bread and butter of modern propaganda. It works a lot better than saying outright falsehoods, which - in the long-term - cause people to lose faith in everything you have to say. And there's always someone jumping to your defense - after all you did not outright lie...
        • bob0012 hours ago
          That is again a claim with no backing that can be applied to anything without actual data to back it up.

          For example. I can just as equally state with the same data to back me up (ie: none as it stands right now) that you are a US government plant posting propaganda to encourage people to not use safer technologies and as a result make their data easier to spy on.

        • cromka2 hours ago
          > Selective amplification

          You can't possibly know this is what happened here, it's an observational bias.

    • UltraSane2 hours ago
      Man people are whiny about this on Hacker News when they should know better. There is no real computer security without hardware roots of trust and keystores
  • hnrayst2 hours ago
    [flagged]
    • rob2 hours ago
      `hnrayst` seems to be another AI (?) bot account created in 2022 with only two comments, both being in this very thread we're in today:

      https://news.ycombinator.com/threads?id=hnrayst

      Something weird is going on at Hacker News recently. I've been noticing these more and more.

    • bob0012 hours ago
      Takeaway is to not enable biometric unlock if you are concerned about your data being accessed by authorities.
      • littlecranky67an hour ago
        Trick is not to use your right index finger as a biometric unlock finger (the button sits on the top right corner of the keyboard). If you are "forced" to unlock, the agents will guide your fingers and probably try that first 2-3 times. 2 more tries, and fingerprint reading gets disabled. Quite good odds.
      • Arubis2 hours ago
        This has long been true. In a pinch you can mash the power button 5+ times to require a key code at next unlock.
        • steve-atx-7600an hour ago
          Also, on iPhone, if you have face ID turned on, you can hold power+volume down (may differ depending on model) to force a passcode.
          • 3pt14159an hour ago
            This doesn’t work for my iPhone that’s about three years old.
            • WorldMakeran hour ago
              It's hold power+volume up (the "top two buttons" when reaching down into a pocket or purse and the phone) until the phone vibrates (~2s).

              If you can see the screen, it's the fastest shortcut gesture to the screen that has "Slide to Power Off", "Medical ID", and "Emergency Call". Any other way to get to that screen also works to require a PIN before next unlock.

            • ezfean hour ago
              If your phone has home button, then you don't need to press the volume button. Otherwise, yes it does work.
      • bawolff2 hours ago
        So in america, they can force you to use a biometric but they can't compel you to reveal your password?

        I mean, i agree with you, but its a really weird line in the sand to draw

        • forgotaccount3an hour ago
          One is knowledge the user has, and the other is a physical key they own.

          Providing your 'finger' to unlock a device is no different than providing your 'key' to unlock something. So you can be compelled to provide those biometrics.

          Compelling you to reveal a password is not some *thing* you have but knowledge you contain. Being compelled to provide that knowledge is no different than being compelled to reveal where you were or what you were doing at some place or time.

        • rtkwe23 minutes ago
          Yes the difference come from a close parsing of the 5th amendment, telling cops the password or code for a device or safe is pretty clearly compelling speech and adverse testimony while allowing cops to gather fingerprints and DNA has long been held as allowed so biometrics were analogized to that. It's also similar to the rule that cops can't force you to tell them the code to a safe but they're allowed with a warrant to destructively open the safe (if it falls under the terms of the warrant). Combine those too legal threads and it's at least reasonable to see how that line gets drawn from previous rulings.
        • afavour2 hours ago
          That is genuinely the current state of law, yes. There's no real logic at work, just attempts at clawing back control whenever a new gray area appears.
          • intrasightan hour ago
            It is very logical, as revealing a password is considered testimonial and is protected by the fifth amendment.
        • benterix2 hours ago
          > So in america, they can force you to use a biometric but they can't compel you to reveal your password?

          I don't get it, touching finger is easy, but how do you compel someone to reveal their password?

          • rtkwe14 minutes ago
            Put them in jail until they do or charge them with whatever the local flavor for "obstruction" is. In places where they're allowed by law to require you to give up a password not doing so when the proper steps are taken would usually be it's own crime, usually phrased as some sort of "obstruction" charge with it's own sentence. And that's just places where the law and citizen rights are a meaningful concept in restraining state power.
          • jon-woodan hour ago
            Depending on the country and the willingness to comply with legal norms somewhere between putting you in prison until you give it up and hitting you with a stick until you give it up.
            • mock-possuman hour ago
              And to be clear, in other words, that means you can’t be compelled. You can effectively resist giving up your password, you cannot effectively resist giving up your finger, gruesome though the prospect might be.
          • bawolffan hour ago
            Tell us the password or we throw you in jail, shoot you, etc. The legal system is always ultimately backed by the state's monopoly on violence.
          • bob001an hour ago
            The UK simply puts you in jail for not doing so.
            • an hour ago
              undefined
        • Arubis2 hours ago
          Pretty much.

