Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
They shouldn't be able to crack the throttling. This is the crux of brute force protection.

The moment Apple fixes this in a release, assuming they do, which I was hoping 11.3 would do....... then I'll probably go back to 6 numeric codes.
 
  • Like
Reactions: I7guy
I assume this device use brute force to try every possible combination to work out your passcode. I also assume it will start at 0-9 then A-Z then symbols (i think). If that is the case then using all symbols (or Z's if symbols not used) will mean your passcode takes longest to work out.

Anyone know the sequence used for symbols used? ie !@£$%^& etc etc
 
This came up when Apple first rolled out Control Center. And general consensus was to not have Control Center on the lock screen. Which devolved into odd scenarios coming up where it's possible that a thief will watch you, to make sure you are off the lock screen, will grab from you hands, work the control center while running, and then put it into a Faraday bag, just to be safe.
There's a much easier way for a thief to prevent remote wiping: simply remove the SIM.
 
Y'all storing atomic secrets in your iPhones? Please. A normal passcode is going to keep out the few people who might give a quarter of a crap about your Comcast login, your Snapchats and your secret porn stash.

If a government wants to know what's in your phone, they're gonna cut to the chase and demand that complex, randomized 12-digit nightmare of a password from you and hold you until they get it -- and/or subpoena your ISP, your telco and Apple itself to get what they want.

And if there are non-state Bad People that motivated to get what's on your phone, more likely they'll just scoop you up into a van in a parking lot one fine day, drive you somewhere out of the way, and do terrible things to you until you unlock that phone.

I mean, whatever, if it makes you feel better to have a passcode that supposedly takes years to brute-force, then by all means go for it. It's fun to pretend you're a secret agent or whatever, I guess. But don't be under the illusion that a determined attacker doesn't have other options.

And if you DO happen to own data that valuable, I'm gonna go out on a limb and say maybe don't keep it on a networked device you carry with you constantly?
 
Last edited:
I use 13 characters. So with the length of time it takes to crack a long pass code, its almost useless to invest in
that cracking tool if they have to wait to the next century for the results...

They would probably thank you for telling them it's 13 characters. ;)

Hopefully Apple has already purchased a few to dissect (through a suitable shell corporation, of course!)...

That was posted several months ago when this device was first mentioned on macrumors. :D

good thing mine is a 27 character alphanumeric ;-) should take a few years

But I have difficulty remembering my own phone number. :rolleyes:
 
Why do you all think law enforcement will be after the contents of your phone? Honest to god that’s something I never think about as I have zero plans to be involved in any criminal activity.
 
They shouldn't be able to crack the throttling. This is the crux of brute force protection.
The primary brute force protection (design the key derivation function with enough interations that it takes significant time to compute) wasn't cracked, otherwise it wouldn't take 6 minutes to crack a 4-digit code. ;) They were able to sidestep the additional protections, but those aren't enforced cryptographically but only in Apple's password entry routines. Apparently the "gray box" is somehow able to run its own cracking code on the device (similar to how jailbreak exploits are used) so it's not affected by the limited number of attempts.
 
  • Like
Reactions: rafark and jw2002
Very cool. Looks like a fairly modern device... no headphone jack, thankfully! Apt font choice for "Status". The grommets suck, though - that's where the unit will break first and you have to return the whole box for cable replacement... Why not properly connectorize these two cables? Oh, it would drive the MSRP up by another $65, that's why. I may hold off until Rev 2.
 
Last edited:
Right, I've gone alphanumeric and with some pretty unpredictable special characters... and while I've never had much of a problem with FaceID recognition (some fails but nothing to grumble about), since changing FaceID has improved no end, no fails even at the most extreme angles - attempting to unlock without giving attention (bringing up the passcode/word option) unlocks the second I look at the phone to enter the password, that never happened before... probably fluke, but now that I want to be faced with entering the passcode/word (without having turned off FaceID in order to do so) it's just not happening :p
...shouldn't complain really haha!
 
I've seen 25 character mixed case with numbers of special characters cracked in under 20 hours. But keep telling yourself that kind of stuff is impossible if it makes you feel better.
Must've been a bad password. 25 actually random characters would take much longer to crack.
[doublepost=1523917185][/doublepost]There's a risk of stolen phones being sold on the black market to someone who can crack them and break into bank accounts that way. I stopped using my phone for anything that stores my bank account number or similarly sensitive info a while back. I'm not going to trust a mobile device with that no matter what security they claim.
[doublepost=1523917268][/doublepost]
Why do you all think law enforcement will be after the contents of your phone? Honest to god that’s something I never think about as I have zero plans to be involved in any criminal activity.
What I said above about criminals breaking into phones. The black market is sophisticated enough to have a whole process that stolen phones go through, giving a little profit to each person in the chain. I tracked one left in a taxi once and saw it go to a parking lot, then to some business front, then off to China.
 
