Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
This doesn't surprise me. I think we'd all be naive to think the iPhone is 100% safe from hacking, and I was very surprised the FBI failed to gain access already. Part of me thinks, they always knew they could do it without Apple's help but took this opportunity to fuel a political agenda, and use terrorism as a way to turn the public against the technology companies and data encryption.
That's exactly what happened.

The FBI saw that they had a chance of losing the public support, so they went to do what they should have in the first place.

Keep in mind the level of work that Cellebrite is going to have to put in here is staggering. Clean rooms, decapping chips without breaking traces, etc. This is high precision work needed that no random thief is ever going to be able to to replicate.
 
As I said a while back.

What would be safer for everyone?

Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.

Or some third party team working out how to access data on iPhones?

If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?

If a third party finds a method of hacking in.... then it clues Apple in to the existence of a vulnerability... and they can try to fix it. If they did it themselves... this vulnerability would in fact still exist, they just may or many not discover it as soon. So while i understand the point you are trying to make... i don't think i agree with your conclusion.
 
The fact that the FBI is willing to use these extreme measures shows how little luck they will actually have.

I have no idea why you consider this extreme or believe they will have little luck. The FBI wanted a test case for forcing a backdoor that they believed would have public support. The phone of a dead terrorist that killed a bunch people is about as good as they are going to find. They then found out it wasn't quite as smooth sailing as they had hoped. They don't want to look bad by saying "oops, we could have done this ourselves the whole time". So it arguably looks better to the public if they use a third party firm. (Arguably the FBI would also like to downplay to the public what their capabilities actually are) And as someone else mentioned, a foreign company can sometimes be easier from a legal standpoint.
 
  • Like
Reactions: extrachrispy
The feds assume that the shooter (or the company that he worked for) didn't create and install a Configuration Profile which changes the number passcode attempts before the device automatically wipes itself?! If they assume the default of 10, and restore the NAND after each tranche of 9 attempts, they could brick it after say 5 goes!

Once they get in the phone, all they will find are angry birds high scores.
 
This isn't a backdoor, it is an attack. It is an exploit of the design. And it is already closed in newer hardware. This particular attack (replay attack) is doable because the 5c doesn't guard against the NAND being reverted back to a previous state. In iPhones with a Secure Enclave, there is an anti-replay counter that is kept only on the Enclave's SoC specifically to combat this particular attack, since reverting the NAND doesn't buy you any new attempts, and you can't just flash the Enclave with any old data you want, or even read what is there. And worse, you need the Enclave's unique key to calculate the filesystem encryption keys. The CPU itself doesn't have the ability to do it anymore (its unique key is different).

Now, if you find a vulnerability in the Enclave to let you take it over, then you can bypass it. But that is actually more difficult than this particular attack. The Enclave is separate from the CPU. It only communicates over a small protocol at the kernel level. And while the firmware is updatable, it again must be signed. So your best bet there is to get Apple's signing key again.
AFAIK what you're addressing is completely speculation. I haven't seen anything verifying Cellibrite is using a replay attack or de-capping. I've seen tons of people saying that those are two possible methods. Maybe you've seen something definitive. To assume a replay attack is being used, minus any supporting evidence, is a bit presumptuous. Builiding a narrative about the security of the Enclave based on that presumption doesn't make sense without evidence.

To my knowledge we don't know 1) the method being used, and 2) how it will impact the security of current and future iOS builds. Until we know the method we can't say one way or the other.
 
  • Like
Reactions: 997440 and tgara
This doesn't surprise me. I think we'd all be naive to think the iPhone is 100% safe from hacking, and I was very surprised the FBI failed to gain access already. Part of me thinks, they always knew they could do it without Apple's help but took this opportunity to fuel a political agenda, and use terrorism as a way to turn the public against the technology companies and data encryption.

Very good point you've made there and as time move on you will almost certainly be proved correct.
 