          Something you are: can be legally compelled Something you have: can be legally compelled Something you know: cannot be legally compelled

          • zozbot234an hour ago
            You can still be legally compelled to provide testimony, the catch is merely that you have to be granted immunity from being charged with a crime on the basis of any derived evidence. In this case, it seems that the WaPo journalist could still be compelled to provide such information if she's not charged for any crime.
        • ExpertAdvisor01an hour ago
          Germany does the same thing too . They can force you to unlock via faceid/biometric but can't force you to enter password.
    • deaux2 hours ago
      It's interesting because the latest Cellebrite data sheets showed them to support all iPhones including e.g. unbooted, but apparently not lockdown mode? It also showed they hadn't cracked GrapheneOS.
    • rdudek2 hours ago
      Wait, was this an oversight on his part about the biometric unlock? My MacBook biometric gets disabled after a bit and requires a password if the lid was closed for substantial amount of time.
    • asimovDev2 hours ago
      Does anyone know if iOS in lockdown mode stops syncing mail, imessage, call history etc to your other apple devices? I am wondering if reporter's stuff was all synced to the non lockdown MacBook from the iPhone
      • supriyo-biswas2 hours ago
        They usually ask you to enable lockdown mode on all your devices for advanced protection, even though you can skip it if you want.
        • bilbo0san hour ago
          Yeah.

          This reporter very likely knew who she was dealing with. For users like her, everything is likely locked down and she probably didn't do much sharing.

          I'm thinking that, to her, her sources would be probably one of the most important things in her life to protect.

      • macintux2 hours ago
        https://support.apple.com/en-us/105120

        Looks like lockdown mode is focused on blocking inbound threats, not the sharing of data from the device.

      • rtkwe2 hours ago
        I can't imagine it would. The accounts don't flow through the phone you're just logged in to them on both devices.
    • Aurornis2 hours ago
      > (forced her finger on Touch ID per the warrant)

      Can anyone link a source for this? I’ve been seeing conflicting claims about this part.

    • JasonADrury2 hours ago
      > forced her finger on Touch ID per the warrant

      She was not forced, and the warrant does not state that she could be forced. The warrant, almost certainly deliberately, uses far milder language.

      • rtkwe2 hours ago
        The warrant is the force, current jurisprudence largely says warrant do compel people to provide biometric unlocks because it's not speech the same way giving up a password/passcode would be. Blocking or not complying with a signed warrant from a judge is it's own crime and the only safe way to fight them is with a lawyer in court not with the officer holding the paper (and gun/taser/etc with the power of the state behind them).
      • _qua2 hours ago
        What do you think warrants are? You think they get a warrant and they say, "Can you put your finger on the device?" You say, "No," and that's it? If all they wanted to do was ask you, they would just ask you without the warrant.
        • JasonADrury2 hours ago
          I think you should simply try to read the warrant in question.
          • pc862 hours ago
            Perhaps you should? From pages 20 and 22:

            > 52. These warrants would also permit law enforcement to obtain from Natanson the display of physical biometric characteristics (e.g., fingerprint, thumbprint, or facial characteristics) in order to unlock devices subject to search and seizure pursuant to the above referenced warrants

            > 60. Accordingly, if law enforcement personnel encounter a device that is subject to search and seizure pursuant to the requested warrants and may be unlocked using one of the aforementioned biometric features, the requested warrants would permit law enforcement personnel to (1) press or swipe the fingers (including thumbs) of the Subject to the fingerprint scanner of the device(s); or (2) hold the devices in front of the Subject's face for the purpose of attempting to unlock the device(s) in order to search the contents as authorized by the warrants

            So yes law enforcement had the right to grab her hand and press it against the laptop to unlock before seizing it if that's what they had to do.

            [0] https://www.rcfp.org/wp-content/uploads/2026/01/2026-01-30-I...

            • JasonADruryan hour ago
              >From pages 20 and 22:

              From pages 20 and 22 of ... not the warrant:

              It'd certainly be a good first step to figure out how to identify whether or not the PDF you're linking to is in fact a warrant at all before trying to educate others on them.