Last edited:
good thing mine is a 27 character alphanumeric ;-) should take a few years
If you believe this story, not sure I do. Yeah get everybody comfortable again, that's playing chess. On the otherhand I don't really care if law Enforcement searches my phone, I'm not a dumbass
 
  • Like
Reactions: justgeig
There are some people in this thread who think this is funny. I've had a coworker who had her identity stolen. It is a life changing event. She is not important. She doesn't have state secrets. She doesn't work for a vast organized crime ring.

So no, you don't need to be important to take security seriously. Hackers make money or simply have fun taking over accounts. Having your electronic identity stolen and accounts taken over is extremely time consuming to undo, very inconvenient, and expensive. And you never know if it is completely over.

Anyone getting access to your phone or your computer, as if they were you, then has access to your web history and email. With access to web history and email they can see all of the places you go to that have accounts. With access to your email they can take over any number of accounts that use email for password resets, even banking accounts. Some accounts won't even need the email password reset, if you have autofill enabled.

Think you're secure because you enabled 2-factor authentication? Nope, they've got the second factor...your phone, which is going to receive any SMS, call, or email needed for 2-factor authentication, and it will have the authenticator apps on it for time-based codes.

So even though nobody has any particular interest in targeting most of us, and odds are very low, the stakes on the other hand are extraordinarily high. It's certainly enough that I'm willing to have a code that's just a little bit longer, and with TouchID or FaceID you don't even have to enter it all that often. Also do the same practices on your tablets and home computers.

This is also why I hate the "if you've done nothing wrong, you have nothing to hide" argument. Wrongdoing has nothing to do with it. Everyone has something to hide--access to your critical accounts.
 
Last edited:
You don’t need the iPhone contents only to stole someone identity only. Go to their FaceBook page, get free all the info you need to stole someone’s identity...
 
Yes, however only to a certain degree. Forensic science with computers can only do so much and is not magic. it can not do whatever a person (such as law enforcement)would like. There are limits.
For example, if the law can get into my MacBook then I will give them a medal.
No amount of 'magic' will help them. I do not know much in life but I have a natural ability to see where parts of a system fall down etc. Where the holes are and such.
I will tell you about when I had a Windows laptop because I no longer use it.
I used bit locker, I had the laptop set up so that in order to boot the laptop up I had to boot up with a USB flash drive connected.
It gets harder...
You see I had a 2nd laptop that itself was also bit locker enabled...I had a USB drive for that laptop that had to be connected in order to boot. So I had to connect the 2nd USB drive, boot up the 2nd laptop, enter the password for bit locker and the computer password(in itself not uncrackable but will slow down anyone trying to hack me).
Then I had to wait for Windows to load, (boot straight to command prompt etc was disabled)then had to log into my account and then unlock the USB drive for the first laptop. Then eject it. Then connect it to the main laptop and then boot that laptop up, enter the password and the computer password and well you get the point.
I also kept both USB drives on me at all times. I even slept with them.
All my passwords were longer than 20 characters and alphanumeric with upper case and lower case etc.
I also made sure that all of my files that were even remotely of interest to anyone were also encrypted(for all of my encrypts - even the USB drive- I used a triple cascade AES-BLowfish-Twoswords key- so good luck with that!).Each file had extra protection enabled that for obvious reasons I won't divulge.
I also am aware that attempts could be made to extract the hard drive and use forensic capabilities to crack the encryption of bit locker(which I think has been done at some point),though I took steps to stop those. It was difficult to set up and a pain in the **** but worth it in the long run.
I used to work for a defence contractor making equipment for the UK Military and whilst I did not work on creating the equipment as such my skills were, let's say more in the testing side of things.
So I knew who to talk to about stopping any forensic attempts to crack my hard drive.

It was not however perfect and there were loopholes, it is just that those loopholes would have taken a very VERY long time for ANYONE to crack. No matter how good they are.
Lots of words not much in way of proof that your system works. The resources put into getting data is proportional to how important it is for law enforcement, if the data exists then it can be retrieved if necessary. Especially if you are in custody. If you go through all that to protect your bootleg movies then your safe :) But if it makes you happy...
 
"10 digits: ~9259days worst (~4629avg)"
Not sure if this is a theoretical estimate or they've been trying to hack a 1994 iPhone all this time.
 
The 10-try wipe option just isn't cutting it. I think it needs a Mission Impossible self-destruct setting.

Programmable runaway temp on the battery should do it. Put a little extra pizzaz the GreyKey solution.
 
Looking at the estimated cracking times for the various numeric-only passcodes, I decided to compromise at a 12 digit numeric passcode. It’s still relatively more convenient than an alphanumeric passcode (passphrase?) while being fairly difficult to crack, in terms of minimum number of days needed.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.