I guess we'll see Apple release an update that includes a "do not perform an iTunes backup without entering passcode" or something similar.
Leaked? They say exactly what they can do on their website. They share and show it at conferences constantly. It's well known in the law enforcement community.
It's funny to see how many are surprised by this. There are countless tools that can do far more and yet people are getting huffy about this one.
Since 2008 we've been selling a tool that will plug in to any Mac, Windows, or Linux machine and pull all your passwords (from the Keychain on the Mac) including the login password, web browsing history, email history, all chat logs/conversations, location data (to see everywhere their laptop has been), network history, cookie data, and tons more. No one seems to care but law enforcement loves it.
Wired got butt hurt we wouldn't give them one, as they aren't law enforcement.
https://www.wired.com/2007/05/questionable_se/
You don't need to. If the iPhone user has iTunes Encryption enabled, Cellebrite can extract the data but most of the data can't be parsed due to the encryption (text messages, photos, etc).
Anyone who really believes that countries like USA, Russia and China cannot bypass iOS, Android or Windows security measures is incredibly naive. They obviously would never make that information public since that would prompt companies to patch whatever exploits they're using, thus making the process more costly and time consuming. If the NSA, FSB or China's ministry of state security really need to access you device they will regardless of any measures you take short of not using a cell phone period.
Says who? You? Maths would probably disagree with you
Are you willing to share the steps to protect against the device mentioned by the company's CEO in the wired article?
Yes but Apple stepped up their game with iOS 10.2. One try takes about 30 seconds on my computer so you can forget about brute forcing.The data can still be collected. Cellebrite then prompts you for the backup password, where you can use a dictionary file, rainbow table, etc. to crack it.
Security is the only reason I stay with iOS.Security is one of the reasons why I have stayed with Apple the last few years, despite what I feel is a misplaced priority of thinness over product features or battery life.
It wouldn't surprise me that governments like the US, Russia, China, Israel and some others have cracked that security. They have access to the best people and crypto-technology and funding is not an issue. But if they share how to crack technology with other governments or businesses then 2 things will happen:
That's always been the case. Companies and countries have thought that their systems were secure but as long as people are an important link in the security chain a system can be hacked. Apple (apparently) is doing a much better job securing their system than any other company is doing currently for commercial non military devices.
- Someone will leak that there is a way to crack security for a device and
- Someone will fix that security flaw.
Yes but Apple stepped up their game with iOS 10.2. One try takes about 30 seconds on my computer so you can forget about brute forcing.