Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
This should be massive news with people exploding all over this. What is everyone doing, Christmas shopping or something?
 
Leaked? They say exactly what they can do on their website. They share and show it at conferences constantly. It's well known in the law enforcement community.

It's funny to see how many are surprised by this. There are countless tools that can do far more and yet people are getting huffy about this one.

Since 2008 we've been selling a tool that will plug in to any Mac, Windows, or Linux machine and pull all your passwords (from the Keychain on the Mac) including the login password, web browsing history, email history, all chat logs/conversations, location data (to see everywhere their laptop has been), network history, cookie data, and tons more. No one seems to care but law enforcement loves it.

Wired got butt hurt we wouldn't give them one, as they aren't law enforcement.
https://www.wired.com/2007/05/questionable_se/
 
I guess we'll see Apple release an update that includes a "do not perform an iTunes backup without entering passcode" or something similar.

You don't need to. If the iPhone user has iTunes Encryption enabled, Cellebrite can extract the data but most of the data can't be parsed due to the encryption (text messages, photos, etc).
 
Leaked? They say exactly what they can do on their website. They share and show it at conferences constantly. It's well known in the law enforcement community.

It's funny to see how many are surprised by this. There are countless tools that can do far more and yet people are getting huffy about this one.

Since 2008 we've been selling a tool that will plug in to any Mac, Windows, or Linux machine and pull all your passwords (from the Keychain on the Mac) including the login password, web browsing history, email history, all chat logs/conversations, location data (to see everywhere their laptop has been), network history, cookie data, and tons more. No one seems to care but law enforcement loves it.

Wired got butt hurt we wouldn't give them one, as they aren't law enforcement.
https://www.wired.com/2007/05/questionable_se/

Are you willing to share the steps to protect against the device mentioned by the company's CEO in the wired article?
 
You don't need to. If the iPhone user has iTunes Encryption enabled, Cellebrite can extract the data but most of the data can't be parsed due to the encryption (text messages, photos, etc).

The data can still be collected. Cellebrite then prompts you for the backup password, where you can use a dictionary file, rainbow table, etc. to crack it. The reality is there are dozens of tools that can collect iOS devices. All they do is create an iTunes backup. The difference between the tools is how they parse the data. The biggest roadblock is using a good passcode, something longer than 4 numbers.
 
If you need to be taught how to change your new computers default settings so you can get close to the promised computer and battery performance then you should admit,at least privately, that you no longer subscribe to the "it just works" model.
 
Anyone who really believes that countries like USA, Russia and China cannot bypass iOS, Android or Windows security measures is incredibly naive. They obviously would never make that information public since that would prompt companies to patch whatever exploits they're using, thus making the process more costly and time consuming. If the NSA, FSB or China's ministry of state security really need to access you device they will regardless of any measures you take short of not using a cell phone period.
 
Anyone who really believes that countries like USA, Russia and China cannot bypass iOS, Android or Windows security measures is incredibly naive. They obviously would never make that information public since that would prompt companies to patch whatever exploits they're using, thus making the process more costly and time consuming. If the NSA, FSB or China's ministry of state security really need to access you device they will regardless of any measures you take short of not using a cell phone period.

Says who? You? Maths would probably disagree with you
 
The data can still be collected. Cellebrite then prompts you for the backup password, where you can use a dictionary file, rainbow table, etc. to crack it.
Yes but Apple stepped up their game with iOS 10.2. One try takes about 30 seconds on my computer so you can forget about brute forcing.
 
Security is one of the reasons why I have stayed with Apple the last few years, despite what I feel is a misplaced priority of thinness over product features or battery life.

It wouldn't surprise me that governments like the US, Russia, China, Israel and some others have cracked that security. They have access to the best people and crypto-technology and funding is not an issue. But if they share how to crack technology with other governments or businesses then 2 things will happen:

  1. Someone will leak that there is a way to crack security for a device and
  2. Someone will fix that security flaw.
That's always been the case. Companies and countries have thought that their systems were secure but as long as people are an important link in the security chain a system can be hacked. Apple (apparently) is doing a much better job securing their system than any other company is doing currently for commercial non military devices.
Security is the only reason I stay with iOS.
 
Yes but Apple stepped up their game with iOS 10.2. One try takes about 30 seconds on my computer so you can forget about brute forcing.

That has more to do with the amount of horsepower the machine you crack it with has than Apple's game. All you are doing is throwing random groups of text at a collection. The attempt is either going to work, or not.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.