Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Well, the first court order said that Apple should help unlocking the phone, charge all the cost, and then destroy everything they did to not let it fall into the wrong hands.

If Apple gives in, then the poor guy given the job will have to do it thirteen times. Write the code, test it very, very carefully to not mess up the phones, unlock one phone, destroy the code, and start all over again.

Seriously, it shows that Tim Cook was absolutely 100% right.

Why do it once when you can multiply the cost by 13 (and counting)! Government work at its finest.
 
  • Like
Reactions: iAbc21
This is why Tim Cook and Apple as a whole are right to stand their ground. Everyone knew this was a slippery slope and the Justice Department couldn't even wait until they had access to one phone before they started asking to get access to more phones.

The government is like the person who goes to the buffet telling themselves that they should only get one plate of fruit and they come back with six plates containing half the buffet and say "I just couldn't help myself -- it all looked SO good!"
 
Well, the first court order said that Apple should help unlocking the phone, charge all the cost, and then destroy everything they did to not let it fall into the wrong hands.

If Apple gives in, then the poor guy given the job will have to do it thirteen times. Write the code, test it very, very carefully to not mess up the phones, unlock one phone, destroy the code, and start all over again.

Seriously, it shows that Tim Cook was absolutely 100% right.

What it shows is there are unfortunately a lot of evil people around whose phones need to be unlocked. And Tim isn't right on this.
 
  • Like
Reactions: tgara
Reading a LOT of comments on here and I think the vast majority of you have no clue what you are talking about. If you are that worried about the FBI getting access to your phone in the event that they do create their "special version" of iOS for the San Bernadino case, just use a strong password on the phone. It's easy to brute force a numeric 4 or 6-digit pin unlock. But iOS supports alphanumeric passwords now...use a strong one and there is zero chance anybody ever gets into your phone (at least for the forseeable future). Nobody is creating a backdoor into your phone.

Requiring all communication devices to have a software backdoor will be the next step. We just have to wait for those idiots in Congress to devise a new bill and figure out a catchy acronym, then it is gg to personal privacy.
 
That slope just got more slippery than ( insert steepest street/hill you can think of ) after a winter storm will an oil slick added on top:rolleyes:

This is precisely what we all have been saying. Simply creating this backdoor opens the floodgates for it to happen everywhere. Some things simply shouldn't be created even if we have the ability to create them.
 
"The U.S. government previously said that investigators are only seeking access to a single iPhone related to the San Bernardino attacks..."

Strange then that they demanded tools that would help them obtain generic access to any iPhone, rather than simply asking that Apple break into the device for them.
 
I'm 100% certain that at this point, Apple will remove the ability to upload a firmware update to a phone without deencrypting the system with the phone's password.
The phone in question is a 5c. From the 5s onward, new firmware wouldn't make a difference anymore. But the ability to control firmware updates is obviously not in the firmware, so I don't think Apple could do this with a firmware upgrade.

Of course Apple could offer cheap upgrades to a 5s for all owners of older phones. Guess what, they actually do!
 
I'm 100% certain that at this point, Apple will remove the ability to upload a firmware update to a phone without deencrypting the system with the phone's password.

Apple will remove any and every potential vector in to the phone and the FBI/NSA/Justice Department can beg, scream and issue writ after writ. Apple will ensure that there is no way, ever, in to an iPhone without the encryption key.

Ah but here is the rub. Let's say Apple loses but then increases security even more. So next round a precent has been set to use development time to hack the phone. Would Apple now still be required to find some way to hack into and bypass their own security? Or will they then be requied to always have a way to get into the phone on FBI request (i.e. a backdoor)? That is the larger issue at stake. What is the requirement of a comapny in regards to warrants as security gets better and better?
 
  • Like
Reactions: centauratlas
What it shows is there are unfortunately a lot of evil people around whose phones need to be unlocked. And Tim isn't right on this.

The end does not justify the means. If there's a backdoor for iOS floating around, that's readily available to circumvent all security on any iOS device, this has far larger implications than what you're describing. How can you not see this?

Are you? Supporting terrorism?

