Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
iPhone SE
Whaaaaat?! The SE looked worse than the 5!
[doublepost=1486147102][/doublepost]
That is and was still my favorite iPhone. I was an Android fangirl. That blue 5c was the first iPhone that ever caught my attention. I still have it. I've got a jet black 7+ now and it has a similar feel to the 5c.

As for using the backdoors, what did the FBI expect. We teach militants how to fire guns, then give them weaponry and they turn on us. The FBI uses some third party, potentially with hackers on the inside, and expect zero consequences?
Yes, I'm on a Jet Black now too. Second best looking iPhone ever, I think!
 
  • Like
Reactions: simonmet
Whaaaaat?! The SE looked worse than the 5!
[doublepost=1486147102][/doublepost]
Yes, I'm on a Jet Black now too. Second best looking iPhone ever, I think!
How does the SE look worse or better than a 5 given that it's basically the same (short of the slate color option essentially).
 
  • Like
Reactions: Breezygirl
I don't think that's the case at all. I think this highlights that no matter what kind of security policies you have in place, given enough time if the target is important enough to someone it will be infiltrated.

Security is an ever evolving cat and mouse game, which just highlights how ******* stupid the FBI's proposals were. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:

https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/

If you have a master key, it WILL be compromised.
If the 900GB of data was stolen in January and the unlock tool was extracted from that data already, that means they were not using very strong encryption, if any, to protect that tool from falling in the wrong hands. Not to mention that storing that tool on a web server (as it appears to be the case) is not a smart move.
 
I suspect the current US administration to give the FBI and CIA what ever surveillance they want.

They will be in our underwear drawers soon enough...
[doublepost=1486158233][/doublepost]
If so, that would certainly be no change whatsoever from the previous administration.

So you think trump is the same as Hillary?

trump has no rules, no laws will stop their 'Imperial President', and major industries will roll over and fetch sticks for him, all to save their stock price, and avoid a temper tantrum tariff, or worse.
 
  • Like
Reactions: Eduardo1971
If so, that would certainly be no change whatsoever from the previous administration.

No Administration Republican or Democrat can be trusted to protect our privacy. That is why encryption tools must not be managed or regulated by the government. No excuses, not to protect the children, not to protect against terrorism, not for any reason.
 
Last edited by a moderator:
So Apple can most likely study these tools heavily and patch their OS/go from there right? This is a good thing for the security of iOS no? As Apple now can look and study these tools
 
  • Like
Reactions: badNameErr
I dunno. Is it far fetched to think that the hacker might have been from cellbrite ?

I think it's safe to assume nobody at Apple or D.C. or Google etc. will give a straight answer on these issues. Just assume they are up to a whole lot of stuff they have no business doing.
 
Imagine what the current administration would do should a newer iPhone need hacking. One imagines Trump essentially isolating Apple and sieging them.
 
  • Like
Reactions: Eduardo1971
Given the current climate, if I were a cell phone manufacturer I would be looking at old flip phone designs for potential resurrection.

Personally if the govt forces their way in for a backdoor, I'll turn these in and we will just go without cell phones anymore.
[doublepost=1486210441][/doublepost]
. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:

https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/

If you have a master key, it WILL be compromised.

Oh no. Don't let the toddler find out it's a "golden" key. He really seems to like golden things; lame, wallpaper, showers...
 
  • Like
Reactions: Eduardo1971
So Apple can most likely study these tools heavily and patch their OS/go from there right? This is a good thing for the security of iOS no? As Apple now can look and study these tools

It is possible that Apple has/had that information already and then some. Of course they could have helped, but refused with good reason.
As possibilities were described in great detail by some specialists nothing can be hidden well enough for it not to be discovered/undone. (Removing chip surfaces in layers etc.)

What is interesting to me is that the vehement anti Apple crowd at the time calling them unpatriotic hasn't posted anything here.

Of course sane analytical people understand that when humans create something , humans can figure out whatever they want to do with it.

As others and myself have posted at the time:

1) I did not believe anything worth while would be on that phone. Most terrorists know what not to do.

2) If there was any backdoor, key or info on how to get in whatever method would get out into the public.

Which brings me back to brilliant Benjamin Franklin:

Three can keep a secret, if two of them are dead!
 
I knew there was a joke to be had there ... and you nailed it!
Well he nailed something :D
[doublepost=1486222098][/doublepost]
Which brings me back to brilliant Benjamin Franklin:

Three can keep a secret, if two of them are dead!
Even that won't work as the third person will spill the beans out of remorse. Gotta kill all three, and hope no one left a diary.
 
Last edited:
  • Like
Reactions: twinlight
There is a big difference from an A6 to an A7 in terms of data security. Has it been shown that there is a way in to the 64 bit devices?
 
There is a big difference from an A6 to an A7 in terms of data security. Has it been shown that there is a way in to the 64 bit devices?
64 bit iOS devices are defitnetly a bit more secure then 32 bit ios devices yes(secure enclave, Touch ID, etc in 64 bit iOS devices) plus armv-8 which brings some security improvements over 32 bit chips
 
  • Like
Reactions: sudo1996
Thank you, anonymous hacker. Sometimes reality needs to be brought to certain people and organizations.
Full ack! Preferably with a hammer...

