I'm fairly certain most terrorist are dickless.Gonna seem awfully silly when they find nothing but dick picks and Angry Birds
I'm fairly certain most terrorist are dickless.Gonna seem awfully silly when they find nothing but dick picks and Angry Birds
That's exactly what happened.This doesn't surprise me. I think we'd all be naive to think the iPhone is 100% safe from hacking, and I was very surprised the FBI failed to gain access already. Part of me thinks, they always knew they could do it without Apple's help but took this opportunity to fuel a political agenda, and use terrorism as a way to turn the public against the technology companies and data encryption.
As I said a while back.
What would be safer for everyone?
Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.
Or some third party team working out how to access data on iPhones?
If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?
The fact that the FBI is willing to use these extreme measures shows how little luck they will actually have.
The feds assume that the shooter (or the company that he worked for) didn't create and install a Configuration Profile which changes the number passcode attempts before the device automatically wipes itself?! If they assume the default of 10, and restore the NAND after each tranche of 9 attempts, they could brick it after say 5 goes!
AFAIK what you're addressing is completely speculation. I haven't seen anything verifying Cellibrite is using a replay attack or de-capping. I've seen tons of people saying that those are two possible methods. Maybe you've seen something definitive. To assume a replay attack is being used, minus any supporting evidence, is a bit presumptuous. Builiding a narrative about the security of the Enclave based on that presumption doesn't make sense without evidence.This isn't a backdoor, it is an attack. It is an exploit of the design. And it is already closed in newer hardware. This particular attack (replay attack) is doable because the 5c doesn't guard against the NAND being reverted back to a previous state. In iPhones with a Secure Enclave, there is an anti-replay counter that is kept only on the Enclave's SoC specifically to combat this particular attack, since reverting the NAND doesn't buy you any new attempts, and you can't just flash the Enclave with any old data you want, or even read what is there. And worse, you need the Enclave's unique key to calculate the filesystem encryption keys. The CPU itself doesn't have the ability to do it anymore (its unique key is different).
Now, if you find a vulnerability in the Enclave to let you take it over, then you can bypass it. But that is actually more difficult than this particular attack. The Enclave is separate from the CPU. It only communicates over a small protocol at the kernel level. And while the firmware is updatable, it again must be signed. So your best bet there is to get Apple's signing key again.
Let's just flush away US taxpayer's money, we have to avoid the court at any cost!
This doesn't surprise me. I think we'd all be naive to think the iPhone is 100% safe from hacking, and I was very surprised the FBI failed to gain access already. Part of me thinks, they always knew they could do it without Apple's help but took this opportunity to fuel a political agenda, and use terrorism as a way to turn the public against the technology companies and data encryption.
This is the sort of innovation that the FBI should've been able to come up with on their own in the first place though. It's really a shame that our own people lack the imagination to do things properly.
Gonna seem awfully silly when they find nothing but dick picks and Angry Birds
That's exactly what happened.
The FBI saw that they had a chance of losing the public support, so they went to do what they should have in the first place.
Keep in mind the level of work that Cellebrite is going to have to put in here is staggering. Clean rooms, decapping chips without breaking traces, etc. This is high precision work needed that no random thief is ever going to be able to to replicate.
Odd right? The telecom company already has all the metadata the FBI needs to figure out who that phone was contacting.Funny...but at this point the FBI will never admit to what was on that phone. People have told them that nothing will be on the phone, as it was the work phone owned by the county. I'm pretty sure even the FBI was smart enough to figure that out. They were solely using this as a legal precedent to force Apple to their knees and to succumb to government pressure. Pretty sure the FBI doesnt give to poops as to what is on the phone. The attack is over and the perps are dead.
Apple wanted $30,000 to do the job, so actually it's a good deal for taxpayers.![]()
Is 'decapping chips without breaking traces' a process needed because all data would be lost once certain hardware is removed.? and hardware will need to be removed to get at the data?
cheers
The 6 doesPrediction... the iPhone 7 will have a secure memory module to defeat replay attacks
Gonna seem awfully silly when they find nothing but dick picks and Angry Birds
AFAIK what you're addressing is completely speculation. I haven't seen anything verifying Cellibrite is using a replay attack or de-capping. I've seen tons of people saying that those are two possible methods. Maybe you've seen something definitive. To assume a replay attack is being used, minus any supporting evidence, is a bit presumptuous. Builiding a narrative about the security of the Enclave based on that presumption doesn't make sense without evidence.
The 6 does
Please point me to an unhackable smartphone, I'd like to get one.This whole thing will be bad for Apple if it is found you can unlock an iPhone anyways, once again. While I applaud Apple for not caving in to the FBI and offering them a hack tool or backdoor, the fact that an independent party found a way into the phone anyways is pretty bad for Apple.
Apple is too rich a company and has too many people and resources for them to continuously release phones and iOS with security exploits. Apple makes their own hardware, they make their own software, they distribute their own products; why can't this company make their hardware the most secure devices on the planet? Q/A and Security should be Apple's top priorities, not removing headphone jacks and making their phones thinner. If Apple wants to be the champion of people's rights, security and privacy then invest all them billions in obscene profit margins back into the quality of their products, not building grandiose UFO looking headquarters.
While I am sure that momentous effort is going to unlocking this one particular phone and it's not an exploit for the casual hacker, just go on YouTube and see ALL the videos over the years of how people have bypassed the lock screen on the iPhone simply by accessing the camera or panel or something else and poking around a little.
Apple can't be a poser and fight for the people while their products continue to be hackable anyways.
I've seen several post stating Apple would close the backdoor. My question: How could Apple close the backdoor if they don't know the method that created the backdoor? They would have to know what to fix to design a fix.
That's because this is a method that's been used for decades. Unless we change what kind of materials chips are made out of (that are somehow impervious to lasers and acid) then this is always a way.Anyone else realize that this is the exact same method which Edward Snowden said the government could utilize in cracking the phone? The man was on point.