They shouldn't be able to crack the throttling. This is the crux of brute force protection.
The moment Apple fixes this in a release, assuming they do, which I was hoping 11.3 would do....... then I'll probably go back to 6 numeric codes.
They shouldn't be able to crack the throttling. This is the crux of brute force protection.
There's a much easier way for a thief to prevent remote wiping: simply remove the SIM.This came up when Apple first rolled out Control Center. And general consensus was to not have Control Center on the lock screen. Which devolved into odd scenarios coming up where it's possible that a thief will watch you, to make sure you are off the lock screen, will grab from you hands, work the control center while running, and then put it into a Faraday bag, just to be safe.
I use 13 characters. So with the length of time it takes to crack a long pass code, its almost useless to invest in
that cracking tool if they have to wait to the next century for the results...
Hopefully Apple has already purchased a few to dissect (through a suitable shell corporation, of course!)...
good thing mine is a 27 character alphanumeric ;-) should take a few years
Using the middle part of PI here, easier to remember ;-PWell, that settles. I'm changing my passcode to the last 10 digits of PI.
The primary brute force protection (design the key derivation function with enough interations that it takes significant time to compute) wasn't cracked, otherwise it wouldn't take 6 minutes to crack a 4-digit code.They shouldn't be able to crack the throttling. This is the crux of brute force protection.
Yeah, I'm sure a bunch of terrorists and cybercriminals are watching this website veeerrrry carefully for important secrets about cryptography.It’s great to let the criminals and terrorists know this.
Must've been a bad password. 25 actually random characters would take much longer to crack.I've seen 25 character mixed case with numbers of special characters cracked in under 20 hours. But keep telling yourself that kind of stuff is impossible if it makes you feel better.
What I said above about criminals breaking into phones. The black market is sophisticated enough to have a whole process that stolen phones go through, giving a little profit to each person in the chain. I tracked one left in a taxi once and saw it go to a parking lot, then to some business front, then off to China.Why do you all think law enforcement will be after the contents of your phone? Honest to god that’s something I never think about as I have zero plans to be involved in any criminal activity.
If you believe this story, not sure I do. Yeah get everybody comfortable again, that's playing chess. On the otherhand I don't really care if law Enforcement searches my phone, I'm not a dumbassgood thing mine is a 27 character alphanumeric ;-) should take a few years
Lots of words not much in way of proof that your system works. The resources put into getting data is proportional to how important it is for law enforcement, if the data exists then it can be retrieved if necessary. Especially if you are in custody. If you go through all that to protect your bootleg movies then your safeYes, however only to a certain degree. Forensic science with computers can only do so much and is not magic. it can not do whatever a person (such as law enforcement)would like. There are limits.
For example, if the law can get into my MacBook then I will give them a medal.
No amount of 'magic' will help them. I do not know much in life but I have a natural ability to see where parts of a system fall down etc. Where the holes are and such.
I will tell you about when I had a Windows laptop because I no longer use it.
I used bit locker, I had the laptop set up so that in order to boot the laptop up I had to boot up with a USB flash drive connected.
It gets harder...
You see I had a 2nd laptop that itself was also bit locker enabled...I had a USB drive for that laptop that had to be connected in order to boot. So I had to connect the 2nd USB drive, boot up the 2nd laptop, enter the password for bit locker and the computer password(in itself not uncrackable but will slow down anyone trying to hack me).
Then I had to wait for Windows to load, (boot straight to command prompt etc was disabled)then had to log into my account and then unlock the USB drive for the first laptop. Then eject it. Then connect it to the main laptop and then boot that laptop up, enter the password and the computer password and well you get the point.
I also kept both USB drives on me at all times. I even slept with them.
All my passwords were longer than 20 characters and alphanumeric with upper case and lower case etc.
I also made sure that all of my files that were even remotely of interest to anyone were also encrypted(for all of my encrypts - even the USB drive- I used a triple cascade AES-BLowfish-Twoswords key- so good luck with that!).Each file had extra protection enabled that for obvious reasons I won't divulge.
I also am aware that attempts could be made to extract the hard drive and use forensic capabilities to crack the encryption of bit locker(which I think has been done at some point),though I took steps to stop those. It was difficult to set up and a pain in the **** but worth it in the long run.
I used to work for a defence contractor making equipment for the UK Military and whilst I did not work on creating the equipment as such my skills were, let's say more in the testing side of things.
So I knew who to talk to about stopping any forensic attempts to crack my hard drive.
It was not however perfect and there were loopholes, it is just that those loopholes would have taken a very VERY long time for ANYONE to crack. No matter how good they are.
Gotta have the recorded message to go with it.The 10-try wipe option just isn't cutting it. I think it needs a Mission Impossible self-destruct setting.
Programmable runaway temp on the battery should do it. Put a little extra pizzaz the GreyKey solution.
I wonder how long it would take for it to guess this password:
That is my code!I wonder how long it would take for it to guess this password: