Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Maybe Tim Cook was misled to believe that iPhone cannot be cracked.....his marketing campaign may backfire, if some third party indeed recovers the data without the help of Apple
 
  • Like
Reactions: tgara
"carefully drilling down into it using a focused ion beam to expose the portion of the chip containing the target data... and then probing it, micron by micron, to extract the information"

No amount of security can prevent an attack of this nature, at the physical layer.

Now, encryption is still good, cause the info they extract at the physical layer will still be encrypted, so they'll still have to attack that with decryption attempts, which could take anywhere from 1 day to 3 trillion years depending on the level of encryption and other factors. The thing they hope to find on the physical layer is the raw encryption key itself. I can't imagine Apple leaving the key unprotected at all - I'd imagine it's at least wrapped with a hash of some sort.
 
Maybe Tim Cook was misled to believe that iPhone cannot be cracked.....his marketing campaign may backfire, if some third party indeed recovers the data without the help of Apple
Have you read what's involved in doing this? There is absolutely no way a consumer can worry about this kind of action. You literally need clean rooms and extremely sophisticated microscopes and probes to deal with components at the sub-millimeter level, and even with that it's incredibly easy to irreversibly damage the chip.

So what exactly would Tim be misleading about? This isn't cracking, this is direct hardware manipulation, something that is only not possible if you don't make electronics.
 
You can unlock any phone encrypted or otherwise. You scrape the data off of the chips then run all of the possible key combinations against it, in this case all of the 4 digit passcode combinations. Would take them about a week.

The decryption key is a combination of the device ID and the pin code. They only way to get the deviceId is to find it etched on the chip. If you want to do it on the phone itself then you are correct. However, then you are limited to the phone restricting the number of attempts.
 
If it is successful they likely can't patch this approach with 100% confidence in this instance. Success on the FBI's part would end the case and Apple would not have an opportunity to use discovery rules to understand what was done. However, if it is used again in the future against a living suspect then that suspect can use discovery to bring the method to light and Apple can patch. Also, there have been many security experts theorizing about how such an attack would take place and Apple can certainly take steps to prevent vectors like replay attacks (probably the most likely approach this company intends to take) or further hardening firmware even against themselves with a signed update.

I can't *know* but I'd certainly put money on this group using a replay attack. Want to take a wager for a $100 donation to the charity of the winner's choice payable if and when the method becomes public?
My quote is not about the actual issue per se. It is about the multiple definitive statements in this thread claiming Apple either will mitigate the exploit or already has. Worse, some have compiled complete detailed narratives based on the assumption that a replay attack is in fact the method used. It very well could be... or not. All I'm saying is people should pump the brakes on the assumptions.
 
  • Like
Reactions: 997440
This is a riot. In an earlier thread on this topic I remember someone saying that normally this type of thing isn't publicized because it's done privately and quietly without fanfare. Tim Cook tried to make it a marketing show by blabbing it out to the world to make it look like he was some rouge digital freedom fighter and he was going to not allow the FBI access to the system.

So what happens? The FBI figures out a way via a third party to hack his "secure" phone thus making it look insecure.

Sometimes it just doesn't pay to run your mouth.
 
  • Like
Reactions: Avalontor
How do they know the wipe function is enabled? How do they know they didn't use a longer passcode than 4 digits? They might be able to brute force 4 or 6 digits but beyond that it starts to take very long time.
 
Maybe Tim Cook was misled to believe that iPhone cannot be cracked.....his marketing campaign may backfire, if some third party indeed recovers the data without the help of Apple

Doubt it. Tim is fully aware at how security flaws can be exploited. You think he's not aware of stuff like the jailbreak community.

Tim's entire argument boiled down to the fact that Apple shouldn't be forced to deliberately introduce vulnerabilities when it's already hard enough to fix/prevent existing ones from being exploited already.
 
My quote is not about the actual issue per se. It is about the multiple definitive statements in this thread claiming Apple either will mitigate the exploit or already has. Worse, some have compiled complete detailed narratives based on the assumption that a replay attack is in fact the method used. It very well could be... or not. All I'm saying is people should pump the brakes on the assumptions.

Fair enough. Thanks for clarifying for me.
 
I can't wait till the find ABSOLUTELY NOTHING on this phone. They destroyed all their other phones and whoopsie.....forgot the monitored work phone.......
 
How do they know the wipe function is enabled? How do they know they didn't use a longer passcode than 4 digits? They might be able to brute force 4 or 6 digits but beyond that it starts to take very long time.

Four vs six vs alphanumeric they can just look at the lock screen.
[doublepost=1458757208][/doublepost]
"carefully drilling down into it using a focused ion beam to expose the portion of the chip containing the target data... and then probing it, micron by micron, to extract the information"

No amount of security can prevent an attack of this nature, at the physical layer.

Now, encryption is still good, cause the info they extract at the physical layer will still be encrypted, so they'll still have to attack that with decryption attempts, which could take anywhere from 1 day to 3 trillion years depending on the level of encryption and other factors. The thing they hope to find on the physical layer is the raw encryption key itself. I can't imagine Apple leaving the key unprotected at all - I'd imagine it's at least wrapped with a hash of some sort.

