Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Another, more risky - not to mention laborious - method is an invasive microchip attack known as "de-capping". This involves removing and de-capsulating the phone's memory chip, carefully drilling down into it using a focused ion beam to expose the portion of the chip containing the target data (in this case, the iPhone's unique ID and passkey algorithm) and then probing it, micron by micron, to extract the information.

I'm quite impressed by how difficult it is to hack into an iPhone... Apple did a good job there.
 
That's because this is a method that's been used for decades. Unless we change what kind of materials chips are made out of (that are somehow impervious to lasers and acid) then this is always a way.

Gotcha, thanks for "looping me in"!

That said, it takes significant (millions of dollars) amounts of corporate or state/agency funding to even set up a facility to do this right in. So the long and short is this has ALWAYS been a way, it's just far too expensive for any small crime organization to do so, so the only real players to watch out for are state actors or nefarious corporations that don't care who they contract to.

Like the FBI, I guess :D
 
There's nothing on this phone! The government is using it as a tool. Do you seriously think that this phone wasn't destroyed for a reason?????????????? They destroyed their personal phones. They destroyed their hard drives. Yet this work phone was still in tact. I mean seriously..... does our idiot government really think these terrorists were stupid enough to use their WORK PHONES to conduct their terrorist communications??????
 
If a 3rd party does it and doesn't share how (specifically) they did - then it's in the wild. Personally, I'd rather have Apple have that knowledge.

It's an expensive labor intensive hack.
Unless you are worried about the typical hacker owning the equipment to de-cap semiconductors and also have E-beam equipment, then there is nothing to worry about.
 
First, I'm not in the mood for some cat fight on the webz. Let's stay peaceful. I didn't mean to offer an insult.

The scenarios in the post to which I responded can be summarised as follows: if Apple creates the backdoor, it becomes an official aspect of their software and therefore unblockable; if a third-party works out how to do engineer a backdoor, Apple can still block the exploit with a patch.

You made the third-party hack of an inaccessible iPhone sound more plausible and more likely by comparing it to an incomparable hack, that of jailbreaking, which ostensibly requires a fully-accessible iPhone. By making it sound more plausible with this invalid comparison, you generated unmerited FUD.

That's all.

a "Jailbreak" is just a hack that provides root access to the phone. Throughout the history of the iPhone there have been many different flavors of jailbreak that have exploited multiple vulnerabilities in the product, each eventually being patched and then replaced with a newer variant of jailbreak. So far all of these (that I'm aware of) hacks have required the phone to be unlocked as an unlocked phone has more functionality enabled and thus a larger surface area to exploit for attack vectors it is much more likely to find something exploitable in an unlocked phone. However... in theory a locked phone could be jailbroken as well. The problem is that the exposed surface area of the locked firmware is much smaller so it is less likely anyone would find something to be exploited and gain control of the device. Hasn't been done to date that I'm aware of but that doesn't mean that "jailbreak" could never occur on a locked phone.

Hope that helps.
[doublepost=1458751690][/doublepost]
security.png

https://xkcd.com/538/

https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis

for the truly paranoid :)
 
This may be a stupid question, but do they actually KNOW that the iPhone has the passcode fail wipe setting enabled? If that isn't enabled, the phone will not be wiped if they fail to guess the passcode. How do they know this setting is enabled on the phone?
 
  • Like
Reactions: You are the One
There's nothing on this phone! The government is using it as a tool. Do you seriously think that this phone wasn't destroyed for a reason?????????????? They destroyed their personal phones. They destroyed their hard drives. Yet this work phone was still in tact. I mean seriously..... does our idiot government really think these terrorists were stupid enough to use their WORK PHONES to conduct their terrorist communications??????

They were stupid enough to be terrorists.
 
  • Like
Reactions: SirCheese
You can unlock any phone encrypted or otherwise. You scrape the data off of the chips then run all of the possible key combinations against it, in this case all of the 4 digit passcode combinations. Would take them about a week.
 
I'm astonished by FBI behavior :eek:
[doublepost=1458752877][/doublepost]
Current iPhones use a different iOS version , and different hardware, than that iPhone 5C.
But the mechanism to disable brute force attacks is applicable to all....
 
As I said a while back.

What would be safer for everyone?

Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.

Or some third party team working out how to access data on iPhones?

If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?
Third party is pretty obviously the correct answer because any hole created by Apple for the US Gov ends up being usable by a third party anyway. At least with no intentional hole, it's harder for the third party to find the other holes and there is a single party abusing any holes that everyone else (US Gov) then goes through.
 
What would be safer for everyone? Apple, under their own total control accessing the data themselves and presenting just the data to the FBI. Or some third party team working out how to access data on iPhones?

The latter.

The biggest fear comes from the US government compelling unwilling citizens to work very much against their own interests. If the FBI pulls this on Apple, there will be no end to jurisdictions demanding particular phones be cracked, and no end to jurisdictions demanding "back doors" be installed (lest Apple implement an "uncrackable" system) - all at Apple's expense, and to Apple's detriment as users can't trust the products to be secure. Also, the techniques & master keys will be leaked, either thru unintentional reveals (see the "TSA master key" fiasco), bribery (enormous black-market demand for such tools), or legal obligation (public record in court proceedings).

Given the two, I'd much rather a willing third party be contracted to crack the device in question. We know such efforts are underway (aforementioned black-market demand, among others) anyway. Apple would not be required to act against its own interests (imagine a bank vault manufacturer being required to hand out viable lock picks to bureaucrats). And the company doing the work does so in a fair & legal marketplace, lawfully disassembling of devices others built.

