They already got the iCloud back ups. But there were no backups a month from the event. They want to get into the phone to get more recent data.
Funny thing is the terrorists destroyed their personal phones but not this iPhone. i wonder why...... Hmmmmm.....
Could it be that is was common knowledge to all the employees where this terrorist worked that all communications on their work iPhone was tracked by MDM? I have a work iPhone and I know even if I turn off my iCloud backup the MDM my company uses tracks EVERYTHING I do on it.
It also revealed the incompetence of the FBI. Somebody changed the password on the iCloud back up within 24hours of getting the phone. Apple suggested taking the iPhone to a known Wifi network which would have allowed an updated backup to be created, but since the password was changed, that strategy didn't work.
Technically Apple could absolutely offer a cloud backup solution where even they couldn't access the data. For example, they could let the user pick a backup password (same as they already do for encrypted iTunes backup) and use it to encrypt the data before uploading to iCloud. Of course this means that users who forget the password couldn't restore their backup, which is why they should probably make this optional and give the user a proper warning. And, BTW, there are cloud services that use similar approaches to encrypt their users' data, e.g. Spideroak and the backup service Crashplan.
1TB hard drives are very inexpensive nowadays. Unless you don't have access to a computer, backing your iPhone up to an encrypted drive or two or three, storing one in a bank vault, you're more secure than backing up to any cloud.
Funny thing is the terrorists destroyed their personal phones but not this iPhone. i wonder why...... Hmmmmm.....
Could it be that is was common knowledge to all the employees where this terrorist worked that all communications on their work iPhone was tracked by MDM? I have a work iPhone and I know even if I turn off my iCloud backup the MDM my company uses tracks EVERYTHING I do on it.
If an MDM can track 'EVERYTHING' that happened on that phone, why are we all debating this? Clearly there is no such MDM, and if you credit the nut-job with flawless intelligence (as most do when it suits them), he would have known this.
[doublepost=1456987958][/doublepost]
But not changing the password immediately would have allowed a potential accomplice to access and change evidence in the account. Allowing that would have been incompetent too, wouldn't it? Sure they did things in the wrong order but who knows what time pressures they were working under or what their suspicions were at the time.
If you didn't want Apple to be able to access the data, then they couldn't be in the cloud. You'd have to store the encryption key safely by writing it down on a piece of paper that you keep in your wallet or with your phone, then type it in on the other phone.Wouldn't Apple would have to store enencryption keys in the cloud though to make it work on a different device than the original phone?
So you think the killer was stupid enough to have incriminating information on his phone, stupid enough to let it make backups to his iCloud account, and clever enough to give his username / password to an accomplice to wipe out evidence? That's ridiculous.But not changing the password immediately would have allowed a potential accomplice to access and change evidence in the account. Allowing that would have been incompetent too, wouldn't it? Sure they did things in the wrong order but who knows what time pressures they were working under or what their suspicions were at the time.
Emails are encrypted in transit (unless you are really careless), but the contents of the email has to be unencrypted. Of course the email server would hopefully store all emails in an encrypted form to prevent hackers from accessing them, but the email server would have the encryption keys, and would be able to decrypt every email.Most email is encrypted in transit today (both between user and email servers and between the major email providers), so it's not that easy to intercept emails on the open Internet anymore. But the email providers themselves are of course able to intercept them (and store them on their servers anyway in most cases).
They could, but obviously there would be nothing on interest on the phone in that case. It's very unlikely there is anything of interest anyway. But nobody told the company they had an employee who was going to kill 14 people. If they had been told, they wouldn't have put MDM on his phone, they would have handcuffed him to his chair.SBC did not have MDM active on that device. If they had, they could have unlocked the suspect iPhone easily.
