Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
63,524
30,826



passcode.jpg
Apple has created a 'waiting list' for law enforcement requests to unlock seized iOS devices, according to a report from CNET.

The article notes a case in Kentucky where the Bureau of Alcohol, Tobacco, Firearms and Explosives was the lead agency, and investigators contacted Apple for assistance after they were unable to locate any law enforcement agency in the country with the forensic capabilities to unlock an iPhone crucial to the case.

The agency contacted Apple but was told by a representative in Apple's litigation group that there would be a seven-week delay.
The ATF's Maynard said in an affidavit for the Kentucky case that Apple "has the capabilities to bypass the security software" and "download the contents of the phone to an external memory device." Chang, the Apple legal specialist, told him that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" and delivered to the ATF.

It's not clear whether that means Apple has created a backdoor for police -- which has been the topic of speculation in the past -- whether the company has custom hardware that's faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET.
While it's easy to erase an iPhone when it has been locked, for law enforcement, it appears to be considerably more difficult -- but not impossible -- to retrieve data from seized devices.

In its privacy policy, Apple says it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence" or "if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate."

Article Link: Apple Has Backlog of Requests From Police to Unlock Seized iPhones
 

OldSchoolMacGuy

Suspended
Jul 10, 2008
4,197
9,050
Seems strange as there are products that can do it for them. Then again that means they have to purchase software rather than just file a free request with Apple.
 

technopimp

macrumors 6502a
Aug 12, 2009
645
219
Hmm...this seems a little vague:

if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate
 

newyorksole

macrumors 603
Apr 2, 2008
5,088
6,381
New York.
I always wondered this. Apple has to have a way to bypass security passcodes, but I'm assuming only a handful of people actually can.
 

Nightarchaon

macrumors 65816
Sep 1, 2010
1,393
30
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.
 

whooleytoo

macrumors 604
Aug 2, 2002
6,607
716
Cork, Ireland.
Hmm...this seems a little vague:

No doubt that's intentional. "Let's give ourselves massive scope, and cover ourselves as much as possible; and hope users don't read the policy (& EULAs) and raise a fuss about the implications." I'd imagine it's the same at most/all companies.
 

ArtOfWarfare

macrumors G3
Nov 26, 2007
9,560
6,059
Of course! All those obscure combinations of pressing buttons for specific amounts of times to get around the lockscreen aren't bugs - they're the secret backdoor Apple left for themselves!
 

andyplace

macrumors member
Jun 18, 2009
73
0
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.

Unlikely. Apple has a ramdisk that they execute via DFU/iBoot that allows access to the filesystem, very similar to the ones used by forensic companies.

However, since the iPhone 4S and beyond, these ramdisks stopped working for forensic companies when Apple made the bootrom DFU code bulletproof (there are no exploits for it).

Only Apple can make their ramdisk work on the device because they have to codesign it with their private key AND obtain the proper personalisation signing for the device's identifiers and random NONCE. (Getting all these signatures for production devices could be time consuming without a lot of pre-existing tools to automate it. The personalisation process also varies between 4S/5/iPad 2/iPad 3/iPad mini. Normally iTunes mediates this during device restores to production iOS releases).
 
Last edited:

iVoid

macrumors 65816
Jan 9, 2007
1,145
190
Makes me wonder about the Filevault 2 encryption and if Apple has any back doors in it.
 

Rocketman

macrumors 603
article said:
In its privacy policy, Apple says it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence" or "if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate."
I have concerns Apple is using the "if we determine that for purposes of . . ." portion of the text to assist authorities with bypassing security purchased with the device. Even if the justification is some sort of legal order, Apple is not required to extend special skills to that end. That is a choice.

The police may feel they are permitted, contrary to constitutional language, to have unlimited access to people's "papers and things", but that is not the case. Even court ordered requests to produce are limited to what is available and possible. Lots of production requests go unfilled because of intentional destruction of evidence, encryption, and many other means.

Rocketman
 

gnasher729

Suspended
Nov 25, 2005
17,980
5,565
Makes me wonder about the Filevault 2 encryption and if Apple has any back doors in it.

Four digit passcode. Ten thousand attempts.

You know you can change the passcode to more digits, or to digits and letters? The encryption is designed so that each possible password takes about a tenth of a second to try. So 8 digits will take about four months.
 

OldSchoolMacGuy

Suspended
Jul 10, 2008
4,197
9,050
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.

No it's not. Removing the password through a function built into the OS doesn't allow you to gain the root access you need to be able to compile and run custom software. These are two totally different things.
 

Nightarchaon

macrumors 65816
Sep 1, 2010
1,393
30
£ and 'mall' in the same sentence - culture clash!

it hurt my head , ive lived in San Diego USA and Manchester UK, and no where in the UK can i find anywhere i would call a MALL, although the trafford centre does come close.
 

OldSchoolMacGuy

Suspended
Jul 10, 2008
4,197
9,050
Makes me wonder about the Filevault 2 encryption and if Apple has any back doors in it.

Four digit passcode. Ten thousand attempts.

FileValut doesn't limit passwords to 4 digits. Also users can change their iPhone settings to allow long passwords.

FileVault does not have a backdoor. Some government agencies do have systems that can crack it in as little as a few minutes though.

----------

I have concerns Apple is using the "if we determine that for purposes of . . ." portion of the text to assist authorities with bypassing security purchased with the device. Even if the justification is some sort of legal order, Apple is not required to extend special skills to that end. That is a choice.

The police may feel they are permitted, contrary to constitutional language, to have unlimited access to people's "papers and things", but that is not the case. Even court ordered requests to produce are limited to what is available and possible. Lots of production requests go unfilled because of intentional destruction of evidence, encryption, and many other means.

Rocketman

Uuuuuuh, you are totally incorrect. If there is a subpoena issued (which there would be if they are searching a suspect device) then Apple is required to provide any help they can. If they had the ability to remove the device password and did not, they could be cited with obstruction of justice and the *****torm that would cause for them. :rolleyes:
 

litmag01

macrumors 6502
Jul 16, 2009
371
270
Four digit passcode. Ten thousand attempts.

You know you can change the passcode to more digits, or to digits and letters? The encryption is designed so that each possible password takes about a tenth of a second to try. So 8 digits will take about four months.

The 8 didgit is also alphanumeric. Far, far, far more than 8 months.
 

smithrh

macrumors 68030
Feb 28, 2009
2,722
1,730
Of course there is a security hole if you have a four digit passcode.

Try 0 0 0 0.
Try 0 0 0 1.
Try 0 0 0 2.

and so on.

Are you sure?

Are you really really sure?

Are you really really really sure?

Because there's an option (yes, I know, it's not mandatory) that will erase your phone after 10 failed attempts.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.