Monday, 28 March 2016

Dead Man's Hand







“The hardest tumble a man can make is to fall over his own bluff.”





It all started as a joke... "Hey Donald, why don't you run for President on the next election?" and the guy who suggested this is the main culprit of the cataclism that is going to befall on the most powerful nation on Earth.

Donald never thought about it, knew that he has no skills, no charisma, no statesmanship, no politics or policies but he thought "Hey that's a good one. I don't want it but in the meantime I will get free coverage, loads of exposure, my name on the front (and back) pages... That cannot be bad at all. How hard can this be? If George W. can do it anyone can. Let's do it!"

Then things started getting out of hand... he forced the entrance door of the Republican Party expecting to be refused and to have to run as an independent. For his stupefaction he was welcomed in. By a strange coincidence there was no one there with statesmanship, charisma, policy or policies, all just like him, a total void of discourse to offer to the masses. And Donald can address the masses... he knows (or probably not) that “Since the masses are always eager to believe something, for their benefit nothing is so easy to arrange as facts.” as Charles M. de Talleyrand used to say. And his facts are pretty much similar to the ones used by the rising star of the Nationalsozialistische Deutsche Arbeiterpartei 85 years ago, now translated to the supremacy of the American People and Immigration (aka Racism). The only difference is that Donald does not believe a single word of it. He just does it for the "show", for ratings. Worse, he does not know what he believes in, his life is based on pie charts, graphs and spreadsheets, does not have a clue who he is, what he stands for. 

He is now panicking... the joke went too far and he can no longer call his bluff as people took his inane pontifications seriously. He is frightened of the American People of those screaming voters, the poor that shout his name, like they did 1983 years and a week ago  that agreed with Him, expecting miracles delivered in this world. He can no longer call it a day, it's too late. He also knows that given the choice, when things calm down, the populace will always shout for the name of Barrabas.

Tuesday, 22 March 2016

The Hatton Garden Principle





Paper is always strongest at the perforation." — Murphy's Laws







For sure the FBI read my post last week on how to access Syed Rizwan Farook unbreakable iPhone. The news published on the Associated Press today about on how they came across this process just follows a natural human time sequence since my publication. They had to go and buy phones, expenses, budget... you know the drill.

My tweet to @Snowden triggered this entire story

I copy again what is the method based on the Hatton Garden Principle mentioned below (photo describing the method on top of the page)

Addenda for the FBI

Please ignore the doors' arguments. There is always a solution and I suggest you use the Hatton Garden Principle that reads more or less like this... "If the front door is inexpugnable go for the walls". So here it is:
  1. Pick Syed Rizwan Farook iPhone and disassemble it to separate the hard drive / memory where the data is stored (it does not matter if it is encrypted or not)
  2. Copy (don't backup) the contents (files etc.) to 1, 10, 100 equal equivalent hardware
  3. Purchase an equivalent iPhone, create account and password and PIN for that device as usual.
  4. Disassemble it and remove its hard drive
  5. Replace the hard drive of this iPhone with the one you copied previously on 2.
  6. Reassemble your iPhone
  7. Start your iPhone
  8. Hey presto!
No thanks necessary.

If the above does not work use "brute force" i. e. copy 1000 drives and try one by one on 1000 different phones as you will have 10 gos at each. If the PIN is a 4 digit one there are 9999 combination to try.


This  works because although Apple has a lot of nerds in encryption they do not think, they are just logical as Niels Böhr used to say. Apple's encryption works locally based on the premise that the "door" is intrinsically linked to the"vault".

The "door" is the PIN when you unlock the phone (banks have those knobs you have to turn either way against a set of numbers), the so desired data are all the values inside the vault and the encryption is a connection between the door's code and the personal drawers keys customers have to access their values. 

The claim of Apple is that, if you fail the door access code a few times, the entire vault will self destruct in 9, 8, 7... What they forgot is that you can clone the vault's values as many times you want. They also forgot that the local connection is what it is... local. What is encrypted when you close the "door" will be recrypted when you clone the data with another door and customer keys. They are totally independent and generated at the point of entry because, if you use quantum algorithms and encryption, they are absolute, not time dependent, instantaneous. Any data on an iPhone device, when cloned and loaded on another system should "adjust" itself to the new system if you use the same (i)OS / encryption algorithm. To make it simpler, the jewels and cash in a vault are independent of whatever combination is placed on the door and customer keys, they are also independent of whatever door or keys are being used.

