Steersman wrote:
welch wrote:You wish cell phones worked as well as condoms. as well, you're making assumptions about whose home one goes to. The conversation about it would be awesome ….
You have some numbers on the number of dropped conversations as a percentage of completed ones? I would be very surprised if it was as bad as 1%. But if one wants to go to some home without the required capabilities then that is their choice, isn’t it? As for the “conversationâ€, I’m not sure that it would be terriby worse than asking who has what protection, and slight detours to obtain it.
voice and data are prioritized differently by cell carriers. Even now, voice wins. It also requires less bandwidth, because carriers know that the brain will make up for a lot of voice problems. Data reliability is still not at the level of voice reliability and in this case, we are solely concerned with data reliability.
the conversation about protection is, nowadays, considered good manners almost. It shows a certain amount of concern for the other party, and isn't generally judgmental. The major objections to condoms now are based on it makes sex maybe not feel as good, and anyone seriously using that argument is generally recognized to be a dumbass. Insisting on the use of barrier protection, in the day and age of AIDS, Herpes, and other less-permanent STDs has become about as controversial as using an umbrella in the rain.
Saying "Listen, I need to make sure I have a video recording of our time alone at all times so if you rape/assault me or try to, I have proof" is not going to go over so well. I can't think of any way to phrase that without it coming across as "i'm sure enough you're going to try to rape me that I think being alone with you is a significant risk, so I need to gather evidence the entire time." Maybe you could bury that in enough verbiage that the other person wouldn't notice it, but most people, not so much.
Steersman wrote:However, I kind of get the impression you’re throwing out a whole bunch of red herrings. I’ve quite clearly indicated several times that the application probably wouldn’t cover all cases, yet you make a point of suggesting ones where it wouldn’t work with the implication that it wouldn’t work in any of them.
I'm pointing out potential problems, and this is an area I've some experience in. This isn't like "hey, look, grammy's doing the funky chicken, let's get a video of that." If the video fails in a case like that, it's a mild disappointment. This is turning a cell phone into safety equipment and like other safety equipment, the performance bar is rather higher than "America's Funniest Home Videos." If someone is going to rely on this to keep them safe, then we need to apply that standard to evaluating the proposal.
Steersman wrote:welch wrote:If you back up a phone and an iPad with a moderate amount of Apps, you've filled that up. You're really making assumptions of HOW that storage is used. Which is why using iCloud for this is a bad idea.
Ok, I’ll take your word on that. But maybe there are ways to disable some App if the recorder is being used. And maybe there’s a better alternative to iCloud which you’re welcome to suggest. But the concept of external storage that is secure, and to which data can be uploaded on the fly seems to be what is required.
It's not a case of disabling the app. It's the storage that matters. A disabled App still takes up the same amount of storage space it did when it was enabled. Its data and settings are still there. The iCloud thing is actually unimportant other than iCloud itself being a poor choice. The network and connectivity issues are more of a problem, along with the other things i've listed.
Steersman wrote:It's not a case of the file system itself, that's immaterial here. But now, you want the App to have more control over the storage than the user. What if the user loses the key?
Good question. Probably by having iCloud or the other file system you suggested have 2 keys themselves that could only cause the deletion of the files. [/quote]
file systems aren't magic. They don't do anything by themselves. The problem isn't the file system, it's the stuff running on top of it. the actual file system only matters in terms of reliability and scalability, and there are a number of things that solve that issue.
Steersman wrote:welch wrote:development? Dude, you haven't even gotten past the first round of realistic design requirements. This kind of thing is actually HARD.
Tell me about it.
I have been trying to do that :-P
Steersman wrote:welch wrote:Okay so now you've gone from the person with the app and the cops having a subkey to: the person with the phone having a subkey. The other person in the encounter having a subkey. The cops having a subkey. How do you propose to manage this for people who don't own, or want the app? ….
As I attempted to explain earlier, obviously one person has to own a phone and the App, although there are scenarios where both do, but all that is required is for the other person to key-in some unique code of their own into that iPhone and App.
Well, that solves the notification issue. But it can't be "some unique code". It would have to be a key generated by the same App, or at the very least the same overall framework. Which means the other person can't not be a user of the system, otherwise how do they get the key? So for an encounter to proceed you have to have:
the person recording having a key and a way to enter it. That's easy, they have the phone.
The other person(s) ALSO having a key and a way to enter it. Typically keys are VERY long random-ish strings of characters, well over 1500 depending on method used. They are not things that humans are going to remember well, if at all. Rainman couldn't remember a good SSL key. So this has to be done programmatically.
Both have to also have their keys stored with the proper LE agency. Said keys have to be paired with individual LE keys.
All of this has to have access to secure storage with a way to only allow access to a given file with a specific set of keys. Which means your storage setup has to have advanced notice about not just the people about to get jiggy and their keys, but which LE keys are usable for a given file.