Right now this page is barely a rough draft.
Not all information has been verified and many parts are incomplete.
Do you use your phone to text loved ones? Do you use it for banking? Do you use it for email? If you don't care if criminals have access to everything you do, then this article doesn't apply to you. Of course if you've read all the articles about the FBI vs Apple then you're probably misinformed, so in that case this article only applies to you if you care to learn the truth nobody else will tell you. Don't bother reading this if:
When the argument is difficult, switch arguments!I'm only addressing the issue of access to data stored on the phone and encrypted to prevent unauthorized access. Most things you might read on the topic, particularly those against government decryption, tend to conflate the issues of data transmitted with encryption with those of data stored with encryption.People who oppose government mandated decryption of phones bring up encrypted communications as soon as they realize the weakness of their arguments. It's not a bad tatic for arguing and you may have noticed politicians taking advantage of it. When people hear an irrefutable point made in an argument, they tend to remember that rather than how unrelated it was to the original point of the argument. Whenever you start to think "but what about when" then you're probably thinking about the data being transmitted. Feel free to make detailed notes in case I ever write an article on that, but this is not that article. The next red herring is the "if you have nothing to hide" gambit. The idea that you might want privacy from the government can be used to imply that you've done something wrong. That's an obvious fallacy when you realize that the people making that argument wouldn't want their banking and credit card details on a billboard. The question isn't who you can trust with your personal details, the question is whether you have a right to control who can access your personal information when you prefer to keep it private. A few shallow thinkers and a few deep ones will reason that if the government with all it's resources want's to find proof that you've done something wrong, they probably can. The question of whether that means there is no point in preventing them from legislating encryption or whether that means we should fight for the right to encryption secure from even government decryption depends on how you answer the next question. Can't the government decrypt nearly anything?No. More than a few people believe that agencies of the US government have enough computing power to decrypt anything they want bad enough. This belief stems from confidence in the resources of a powerful entity like the US government and how difficult they believe encryption must be to break. We know the iPhone uses AES256 bit encryption, so we can guess what it would take to crack it's encryption. The US collects over $6,000,000,000 in taxes every year. That sounds like an awful lot of money. Especially when you consider the most powerful computer in the world
costs only $390,000,000. (In this context "only" is relative.) Never underestimate the opponents' capabilitiesHow much computing power does the NSA have is a question with no easy answer.
In 2008, the NSA told Congress it would need a computer capable of 1,000 PFLOPS by 2018. They need to build a system 30 times as powerful as the most powerful computer in the world. If you're worried we're still not exaggerating the capabilities of the NSA, please stop. We're going to go a lot bigger for this discussion. We'll start by assuming the NSA has 600 computers like the most powerful one in the world. The Tianhe-2 is the largest known supercomputer, and what we're basing our calculations on. It is capable of 33.86 PFLOPS. We're going to start with assuming the NSA could have 600 of those, so for our calculations, we begin by assuming it would have 20,316 PFLOPS of computing power at it's disposal.
IBM's super computer Blue Gene/P was capable of 0.0000136 PFLOPS
But one organization can only have so much of the world's computing computing power at its disposal. Consider the Bitcoin Network. The Bitcoin network is the largest virtual supercomputer in the world, and because the computers don't have to be dedicated to the task and because anyone in the world can own one, it is capable of a staggering 4,873,841.62 PFLOPS.
What this tells us:
It would take 1,254,856,009,386,230,000,000,000,000,000,000,000,000,000,000,000,000 years. For comparison:
Math may be unreliableThere was a computer cluster designed to crack passwords at the rate of 350 billion guesses per second. If all 15 billion computers were capable of that speed, and assuming I didn't lose track of any zeros when I worked it out, and that my math was correct (hah!) then it would take only 3,585,314,300,000,000,000,000,000,000,000,000,000,000,000,000 years. The Golden Key Fallacy
| ![]() Cracking 128 bit AESIf you had one Earth for every star in the Milky Way and dedicated the entire electricity production of every one to cracking AES-128, it would still take longer than the life of the universe to present. Related
Special Thanks
|