"An outside party" came forward (over the weekend???) and showed the FBI a possible method to access the data on Syed Rizwan Farook's encrypted phone, according to the filing.
"Testing is required to determine whether it is a viable method that will not compromise data on Farook's iPhone," the filing said. "If the method is viable, it should eliminate the need for the assistance from Apple."

This means that the FBI has now cloned Syed's data quite a few times, as I suggested last week, and is trying to check if the instantaneous recryption works. If not, they will have to go through the painstaking avenue of using different devices as many times needed and manually find the PIN (0000-9999 usually i. e. 10,000 possible combinations). This will take  maybe another week, as they will probably need to source around 5,000 iPhone 5s, restore them to factory settings, create new Apple IDs and use them for this single purpose.

What really puzzles me is that this is not the most interesting news... The reaction from the Apple(ists) was that the FBI was playing games, they new this all the time etc. No one, no one!! is mentioning that their bull**** claiming that no iPhone can be broken into, is actually that... bull****. 

Hey presto... again!





Sunday, 20 March 2016

Donald Trump ™ ®

...or why Donald Trump ™ ® cannot be legally a candidate for the US presidential election...

It is the same suit and tie isn't it?

We have all read the news this week about Hulk Hogan and the landmark court ruling that awarded $115 million in damages on what would have been another trivial Hollywood sex tape story.

The principle is very simple. Terry Bollea was filmed unaware while having sex. The video was published and Terry claimed that his privacy was invaded and his business tarnished. The verdict was very, very straighforward: Terry Bollea gets $60 million for damages and Hulk Hogan ™ ® $55 million for commercial damages. This ruling is not only about privacy, it is also about how private people can inflict or be damaged commercially by actions of a third party. This is as clean cut as it can be... How many people are fired or have a lawsuit each day for bringing a company name ™ ® into disrepute? The third party in this case surely brought Hulk Hogan ™ ® into disrepute by targeting Terry Bollea. The court ruling made a clear distinction between the two personae, Terry Bollea is not Hulk Hogan.

This leads me straight to Donald Trump. This American Republican candidate has lived all his life around his name brand. He does not try to hide it at all, he boasts about it... The man you are voting for is the man that was "built" throughout an entire lifetime. Donald Trump is a salesman  and this is the ultimate sales pitch and ultimate sale (give me your votes now, not dollars). It can be resumed in a simple equality that reads like this:

Donald Trump = Donald Trump ™ ®

Trump makes a lot of noise, mostly white, about this. His USP is how the great success story of Donald Trump ™ ® can be transferred to the White House in its entirety. And that is the reason why, because of the equality above, Donald Trump (™ ®) cannot be legally elected for President of the United States of America, just in the same way the "person" on the photo below is as far as I know still unelectable...


As we are now we do not have a clue who Donald Trump is, no one does... and I am pretty sure neither does he.

Saturday, 12 March 2016

"Some People" vs. Apple Inc.





 
“The difference between stupidity and genius is that genius has its limits" — Einstein

 


We have been made aware recently of the little tiff between the Federal Bureau of Investigation  and Apple Inc.  regarding one iPhone. This one iPhone is sadly connected to the San Bernardino mass killings of last December with strong Daesh connections. 

If you read the news and have a further look at the omnipresent judicial televised circus, you might think that this is a life and death battle between a self appointed defender of Freedom and Privacy and Humanity (Apple Inc. a for enormous profit organization), against a totalitarian institution that wants to have a look at everything we do at anytime (the FBI controlled by the US Government which is voted by The People on a regular basis). 

You get sucked in in mesmerising words like, privacy, encryption, operating system, back door, defence, hacking, vulnerability, snoopers, terror, safety, protection, fear... fear... mostly fear. It is curious, or not, that both litigators are using fear to validate their argumentation.

But... this is not about fear or freedom or anything like that... this is only and only just about control, control of who will have the final say on what is private or not, a technocratic corporation hiding behind the blanket of Privacy, against a technocratic organization hiding behind the blanket of Security.  Curiously both claim to act in the name of Freedom, both interpreting our / their Privacy and Security in their very very own twisted ways.