              • pc8631 minutes ago
                So post a link to the warrant.

                This document is specifically asking for the right to force biometric access. It seems based on reporting that biometric access was granted.

                If you're claiming the warrant doesn't force biometric access despite it being request, you need to substantiate the claim.

          • _qua2 hours ago
            "...the requested warrants would permit law enforcement personnel to (1) press or swipe the fingers (including thumbs) of the subject to the fingerprint scanner of the devices..."
            • JasonADruryan hour ago
              You're citing an affidavit produced by a FBI agent, the author is most likely not even a lawyer.

              They're merely presenting a wishlist to the judge.

      • cm2012an hour ago
        By definition a warrant is force backed by state violence
      • mock-possuman hour ago
        You’re saying she complied willingly?
        • rtkwe9 minutes ago
          If the police get the warrant you either allow them to take it or you face an obstruction charge. The only safe way to fight a warrant like that when signed is after the gathering is done in court or at trial.
        • JasonADrury44 minutes ago
          Sounds like it, yeah.

          Touch ID allows only limited attempts, so odds are the FBI wouldn't just try to wrestle her to attempt different fingers on the spot even if they were allowed to do so.

  • theragraan hour ago
    [flagged]
    • an hour ago
      undefined
    • digiownan hour ago
      > full-drive encryption

      Note that these are not crackable only if you have a strong password (random one will work). Unlike on phones, there is nothing slowing down brute force attempts, only the comparatively much weaker PBKDFs if you use a password. You want at least about 64 bits of entropy, and you should never use that password anywhere else, since they would basically run "strings" on your stuff to attempt the brute force.

      • ddtayloran hour ago
        Worse than that most phones are using smart enclave like chips protected by a 4 digit PIN that can be voltage drained to try every combo without a wipe.
    • quenixan hour ago
      > ---- All above is pure fantasy and never happened, as you probably have already guessed.

      Ah, while I was a bit suspicious, I thought it might be real (weirdly worded). What exactly is the point of fabricating this?- Is there a joke I'm blind to?

      • theragra13 minutes ago
        No joke, it is just I don't like to leave any trail about law issues, even if it is hardly a menace. This last sentence is for law enforcement in the really hard to imagine case it might be relevant sometime.
  • mandeepj2 hours ago
    For now! They’ll get something from open market like the last time when Apple refused to decrypt (or unlock?) a phone for them.
  • UltraSane2 hours ago
    Samsung phones have the Secure Folder which can have a different, more secure password and be encrypted when the phone is on.
    • Itoldmyselfsoan hour ago
      Secure folder uses or is in the process of starting to use Android native feature private space, which is available on all Android 15 phones.
    • delichonan hour ago
      I use the Cryptomator app for this, it works as advertised. I keep ~60 GiB of personal files in there that would be an easy button to steal my identity and savings. I'm just hoping it doesn't include an NSA back door.
      • vorticalboxan hour ago
        you can check the github https://github.com/cryptomator/ios
        • delichonan hour ago
          Even if I had the skills to confirm the code is secure, how could I know that this is the code running on my phone, without also having the skills to build and deploy it from source?
  • dec0dedab0de2 hours ago
    Every time something like this happens I assume it is a covert marketing campaign.

    If the government wants to get in they’re going to get in. They can also hold you in contempt until you do.

    Don’t get me wrong, it’s a good thing that law enforcement cant easily access this on their own. Just feels like the government is working with Apple here to help move some phones.

    • Cthulhu_37 minutes ago
      Better to be held in contempt than to give up constitutional rights under pressure - most functioning democracies have and defend the right to free press, protecting said press sources, and can't make you incriminate yourself.

      Anyway, it's a good thing to be skeptical about claims that iphones can't be hacked by government agencies, as long as it doesn't mean you're driven to dodgier parties (as those are guaranteed honeypots).

    • pc86an hour ago
      "Government propaganda to help one of the richest companies in the history of the world sell 0.000000001% more phones this quarter" is quite frankly just idiotic.

      You only said half the sentence anyway. The full sentence is: "If the government wants to get in they're going to get in, unless they want to utilize the courts in any way, in which case they have to do things the right way."

      If this reporter was a terrorist in Yemen they would have just hacked her phone and/or blown up her apartment. Or even if they simply wanted to knock off her source they probably could have hacked it or gotten the information in some other illicit fashion. But that's not what is happening here.