That ridiculous knee-jerk personal accusation in no way validates your argument. Rather, it does the opposite. Playing on people's fears and ignorance of the larger fallout from such a situation is exactly what the FBI wants.
 
VTBB - I thought the issue here was that the increasing delay of pass-code entry made brute-force not an option (in any real scenario). Was the special version not to allow the removal of the delay ?
4 digit passcode is 10,000 combinations. With the artificial delay and the erasure after 10 failed attempts, you could hire an intern to crack such a phone within a day or two. 6 digit passcode takes obviously 100 times longer. Still doable if you really, really want the data. 8 random digits and uppercase / lowercase letter, and it takes about 500,000 years even if they build some hardware that taps the numbers at the maximum rate possible.

I think I read somewhere that even if they get what they want an alphanumer code would be something like 162 years.

There is a minimum time of 0.08 seconds per attempt. That's how long it takes to check any passcode, assuming that it takes zero time to enter a passcode. So you just multiply 0.08 by the number of combinations. My number was 62 (10 digits + 26 lowercase + 26 uppercase) raised to the 8th power (8 letters and digits). Apple says "5 1/2 years for six numbers and digits". 8 would be 62 x 62 times worse.

Note: the backdoor the fbi wants is without the mandatory 80ms delay.

Assuming a 8 character password it would be 218 trillion combinations. With a super computer it wouldn't take that long to try all combinations.

Wrong. First, by design the phone can only be unlocked if you are using the processor of that particular phone. Even if you put the hard drive into another phone, that phone couldn't unlock anything and couldn't read anything. Second, the 80ms "delay" is not a delay. That's how long it takes to check the passcode. By design.
 
Last edited:
  • Like
Reactions: centauratlas
4 digit passcode is 10,000 combinations. With the artificial delay and the erasure after 10 failed attempts, you could hire an intern to crack such a phone within a day or two. 6 digit passcode takes obviously 100 times longer. Still doable if you really, really want the data. 8 random digits and uppercase / lowercase letter, and it takes about 500,000 years even if they build some hardware that taps the numbers at the maximum rate possible.

I think I read somewhere that even if they get what they want an alphanumer code would be something like 162 years.
 
Why can't Apple just say something like, "After several attempts, none of our software engineers are able to produce this back-door thingy like we thought we could."

Then what? Apple tells the government, too bad so sad. If you want the back-door access, create it and help yourself.
 
Are you? Supporting terrorism?

Listen to someone who actually knows what they are talking about. Breaking iPhone encryption actually endangers national security. Are you suggesting to support terrorism by giving terrorists access to data stored on the phones of government employees? Seriously, that _is_ the problem. If you give the good guys the tools to hack into the bad guys' phones, then the bad guys will get the tools to hack into the good guys phones. And overall, you lose.

http://www.usatoday.com/story/news/2016/02/21/ex-nsa-chief-backs-apple-iphone-back-doors/80660024/
 
Th solution to the San Bernadino case is this:

1. Get an IPhone 5c
2. Install the same exact iOS version that it's running
3. Restore the most current iCloud backup. The backup preserves all the settings.
4. Attempt brute force 10 times to see if it will auto erase
5. If it doesn't auto erase, then the government can take their time trying the brute force method. The auto erase is not set by default
6. If it does auto erase then back to square one FBI
7. The good thing is if the device is disabled, they can always make an emergency call to get help from the San Bernadino PD

8. Last resort, ask Siri. Lol

Not going to work as the iCloud backup doesn't contain the passcode - the passcode only exists on the device where it is set...
 
... If you are that worried about the FBI getting access to your phone in the event that they do create their "special version" of iOS for the San Bernadino case, just use a strong password on the phone. It's easy to brute force a numeric 4 or 6-digit pin unlock. But iOS supports alphanumeric passwords now...use a strong one and there is zero chance anybody ever gets into your phone (at least for the forseeable future)...

Exactly why I use a 14 character alphanumeric password on my iPhone. TouchID takes care of the day to day unlocking and if you ever get stopped by the cops, raided, ordered to turn over the phone, etc just turn off the iPhone quickly.

No, I'm not a criminal and I have ZERO things to hide on my iPhone. I do it because I can and for the principle of it.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.