Apple have already given them all the iCloud back up data they have. The data only goes up to between 2-6 weeks before the attack (depending on the source you read). Nobody knows why the phone stopped backing up in the weeks leading to the attacks. It's entirely possible that the attacker turned off iCloud backups. Anyhow Apple told the FBI to take the phone to a known wifi connection (attackers home or work) and try and force the phone to do an iCloud back up. Apple would then have given this information to the FBI. However it then emerged that the county reset the iCloud password on the instruction of the FBI. Now the only way to get the phone to do an iCloud back up is to enter the new password on the phone and of course they can't do that because the phone is locked and they don't know the password.So this really proves that the FBI is 100% full of **** on the San Bernadino case. They know full well they can just subpoena the iCloud backup and be done with it, they just want an easy way into phones so they can subvert due process.
Funny thing is the terrorists destroyed their personal phones but not this iPhone. i wonder why...... Hmmmmm.....
Could it be that is was common knowledge to all the employees where this terrorist worked that all communications on their work iPhone was tracked by MDM? I have a work iPhone and I know even if I turn off my iCloud backup the MDM my company uses tracks EVERYTHING I do on it.
I'm quite sure that was a case of people guessing AppleIDs and passwords. For example, if you knew who I am, and you gathered lots of information about me, you could figure out two out of three components of my AppleID password. (But it would be difficult, and the third component is safe). There are lots of "celebrities", including lots of young, good looking, female minor "celebrities". Some have good passwords, some don't. You can find out lots of information about them just through Google. So if Z-lister Cindy has a dog named Baby you probably find that on her website, then you try "cindylovesbaby" as the password and chances are you are in. Maybe only 5 percent are _that_ stupid, but that's enough to get lots of nude pictures. Plus consider personal assistants who can be bribed.It doesn't surprise me that the iCloud data is less secure as we had the celebrity nude pictures hacking scandal not so long ago.
I've been avoiding iCloud because of Apples track record of failure so serious even Steve Jobs admitted publicly that MobileMe was Apple's greatest failure. While slightly better I'm still not trusting Apple's iCloud.
Besides for years I've maintained my own server with Synology DiskStation Multibay NAS. Five terabytes of secure storage.
I do enjoy the convenience of Google Drive to store current non-personal files that I share with family and friends. That's my preferred way of safely using a cloud, a method that has worked very well over the last five years.
It's been well known that your security goes out the door when you backup to iCloud. I'm fine with that feature, I just wish Apple gave us more control over what gets backed up to iCloud. For instance, if I could disable iMessages from being backed up to iCloud, then I would be a happy camper. Why Apple doesn't enable that feature is beyond me.
I'm saying a professional investigator, investigating a spree killing, wouldn't rule something out because it seems a bit irrational. That's what internet amateurs do when they want to defend a POV. People's behaviour, down to these little details, cannot be predicted.So you think the killer was stupid enough to have incriminating information on his phone, stupid enough to let it make backups to his iCloud account, and clever enough to give his username / password to an accomplice to wipe out evidence? That's ridiculous.
[doublepost=1456993890][/doublepost]
With The MDM on my company issued devices they can at anytime remotely lock it and change the passcode.
Yes and no. One reason an iPhone is so hard to decrypt is that the actual data on the SSD storage is encrypted with a password that is generated by combining the user passcode with a hardware password that cannot be read. Thus if you were to dismantle an iPhone and hook up the SSD part to a computer, brute-forcing this combined password is impossible in a human's lifetime. Which is why the FBI has to brute-force the iPhone password using the CPU and OS running on the iPhone (because only the built-in CPU has access to this otherwise unreadable second password).Wouldn't Apple would have to store enencryption keys in the cloud though to make it work on a different device than the original phone?
Thus, the whole flaw of the cloud is exposed.
I recommend that everyone turns off their iCloud backups on all devices and only uses iTunes to make encrypted backups. I don't believe that Apple will ever make iCloud secure, though I would love to be proved wrong.
I raised this issue a few days ago, and am pleased to see MacRumors highlighting the significance of the iCloud problem.