To make you understand the issue better I am going to use an old fashioned biblical style parable...

Imagine that tomorrow as Tim Cook is walking around in LA, he gets shot and killed by a fame seeking "lone gunner". Another gun crime victim so common in the country... LAPD reacts and chases the gunner in yet another live TV nationwide broadcasting. Naturally the gunner, just like Syed Rizwan Farook, is shot dead as standard for the sake of expediency... which makes the unavoidable subsequent murder investigation utterly inane.

A criminal investigation ensues and they discover on his body not an iPhone no, but one Hilton hotel card key just like this one. They hurry to the hotel and receptionist to confirm the room number and get this reply:
"Do you have the PIN number linked to this key? If not I am sorry to tell sir but you cannot get in. We respect the privacy of our guests and without the PIN you are unable to enter. Moreover... if you force the entry or try the code more than 5 times the contents in the room will self destroy. That is how much we prize the privacy of our guests! And I have to add that a warrant from a judge will not make any difference to the privacy setup we have in place."

What is wrong with this hypothetical privacy stance from Hilton Hotels? Everything but mostly, albeit technologically achievable, it would have never been allowed to be put into place. 

Your own homes (the epithomy of your privacy) can be raided by security forces against a police warrant (check the "key" they use in the UK on your left), your underpants scrutinized, your socks smelled, your food in your fridge, your rubbish bins, clothes, CDs, everything can be searched if deemed by law necessary to the progress of a criminal investigation... everything except your very "personal" smartphone.

The US Government fell asleep and got sucked in the hyper hype of technology advances boasted by Apple Inc. (a for profit organization, did I say it already?). They got caught mesmerised on the gadgets they familiarly looked and touched everyday for hours on end and have now arrived to a point where the point of no return is long time gone. Apple were able to develop tottaly unchallenged and dictate on their iStuff the standard of privacy they deemed "necessary". 

Tashfeen Maleek phone is now locked, encrypted (or not how can the FBI know?), and with information inside inaccessible, a modern version of Pandora's box. This has now generated further pseudo — philosophical statements from Tim Cook / Apple regarding back doors, front doors, walls and other architectural vocabulary, further privacy and how safe is safe, still being allowed to express policy on a field for which they have no entitlement whatsoever. They should build stuff and sell stuff. That's it!

I will add another discussed technological advance that is now on the back pages... Remember foetus cloning and DNA manipulation? Now imagine Monsanto (or equivalent) decided a while ago to clone 10 million babies and put them in the "market" for practical purposes without any scrutiny whatosever. Then after some problems, it would be found that this was unethical and their reply would be "Oooh and it is not unethical to now kill 10 million human beings??? How awful are you US Government?"

The same happened with GM food too... However the debate started BEFORE any big steps were taken. Apple didn't. They smoke screened any opposition and hid in this sense of entitlement, of the accepted "status quo", on what I call a very dangerous nerdocracy that in their eyes replaces law, democracy, values... Sadly the US Secret Service also uses the same nerdocratic values to scrutinise their own people, which makes this debate utterly incestuous.

The Law must be restored and with some luck and wisdom someone will be the judge of it, a proper judge, which will rule for The People at last.

Addenda for the FBI

Please ignore the doors' arguments. There is always a solution and I suggest you use the Hatton Garden Principle that reads more or less like this... "If the front door is inexpugnable go for the walls". So here it is:
  1. Pick Syed Rizwan Farook's iPhone and disassemble it to separate the hard drive / memory where the data is stored (it does not matter if it is encrypted or not)
  2. Copy (don't backup) the contents (files etc.) to 1, 10, 100 equal equivalent hardware
  3. Purchase an equivalent iPhone, create account and password and PIN for that device as usual.
  4. Disassemble it and remove its hard drive
  5. Replace the hard drive of this iPhone with the one you copied previously on 2.
  6. Reassemble your iPhone
  7. Start your iPhone
  8. Hey presto!
No thanks necessary.

If the above does not work use "brute force" i. e. copy 1000 drives and try one by one on 1000 different phones as you will have 10 gos at each. If the PIN is a 4 digit one there are 9999 combination to try.

Good luck and Godspeed.

Popular