Cellebrite's chances of breaking into the iPhone don't seem too bright

Discussion in 'Politics, Religion, Social Issues' started by DUCKofD3ATH, Mar 23, 2016.

Thread Status:
Not open for further replies.
  1. DUCKofD3ATH Suspended

    DUCKofD3ATH

    Joined:
    Jun 6, 2005
    Location:
    Universe 0 Timeline
    #1
    Unless Cellebrite is hiding a lot of capabilities from ordinary visitors to their website, they don't have a chance of breaking into the terrorists' iPhones if said terrorist used complex pass codes and iOS 7, 8 or 9:

    Cellebrite can obtain "existing and deleted data" from:

    iPhone 2G,iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5,iPhone 5S, iPhone 5C, iPhone 6, iPhone 6Plus, iPod Touch 1G, iPod Touch 2G, iPod Touch 3G, iPod Touch 4G, iPod Touch 5G, iPad Mini, iPad 1, iPad 2, iPad3, iPad 4
    And they have:

    Different ways to perform data extraction:
    • Logical and file system (for unlocked devices) extraction is enabled on the UFED Touch
    • Physical extraction and file system extraction (for locked devices) is enabled on the UFED Physical Analyzer​

    If the iOS device was locked with a simple passcode:

    Simple passcodes will be recovered during the physical extraction process and enable access to emails and keychain passwords.
    However, if the device was locked with a complex password:

    If a complex password is set on the device, physical extraction can be performed without access to emails and keychain.
    But:
    If the complex password is known, emails and keychain passwords will be available.
    If the password is known, why would the FBI need Cellebrite?

    Anyway, all of this is very nice, but can they decrypt iOS 9x devices?:

    Real-time decryption to interpret encrypted data from devices running iOS4.x, iOS5.x and iOS6.x. Decryption is performed on-the-fly, obtaining access to data, files and application content​

    In short, it appears that Cellebrite can't do real-time decryption of an iPhone that has iOS 7, 8 or 9. Whether they can decrypt 7, 8, or 9 if they don't have to do it in real-time is not mentioned. And, if they don't have the complex password to unlock the iPhone, it's looks like they won't be able to access email and the password keychain.

    Finally, I thought the FBI had scrambled the iPhone by botching attempts to enter the passcode.

    All of this looks like a waste of time and money.
     
  2. bradl macrumors 68040

    bradl

    Joined:
    Jun 16, 2008
    #2
  3. maflynn Moderator

    maflynn

    Staff Member

    Joined:
    May 3, 2009
    Location:
    Boston
    #3
    [MOD NOTE]
    Please use the existing thread as noted above.
     
Thread Status:
Not open for further replies.

Share This Page