TL;DR - If Apple is compelled, they'll never be allowed to improve security beyond "back doors". If another company cracks the security, Apple remains free to make the next version harder (even impossible) to crack.
 
I'm solidly in Apple's camp on this issue.
I'm generally aware of the mass surveillance conducted by the US Gov.
It seems reasonable to me that everything is hackable, especially when in someone's possession, verses remotely hackable.
I'm not mad at the FBI for memory swap, laser etching, byte copying, etc. etc hacks of this sort. This IS their job. Forcing a company to make a tool to break the security of all phones, or to create a tool that could be (or risk being) used to against all phones, remotely, to hack/monitor IS A MAJOR PROBLEM, IN MY OPINION!

The spirit here is, the FBI is taking ownership of their spying, investigations, not compelling individuals or corporation to be spies of everyone en masse.

Good for the FBI in this case!
 
I really hope they screw up good time.
Imagine the free positive advertising that will come from the third-party company failing to crack the security. "5C security held up to the infinite resources of the FBI! and later iPhone security just keeps getting better still."
 
The whole thing is a FBI PR-stunt. I'm sure they will announce that they unlocked it and found tons of valuable information :)

It's just another scam. I'd like to see them unlock the rest of the thousands of phones waiting in line.
 
  • Like
Reactions: Mums
I still can't get over the $15k. Does anyone have any idea if that's all that will be paid, or if there's usually more to these things?
 
As I said a while back.

What would be safer for everyone?

Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.

Or some third party team working out how to access data on iPhones?

If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?
Well if the only way they can do it is with special tools and taking the phone apart I would go with the later. Your first case is wrong any way. The FBI will not give them the phone and then have Apple give them the data back. That is not what was asked for and that is not how it would work.
 
A) $15,000 is a small price to pay for the DOJ/FBI to save face
B) third party doing a physical crack of the phone is not as threatening as 1st party using software

Props to Apple on this one... Even after the new iPad "Pro" debacle :)
 
  • Like
Reactions: You are the One
Looks like the Government lawyers read Apples brief and came to the conclusion that there case was one weak tit!

Actually, Apple's brief was considered crudely organized and clearly aimed at the press, not judges. They put the most emotional arguments first, and the best legal arguments last.

Neither. Your first statement assumes Apple only needs to unlock this phone and can keep the code a secret while in reality that code has to be made public in order for defenders of suspects to check if nothing in the code was made that purposefully blames a suspect. The 3rd party in your second statement could be anybody, good or bad guys.

Doesn't matter if the code become public or not. That's not the important part at all. The signing key is.

If Apple's public facing OS validator refuses to sign a particular version, it cannot be loaded.

Sound like Apple won, after all. If FBI unlocks this specific iphone (or any other iphone they already have in their possession) without Apple creating a backdoor-enabled iOS, it means that our devices remain as secure as they can be as long as they remain in our possession.

Our devices were fine anyway (see above).

But I think Apple lost, at least in one way. Prior to the FBI going to a third party, Apple could publicly play it as it only Apple could unlock an iPhone and only under duress from a warrant. Now everyone and their mother will know their iPhone is breakable by others. (Most people here already knew that, of course.)

Apple would've been smarter to protest a bit, then do it under the guise of being a good corporate citizen. That way, they would've retained control of the PR.

This is something that disturbs me. Since it's a "National Security" issue (to them) they aren't obliged to make the content, if any, of the phone public if they are able to pull this off. There should be some way to force the government to tell the public what's on that phone no matter what. Truth, please.

Maybe in fifty years. Otherwise, if there actually is anything on the phone that can lead to other terrorists, then it would be unwise to reveal any details to warn them, or even let them know that it worked.

In fact, if anyone other than the braindead FBI was running this op, I'd say they'd even go so far as to claim it did not work, just to throw terrorists off the scent.
 
The latter.

The biggest fear comes from the US government compelling unwilling citizens to work very much against their own interests. If the FBI pulls this on Apple, there will be no end to jurisdictions demanding particular phones be cracked, and no end to jurisdictions demanding "back doors" be installed (lest Apple implement an "uncrackable" system) - all at Apple's expense, and to Apple's detriment as users can't trust the products to be secure. Also, the techniques & master keys will be leaked, either thru unintentional reveals (see the "TSA master key" fiasco), bribery (enormous black-market demand for such tools), or legal obligation (public record in court proceedings).

Given the two, I'd much rather a willing third party be contracted to crack the device in question. We know such efforts are underway (aforementioned black-market demand, among others) anyway. Apple would not be required to act against its own interests (imagine a bank vault manufacturer being required to hand out viable lock picks to bureaucrats). And the company doing the work does so in a fair & legal marketplace, lawfully disassembling of devices others built.

TL;DR - If Apple is compelled, they'll never be allowed to improve security beyond "back doors". If another company cracks the security, Apple remains free to make the next version harder (even impossible) to crack.

Disagree. The only time a citizen can be compelled to assist the government is to first go through the judicial process where the government has to make significant showings that such actions are necessary, not burdensome to the citizen, and that there are no other reasonable alternatives for the government, and that the request has to be approved by a neutral judge. It is a very fact-specific analysis and there is no guarantee that just because it worked in once scenario means it will work in another.

As for who holds the keys, as I've said before, I would much prefer that Apple hold the keys to any software cracks or iOS variants because they can be used only if the government goes through all the hoops of proving why they want them. Apple also has better means for keeping this stuff secure, like they do for the iOS code and signature keys. This gives Apple, not the government, a lot of control. If the government holds the keys, I believe there is much more chance of abuse.

As far as third-party contractors to open a phone, that may be acceptable. Although, I would not be surprised if the FBI sets up its own lab and hires its own experts to accomplish same in house at some point.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.