There is packaging that will selfdestruct when breached. I believe it's used on some of the higher levels of military encrypted devices (FIPS level four I think). I wouldn't expect that kind of tech in a mobile phone though. Just pointing out that there are defenses against that type of attack.
 
This is a riot. In an earlier thread on this topic I remember someone saying that normally this type of thing isn't publicized because it's done privately and quietly without fanfare. Tim Cook tried to make it a marketing show by blabbing it out to the world to make it look like he was some rouge digital freedom fighter and he was going to not allow the FBI access to the system.

So what happens? The FBI figures out a way via a third party to hack his "secure" phone thus making it look insecure.

Sometimes it just doesn't pay to run your mouth.[
/QUOTE]

Agreed, your entire post shows how you are conflating hacking/cracking with direct hardware manipulation. It really is a riot.
[doublepost=1458757297][/doublepost]
How do they know the wipe function is enabled? How do they know they didn't use a longer passcode than 4 digits? They might be able to brute force 4 or 6 digits but beyond that it starts to take very long time.
6 digits will take an absurdly long time, exactly why Apple implemented it.
 
As I said a while back.

What would be safer for everyone?

Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.

Or some third party team working out how to access data on iPhones?

If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?


for the 96% of the worlds population who are NOT US citizens, we don't trust the US either.
[doublepost=1458758008][/doublepost]
I said a similar thing. I would rather it be Apple and have a controlled "break in." But that's just me...


Except the phone with Apples software goes back to the FBI for them to brute force.

They then have the software, which they can then extract and they have a damn good template for weaponising Apples software to allow them access to any phone.
 
  • Like
Reactions: You are the One
Ah Cellebrite, the company whose website mysteriously disappeared a few weeks ago (I was looking into them because of mentions of the company in certain leaked documents) but has a long history of building and selling the equipment for security states around the world.

They played a role in the systems used during the Arab Spring, the uprising in Tunisia, etc. This is a company who's products for surveillance are sold indiscriminately to dictators around the world to dragnet their citizens.

Good to see who the US security apparatus is in bed with.


When I saw the DOJ say a foreign source was helping them I immediately suspected Cellebrite. Back in beginning of March, Wired did an article on them relative to the Apple case. Here's the article: http://www.wired.com/2016/03/feds-might-get-iphones-without-apples-help/ When I read that article I checked out their website. It was up at that point.
 
  • Like
Reactions: You are the One
As I said a while back.

What would be safer for everyone?

Apple, under their own total control accessing the data themselves and presenting just the data to the FBI.

Or some third party team working out how to access data on iPhones?

If we presume SOME 3rd party will be able to recover data at some point in time, which of the two scenarios do you feel would be preferable ?

I'd rather the second. Even Apple knows that if they make a tool to break their own encryption, there is no way it stays completely in their control forever. Even if the US didn't force them to hand it over for the hundreds (if not thousands) of other phones that law enforcement agencies have waiting, then some other government will. This way, Apple can watch what the other company attempts, then bump up security for the next update.
 
  • Like
Reactions: SantaFeNM
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available. Shouldn't they have their own experts who know how to do these things? I guess they could be saving face by saying they just now found this outside company, but it makes them look incompetent.
 
$15,000?? They don't even know if there's anything at all on the phone! Waste of tax dollars to gamble on that.

$15,000 is just to talk and have some demo.
Trust me, it will cost us much much more.
[doublepost=1458758707][/doublepost]
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available. Shouldn't they have their own experts who know how to do these things? I guess they could be saving face by saying they just now found this outside company, but it makes them look incompetent.

No surprise, do you expect them to build their own infrastructure for each and every case? If they need a microchip do you expect them to create an entire factory from scratch?
 
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available. Shouldn't they have their own experts who know how to do these things? I guess they could be saving face by saying they just now found this outside company, but it makes them look incompetent.

https://forums.macrumors.com/thread...rite-to-unlock-shooters-iphone.1962988/page-4

see 3.30pm post say it perfectly
 
Cellebrite?! Lmaoo anyone who has work in an Apple Store knows about their horrid technology.
Yeah they have been around along time. All this assumes a number password was used. Smart people use the complex password option, or a flip phone.
Has anyone here used a cellebrite machine? These guys are gonna **** this thing up royally
the new stuff is very different than the old crap and yes I have. The consumer division that stores use to transfer your mom's contacts in the store is very different from the forensic division.
 
Last edited:
  • Like
Reactions: You are the One
When I saw the DOJ say a foreign source was helping them I immediately suspected Cellebrite. Back in beginning of March, Wired did an article on them relative to the Apple case. Here's the article: http://www.wired.com/2016/03/feds-might-get-iphones-without-apples-help/ When I read that article I checked out their website. It was up at that point.
As of last wednesday night when I looked their website was down, haven't checked recently as I'm at work. Thanks for the article!
[doublepost=1458759169][/doublepost]
It's a little concerning that an organization as well-funded as the FBI has to resort to an off-the-shelf solution and apparently didn't know it was available.
That's an absurd oversimplification of what is going to be done to this device.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.