This is the sort of innovation that the FBI should've been able to come up with on their own in the first place though. It's really a shame that our own people lack the imagination to do things properly.

Apparently the FBI never bothered to ask NSA for help. And they went very public with this whole affair, which destroys any tactical advantage for surveilling/cracking other terrorist iPhones, because now (assuming this Cellebrite process works) they'll just use some other methods. If it had been kept quiet the agencies would hold the advantage.
 
  • Like
Reactions: kdarling
Gonna seem awfully silly when they find nothing but dick picks and Angry Birds

Funny...but at this point the FBI will never admit to what was on that phone. People have told them that nothing will be on the phone, as it was the work phone owned by the county. I'm pretty sure even the FBI was smart enough to figure that out. They were solely using this as a legal precedent to force Apple to their knees and to succumb to government pressure. Pretty sure the FBI doesnt give to poops as to what is on the phone. The attack is over and the perps are dead.
 
That's exactly what happened.

The FBI saw that they had a chance of losing the public support, so they went to do what they should have in the first place.

Keep in mind the level of work that Cellebrite is going to have to put in here is staggering. Clean rooms, decapping chips without breaking traces, etc. This is high precision work needed that no random thief is ever going to be able to to replicate.

Is 'decapping chips without breaking traces' a process needed because all data would be lost once certain hardware is removed.? and hardware will need to be removed to get at the data?
cheers
 
Funny...but at this point the FBI will never admit to what was on that phone. People have told them that nothing will be on the phone, as it was the work phone owned by the county. I'm pretty sure even the FBI was smart enough to figure that out. They were solely using this as a legal precedent to force Apple to their knees and to succumb to government pressure. Pretty sure the FBI doesnt give to poops as to what is on the phone. The attack is over and the perps are dead.
Odd right? The telecom company already has all the metadata the FBI needs to figure out who that phone was contacting.

Now, call me crazy, but you'd think the two personal phones the attacker destroyed would be the really important thing here....but they already know who all these phones have contacted.

America is in the final stages of setting up it's own security/police state, and these blatant lies are bringing it to at least some of the public's attention.
 
Is 'decapping chips without breaking traces' a process needed because all data would be lost once certain hardware is removed.? and hardware will need to be removed to get at the data?
cheers

This is a crazy complicated process, and it really depends on how Apple's software interacts with the memory of the phone, but here's a video if you'd like to know the knitty-gritty from people that actually do this kind of thing: [DEFCON 21] Decapping Chips the [Easy] Hard Way ...

http://arstechnica.com/security/201...asers-to-access-data-stored-on-seized-iphone/
 
  • Like
Reactions: deany
Gonna seem awfully silly when they find nothing but dick picks and Angry Birds

Since it was the guy's work phone (he destroyed his own personal smartphone and computer, but chose not to destroy this), and he knew his boss had access to its contents - I doubt it'll even contain those things.

This was all about setting precedent so that the govt could order any computer maker to back door their security (essentially let the FBI win the Clipper Chip battle). Unfortunately for the govt, the late 1700's law they are using to compel Apple in this case, states that if there is any other way (besides forcing the person or company to do this), then the government has to the alternatives 1st (its part of that old law). About a week ago Rep Issa (from CA and very computer literate) described this exact method of attack on capital hill to FBI Director Comey (who pleaded ignorance) and asked if they had tried this....makes one wonder if he compelled this.
 
  • Like
Reactions: yaxomoxay
AFAIK what you're addressing is completely speculation. I haven't seen anything verifying Cellibrite is using a replay attack or de-capping. I've seen tons of people saying that those are two possible methods. Maybe you've seen something definitive. To assume a replay attack is being used, minus any supporting evidence, is a bit presumptuous. Builiding a narrative about the security of the Enclave based on that presumption doesn't make sense without evidence.

