Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

cmwade77

macrumors 65816
Nov 18, 2008
1,071
1,200
If Apple has a way, then that is a security hole waiting for the jail-breakers to discover.

There are plenty of ways around the lock screens, why doesn't law enforcement do a simple Google search and use the methods that have been exposed (most of them with no jailbreaking necessary)?
 

Sunday Ironfoot

macrumors regular
Apr 14, 2011
213
383
That is incorrect. They simply remove the password. I've worked in computer forensics for over 6 years and worked with Apple many times in investigations.

http://images.apple.com/iphone/business/docs/iOS_Security_Oct12.pdf

Page 9...

"The passcode is “tangled” with the device’s UID, so brute-force attempts must be performed on the device under attack. A large iteration count is used to make each attempt slower. The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 5½ years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers, or 2½ years for a nine-digit passcode with numbers only."

So the passcode is hashed, you don't simply remove it without breaking the hash. Granted a 4 digit pin code won't be that hard to break (about 20 - 40 mins).
 

ThunderSkunk

macrumors 68040
Dec 31, 2007
3,813
4,035
Milwaukee Area
So the lesson is - Make sure someone else has access to your iCloud, and have them remote wipe as soon as the cuffs are on. I'm not sure if it's 100% effective though, or if it's like hard drives, and can be recovered.


I think if I were a criminal, I'd want a hack that enables a secondary password which when entered, wipes it, and then makes the battery overheat, fry the flash ram & start on fire. In the event you're captured, give them the secondary passcode, and viola.

...or dead-mans switch requiring you to enter a password every set period of time, or the device does a deep secure wipe & simply pings its location to your cloud account for you to retrieve it.

...& then makes it start ringing a loud beacon once you get close with anther device, to help zero in on it, making it useful in case of theft or loss as well.

It's not hard to think of useful security countermeasures.
 

mabhatter

macrumors 65816
Jan 3, 2009
1,022
388
FileValut doesn't limit passwords to 4 digits. Also users can change their iPhone settings to allow long passwords.

FileVault does not have a backdoor. Some government agencies do have systems that can crack it in as little as a few minutes though.

----------



Uuuuuuh, you are totally incorrect. If there is a subpoena issued (which there would be if they are searching a suspect device) then Apple is required to provide any help they can. If they had the ability to remove the device password and did not, they could be cited with obstruction of justice and the *****torm that would cause for them. :rolleyes:

Proper computer forensic protocol says you don't "unlock" devices and just poke around. You run a program that dumps a perfect copy of storage to a HDD and run forensic tools against THAT data. That leaves the original device available to be searched by other teamed (like defense lawyers) if needed.
 

Sunday Ironfoot

macrumors regular
Apr 14, 2011
213
383
That is incorrect. They simply remove the password. I've worked in computer forensics for over 6 years and worked with Apple many times in investigations.

http://www.macworld.com/article/2029998/understanding-ios-passcode-security.html

"This is where the passcode comes into play: When you turn the passcode lock on, a technology called Data Protection kicks in, causing a new encryption key to be generated...

Crucially, the passcode itself is used as part of the encryption key, and then discarded when the device later locks. This way, iOS becomes physically unable to decrypt the data until the user re-inputs the passcode.

Because the passcode is not stored anywhere on the device, the only way to decrypt the data without it is to use a brute-force approach: that is, to try all the possible codes until you find the right one."
 

roadbloc

macrumors G3
Aug 24, 2009
8,784
215
UK
But... anyone can do this with the right software. Shouldn't the police be more than equipped to do such a thing themselves? I mean, I know a guy who does it for stolen iPhones for £10 a piece.
 

Rocketman

macrumors 603

charlituna

macrumors G3
Jun 11, 2008
9,636
816
Los Angeles, CA
Seems strange as there are products that can do it for them. Then again that means they have to purchase software rather than just file a free request with Apple.

Who says its a free request.

And yes in some cases buying $1000 software to do it yourself and have faster turn around is better than waiting for the original company to do it but on their 'first come, first serve unless the courts order us to jump someone to the front' system

----------

Of course! All those obscure combinations of pressing buttons for specific amounts of times to get around the lockscreen aren't bugs - they're the secret backdoor Apple left for themselves!

That way also puts the phone out of service and wipes the data,marking it harder to get to.

Apple wrote the software so they know where the phones records the passcode entered. They also know how a phone and computer are linked so you can backup a phone even if locked so long as it was ever backed up on said computer. It wouldn't be that hard for them to harvest this info, clone the data etc
 

macman34

macrumors regular
Apr 13, 2013
174
0
FileValut doesn't limit passwords to 4 digits. Also users can change their iPhone settings to allow long passwords.

FileVault does not have a backdoor. Some government agencies do have systems that can crack it in as little as a few minutes though.

Wow, that fast? Even with multiple characters and non lexicographical passwords? Makes you wonder why bother implementin any cryptography at all if at the end of the day the are always that easily crackable with the right tools. And as we well know the right tools easily find their way into the wrong hands.
 

gotluck

macrumors 603
Dec 8, 2011
5,712
1,204
East Central Florida
iFunBox only has access to an iOS device if the device has been authenticated with the computer. If you lock an iOS device and connect it to a computer that it has never been connected to before, the computer and iFunBox would not be able to view its contents. This includes the camera roll. Once the device's passcode has been enter and the device is unlocked and connected to a computer, it is authorized to always present it's contents to the computer.

