Have you read what's involved in doing this? There is absolutely no way a consumer can worry about this kind of action. You literally need clean rooms and extremely sophisticated microscopes and probes to deal with components at the sub-millimeter level, and even with that it's incredibly easy to irreversibly damage the chip.Maybe Tim Cook was misled to believe that iPhone cannot be cracked.....his marketing campaign may backfire, if some third party indeed recovers the data without the help of Apple
You can unlock any phone encrypted or otherwise. You scrape the data off of the chips then run all of the possible key combinations against it, in this case all of the 4 digit passcode combinations. Would take them about a week.
My quote is not about the actual issue per se. It is about the multiple definitive statements in this thread claiming Apple either will mitigate the exploit or already has. Worse, some have compiled complete detailed narratives based on the assumption that a replay attack is in fact the method used. It very well could be... or not. All I'm saying is people should pump the brakes on the assumptions.If it is successful they likely can't patch this approach with 100% confidence in this instance. Success on the FBI's part would end the case and Apple would not have an opportunity to use discovery rules to understand what was done. However, if it is used again in the future against a living suspect then that suspect can use discovery to bring the method to light and Apple can patch. Also, there have been many security experts theorizing about how such an attack would take place and Apple can certainly take steps to prevent vectors like replay attacks (probably the most likely approach this company intends to take) or further hardening firmware even against themselves with a signed update.
I can't *know* but I'd certainly put money on this group using a replay attack. Want to take a wager for a $100 donation to the charity of the winner's choice payable if and when the method becomes public?
$15,000?? They don't even know if there's anything at all on the phone! Waste of tax dollars to gamble on that.
Yeah, because we wouldn't want to see what's inside a terrorist's cell phone, the owner of which killed many people.I really hope they screw up good time.
They were stupid enough to be terrorists.
Maybe Tim Cook was misled to believe that iPhone cannot be cracked.....his marketing campaign may backfire, if some third party indeed recovers the data without the help of Apple
My quote is not about the actual issue per se. It is about the multiple definitive statements in this thread claiming Apple either will mitigate the exploit or already has. Worse, some have compiled complete detailed narratives based on the assumption that a replay attack is in fact the method used. It very well could be... or not. All I'm saying is people should pump the brakes on the assumptions.
How do they know the wipe function is enabled? How do they know they didn't use a longer passcode than 4 digits? They might be able to brute force 4 or 6 digits but beyond that it starts to take very long time.
"carefully drilling down into it using a focused ion beam to expose the portion of the chip containing the target data... and then probing it, micron by micron, to extract the information"
No amount of security can prevent an attack of this nature, at the physical layer.
Now, encryption is still good, cause the info they extract at the physical layer will still be encrypted, so they'll still have to attack that with decryption attempts, which could take anywhere from 1 day to 3 trillion years depending on the level of encryption and other factors. The thing they hope to find on the physical layer is the raw encryption key itself. I can't imagine Apple leaving the key unprotected at all - I'd imagine it's at least wrapped with a hash of some sort.
This is a riot. In an earlier thread on this topic I remember someone saying that normally this type of thing isn't publicized because it's done privately and quietly without fanfare. Tim Cook tried to make it a marketing show by blabbing it out to the world to make it look like he was some rouge digital freedom fighter and he was going to not allow the FBI access to the system.
So what happens? The FBI figures out a way via a third party to hack his "secure" phone thus making it look insecure.
Sometimes it just doesn't pay to run your mouth.[/QUOTE]
6 digits will take an absurdly long time, exactly why Apple implemented it.How do they know the wipe function is enabled? How do they know they didn't use a longer passcode than 4 digits? They might be able to brute force 4 or 6 digits but beyond that it starts to take very long time.
As I said a while back.
What would be safer for everyone?
Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.
Or some third party team working out how to access data on iPhones?
If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?
I said a similar thing. I would rather it be Apple and have a controlled "break in." But that's just me...
Ah Cellebrite, the company whose website mysteriously disappeared a few weeks ago (I was looking into them because of mentions of the company in certain leaked documents) but has a long history of building and selling the equipment for security states around the world.
They played a role in the systems used during the Arab Spring, the uprising in Tunisia, etc. This is a company who's products for surveillance are sold indiscriminately to dictators around the world to dragnet their citizens.
Good to see who the US security apparatus is in bed with.
As I said a while back.
What would be safer for everyone?
Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.
Or some third party team working out how to access data on iPhones?
If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?
$15,000?? They don't even know if there's anything at all on the phone! Waste of tax dollars to gamble on that.
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available. Shouldn't they have their own experts who know how to do these things? I guess they could be saving face by saying they just now found this outside company, but it makes them look incompetent.
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available. Shouldn't they have their own experts who know how to do these things? I guess they could be saving face by saying they just now found this outside company, but it makes them look incompetent.
Yeah they have been around along time. All this assumes a number password was used. Smart people use the complex password option, or a flip phone.Cellebrite?! Lmaoo anyone who has work in an Apple Store knows about their horrid technology.
the new stuff is very different than the old crap and yes I have. The consumer division that stores use to transfer your mom's contacts in the store is very different from the forensic division.Has anyone here used a cellebrite machine? These guys are gonna **** this thing up royally
As of last wednesday night when I looked their website was down, haven't checked recently as I'm at work. Thanks for the article!When I saw the DOJ say a foreign source was helping them I immediately suspected Cellebrite. Back in beginning of March, Wired did an article on them relative to the Apple case. Here's the article: http://www.wired.com/2016/03/feds-might-get-iphones-without-apples-help/ When I read that article I checked out their website. It was up at that point.
That's an absurd oversimplification of what is going to be done to this device.It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available.