The problem is how the data is encrypted in iOS 8, and what the FBI wants has limited options for extraction. While locked, things like the text message database are encrypted and the decryption keys are not available. So methods of bypassing the lock screen don't actually decrypt the data I want. The two methods for getting the decryption keys are:

1) Brute force the PIN to generate the decryption key.
2) Mount an attack on AES256, attacking the encrypted filesystem key directly.

That they've found an attack on AES256 that isn't already known is unlikely, so we can reasonably speculate they intend to brute force the PIN. To do that, I need the UID burned into each SoC which is unique to each if I want to do it on some more powerful computer. If I want to do it on the iPhone, I have two methods:

1) Attack the attempt counter, using a replay attack.
2) Use a jailbreak esque exploit to take control of the CPU and do the attack that way, but I still need a mechanism for doing a replay attack, or taking over the unlock mechanism to allow me to do the brute force myself by implementing an alternate unlock code path.

And here's the thing, the Enclave is totally relevant, because it is built to stop (or severely hinder) the attacks I've mentioned above, minus the attack on AES itself which is the strongest part in the whole system. Apple does have a whitepaper on iOS security that describes in detail how all this stuff is put together. So while we don't know for a fact what they have, we do know what they need to decrypt the communcations data that the FBI is most interested in.
[doublepost=1458750220][/doublepost]
The 6 does

Anything with Touch ID does.
 
  • Like
Reactions: SantaFeNM
This whole thing will be bad for Apple if it is found you can unlock an iPhone anyways, once again. While I applaud Apple for not caving in to the FBI and offering them a hack tool or backdoor, the fact that an independent party found a way into the phone anyways is pretty bad for Apple.

Apple is too rich a company and has too many people and resources for them to continuously release phones and iOS with security exploits. Apple makes their own hardware, they make their own software, they distribute their own products; why can't this company make their hardware the most secure devices on the planet? Q/A and Security should be Apple's top priorities, not removing headphone jacks and making their phones thinner. If Apple wants to be the champion of people's rights, security and privacy then invest all them billions in obscene profit margins back into the quality of their products, not building grandiose UFO looking headquarters.

While I am sure that momentous effort is going to unlocking this one particular phone and it's not an exploit for the casual hacker, just go on YouTube and see ALL the videos over the years of how people have bypassed the lock screen on the iPhone simply by accessing the camera or panel or something else and poking around a little.

Apple can't be a poser and fight for the people while their products continue to be hackable anyways.
Please point me to an unhackable smartphone, I'd like to get one.
 
Anyone else realize that this is the exact same method which Edward Snowden said the government could utilize in cracking the phone? The man was on point.
 
  • Like
Reactions: jjm3
I've seen several post stating Apple would close the backdoor. My question: How could Apple close the backdoor if they don't know the method that created the backdoor? They would have to know what to fix to design a fix.

If it is successful they likely can't patch this approach with 100% confidence in this instance. Success on the FBI's part would end the case and Apple would not have an opportunity to use discovery rules to understand what was done. However, if it is used again in the future against a living suspect then that suspect can use discovery to bring the method to light and Apple can patch. Also, there have been many security experts theorizing about how such an attack would take place and Apple can certainly take steps to prevent vectors like replay attacks (probably the most likely approach this company intends to take) or further hardening firmware even against themselves with a signed update.

I can't *know* but I'd certainly put money on this group using a replay attack. Want to take a wager for a $100 donation to the charity of the winner's choice payable if and when the method becomes public?
 
Anyone else realize that this is the exact same method which Edward Snowden said the government could utilize in cracking the phone? The man was on point.
That's because this is a method that's been used for decades. Unless we change what kind of materials chips are made out of (that are somehow impervious to lasers and acid) then this is always a way.

That said, it takes significant (millions of dollars) amounts of corporate or state/agency funding to even set up a facility to do this right in. So the long and short is this has ALWAYS been a way, it's just far too expensive for any small crime organization to do so, so the only real players to watch out for are state actors or nefarious corporations that don't care who they contract to.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.