Yes indeed, that would make sense - Cheers.
 

esechico

macrumors newbie
Apr 6, 2013
11
0
I think if I were a criminal, I'd want a hack that enables a secondary password which when entered, wipes it, and then makes the battery overheat, fry the flash ram & start on fire. In the event you're captured, give them the secondary passcode, and viola.

...or dead-mans switch requiring you to enter a password every set period of time, or the device does a deep secure wipe & simply pings its location to your cloud account for you to retrieve it.

...& then makes it start ringing a loud beacon once you get close with anther device, to help zero in on it, making it useful in case of theft or loss as well.

It's not hard to think of useful security countermeasures.

:eek: Dude! Theres an app for that! :p
But seriously don't forget to add the Mission Impossible sub-distruct sequence! ;)
 

Unggoy Murderer

macrumors 65816
Jan 28, 2011
1,151
3,981
Edinburgh, UK
There are plenty of ways around the lock screens, why doesn't law enforcement do a simple Google search and use the methods that have been exposed (most of them with no jailbreaking necessary)?
Yeah, for 4 digits. It doesn't take a computer long to brute force shy of 10,000 combinations. It's when you add the alphanumeric passcode it gets interesting. We do "Pod Slurping" as a group at university (outside of the curriculum, but relevant to our degree) and we find it particularly difficult to get into devices with more than 6 digits. We have access to a distributed computing network, so we have roughly 20 Core i7's running an attack on an iPhone 4, 4S or 5. Usually takes around 10 minutes. We tried breaking an 8 digit mixture of LC/UC, special characters and numbers, but we ran out of time trying to get into it.

If Apple have a way of getting into the device, it's either very well hidden, or they have a way of knowing what the key value is. I'd guess it's the latter, otherwise others would have probably found it by now.

As far as I know, any device before the iPhone 4 and original iPad doesn't have the 256bit encryption, am I right?
 

jcspeck

macrumors newbie
Nov 12, 2008
10
0
Texas
Totally Unrelated

Anyone know what the Star Trek Wallpaper in the article is? or where it can be found?
 

MacDav

macrumors 65816
Mar 24, 2004
1,031
0
I think if I were a criminal, I'd want a hack that enables a secondary password which when entered, wipes it, and then makes the battery overheat, fry the flash ram & start on fire. In the event you're captured, give them the secondary passcode, and viola.

...or dead-mans switch requiring you to enter a password every set period of time, or the device does a deep secure wipe & simply pings its location to your cloud account for you to retrieve it.

...& then makes it start ringing a loud beacon once you get close with anther device, to help zero in on it, making it useful in case of theft or loss as well.

It's not hard to think of useful security countermeasures.

Yes, it's easy to "think" of almost anything. It's called fantasizing. Actually doing something in the real world is a whole different ballgame. ;)
 

eklof

macrumors member
Jul 20, 2011
94
0
Filevault 2 does't feel so safe anymore. Sad there is no FDE for OSX with for instance Truecrypt.
 

Dark-Sider

macrumors newbie
May 5, 2011
14
0
Hi,

I seen some agencies using devices from this company to pull the information.

http://www.cellebrite.com/mobile-forensic-products.html

http://www.cellebrite.com/forensic-solutions/ios-forensics.html

For the iPhone 2G - 4, it will directly display the password on the device itself. It looks like on the 4S and 5, they use a computer to help get into those.

To start with: Cellebrite's UFED Physical analyzer only works up to the iPhone 4. 4s, 5 iPad3 etc. are safe.

UFED only uses what's public available for a long time. They upload custom code via Limerain boot rom exploit, open an ssh connection and dumping the devices ROM via scp or similar. I've done this my self a few times - also great for recovering pictures from phones in the "connect to itunes" recovery state.

The deal with the iPhones 4s and 5 is, that there is no "public" known way of booting the phone via cable. Just compare it to your computer where you have the choice of booting from your HDD or from a DVD. The iPhone (and many other devices like game consoles etc.) online accepts and boots firmware that is digitally signed by an unknown private key. You can bypass this thru limerain in older devices.

Apple however of course has this very private key to sign offical ios releases. They can sign pretty much everything what they like themselves to sign. So Apple is able to boot the latest iPhone models via USB-Cable without destroying the contents. After booting the phone they can easily extract the contents of the flash memory. Cracking the 4 digit passcode is a matter of minutes. If the passcode however is complex like "§"§$EADSFCE$&%$"§21323!" neither apple nor the government are able to extract the date - at leaste if the encryption is done propperly.

I do a lot of forensic work an I never ever have seen a seized iPhone that had the complex password enabled. Breaking the 4 digit code is easy after retreiving the phone's memory contents.

bye
Darky
 

Guerre

macrumors newbie
Apr 29, 2009
3
0
Easy for Apple to do

Apple probably has some kind of JTAG type debugging interface which allows them to read the raw contents of the flash die (this might take hours or days though). Then using the secret Apple private key, they can start to unroll the boot sectors and keychain using an ICE or perhaps Xcode debugger, just like the normal iPhone cpu does at boot time. Then they read the file system, and then find the PIN, and then return it to the cops.
 

discuit

macrumors regular
Jan 23, 2009
126
100
So the lesson is - Make sure someone else has access to your iCloud, and have them remote wipe as soon as the cuffs are on. I'm not sure if it's 100% effective though, or if it's like hard drives, and can be recovered.

That depends on how serious the crime is and what other incriminating evidence exists. A charge of spoilation of evidence (for you and your friend) might be something you don't want to face, or it might be preferable if the crime is serious enough and they don't have good evidence without the phone's contents.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.