Huge thumbs down for greedy basturds Cell-out-brite...
Their customer base probably consists vastly of people, ruling your or my country. THEY are the real problem, creating a market for these companies through demand.
 
How does the SE look worse or better than a 5 given that it's basically the same (short of the slate color option essentially).

Now I have an SE as my iPhone but as far as I'm concerned, the cosmetics of the 5C > SE. By far. I kept the 5C to use as a WiFi only device and still prefer its look and feel (with the apple dots case) to the SE, even though I have a nice grippy case on the SE and am happy with its smaller size compared to the 6 etc.

I don't have anything "personal" on the 5C since I just use it for entertainment, but it does have my apple ID... wondering how exposed I am now if "anyone" can hack a 5C, since I rarely even have it connected to the net except when upgrading software.

On the Cellebrite hack(s): Tim Cook was right, and... one despairs at "customer data" of anyone actually being secure. Not least because corporate interest in "security" goes about as far as the first hint that anyone is inconvenienced while trying to conduct business. Security is not thought of as being a "real" part of business, just an obstacle course to run whenever time is short and something more tangible --in potential effect on the company's bottom line-- than "security" seems to be at stake.

You know something inappropriate is probably happening if a CEO asks a risk manager --also an officer-- to leave the room during some board meeting. But see it almost never gets that blatant with security managers, because they just get 3am phone calls from some senior VP to take down some fence or other long enough to "get this done already".

The average CIO never hears about this stuff unless the security manager feels like putting his job at risk by balking at an improper request from someone up the line... although once in awhile a CIO is terminated for apparently not having sold in security as a big enough deal to general managers (like after a breach that affects millions of people). It doesn't take a skilled hacker to get to a lot of stuff. It just takes greed and carelessness.
 
Now I have an SE as my iPhone but as far as I'm concerned, the cosmetics of the 5C > SE. By far. I kept the 5C to use as a WiFi only device and still prefer its look and feel (with the apple dots case) to the SE, even though I have a nice grippy case on the SE and am happy with its smaller size compared to the 6 etc.

I don't have anything "personal" on the 5C since I just use it for entertainment, but it does have my apple ID... wondering how exposed I am now if "anyone" can hack a 5C, since I rarely even have it connected to the net except when upgrading software.

On the Cellebrite hack(s): Tim Cook was right, and... one despairs at "customer data" of anyone actually being secure. Not least because corporate interest in "security" goes about as far as the first hint that anyone is inconvenienced while trying to conduct business. Security is not thought of as being a "real" part of business, just an obstacle course to run whenever time is short and something more tangible --in potential effect on the company's bottom line-- than "security" seems to be at stake.

You know something inappropriate is probably happening if a CEO asks a risk manager --also an officer-- to leave the room during some board meeting. But see it almost never gets that blatant with security managers, because they just get 3am phone calls from some senior VP to take down some fence or other long enough to "get this done already".

The average CIO never hears about this stuff unless the security manager feels like putting his job at risk by balking at an improper request from someone up the line... although once in awhile a CIO is terminated for apparently not having sold in security as a big enough deal to general managers (like after a breach that affects millions of people). It doesn't take a skilled hacker to get to a lot of stuff. It just takes greed and carelessness.
Well, the 5c is different than 5.
 
To those complaining that the FBI asked for a tool to exploit security vulnerabilities that Apple created: Security vulnerabilities are meant to be exposed. Blame the phone manufacturers for creating them, not the gov't for paying for exploits. Or blame the gov't for forcing manufacturers to insert backdoors, if that's what they're doing.
[doublepost=1486280654][/doublepost]
I don't think that's the case at all. I think this highlights that no matter what kind of security policies you have in place, given enough time if the target is important enough to someone it will be infiltrated.

Security is an ever evolving cat and mouse game, which just highlights how ******* stupid the FBI's proposals were. The "golden key" scenario where they promise they will make sure no one gets the key doesn't work. MICROSOFT of all examples, demonstrated the pitfalls of this scheme not too long ago:

https://arstechnica.com/security/2016/08/microsoft-secure-boot-firmware-snafu-leaks-golden-key/

If you have a master key, it WILL be compromised.
The FBI wasn't asking for a golden key. That would be a backdoor. They were asking for a tool to crack existing, non-backdoor'd iPhones. Apple, to save face and make people blame the FBI, called it a golden key when it's really a key anyone could make with enough effort.
 
Last edited:
The FBI wasn't asking for a golden key. That would be a backdoor. They were asking for a tool to crack existing, non-backdoor'd iPhones. Apple, to save face and make people blame the FBI, called it a golden key when it's really a key anyone could make with enough effort.

It risked becoming a golden key without requiring much effort once it was provided even for "one-time use". And apparently now Cellebrite has inadvertently created a golden key for 5C hacking by virtue of its tools having been hacked. Which was what Cook was saying, and which makes Cook correct, no matter what the FBI wanted to call what it was asking for: an easy way in.
 
So Apple can most likely study these tools heavily and patch their OS/go from there right? This is a good thing for the security of iOS no? As Apple now can look and study these tools
It seems the tool that was used to open an iPhone 5c doesn't work with any newer phones anyway, starting with the iPhone 5s that was sold at the same time.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.