Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Apple and the FBI. - part 2.  (Read 3130 times)

0 Members and 1 Guest are viewing this topic.

Geek-9pm

    Topic Starter

    Mastermind
  • Geek After Dark
  • Thanked: 1026
    • Gekk9pm bnlog
  • Certifications: List
  • Computer: Specs
  • Experience: Expert
  • OS: Windows 10
Apple and the FBI. - part 2.
« on: March 29, 2016, 12:04:09 PM »
Link:
ABC News
Quote
Federal officials announced Monday night they successfully cracked into an iPhone belonging to one of the San Bernardino shooters and no longer needed Apple's help in unlocking the device.

In doing so, authorities succeeded in their goal of breaking into an iPhone used by Syed Farook but did not set any sort of legal precedent that could be used in a future case, making it a sort of lukewarm win for both Apple and federal authorities.
This would not have been an issue if the man had backed up everything to Apple Cloud. Everybody should have a backup. ;D

DaveLembke



    Sage
  • Thanked: 662
  • Certifications: List
  • Computer: Specs
  • Experience: Expert
  • OS: Windows 10
Re: Apple and the FBI. - part 2.
« Reply #1 on: April 08, 2016, 04:39:47 PM »
Curious what method they used to gain access.

My guess is that they somehow were able to copy the information from the one phone to others and try up to 10,000 combinations of 4 digit pins until they hit the right one. Say they have 100 phones and 100 people given a group of 10 pins each to try out, its a crack the pin party at the FBI and you go until someone Yells Bingo! With 100 phones and 100 people, within 10 tries of 10 digit pins ( 100 pins per cracker ) they would be in pretty quickly, at the expense of 100 people hourly, plus 100 phones, plus whoever they hire to carefully extract a copy of the phones encrypted memory to clone to the other phones. Maybe the reason why it took so long is because they didnt buy 100 phones and someone was working around the clock cloning the phone and running a group of 10 pins and then cloning again and trying the next 10 and so on and repeat until bingo.... I wonder if Apple will increase the pin length to say 8 digits and make it that much longer to brute force crack by cloning the memory.

But the minute someone has physical access to your device its just a matter of time before they are in if they are determined and educated in how it all works.

Geek-9pm

    Topic Starter

    Mastermind
  • Geek After Dark
  • Thanked: 1026
    • Gekk9pm bnlog
  • Certifications: List
  • Computer: Specs
  • Experience: Expert
  • OS: Windows 10
Re: Apple and the FBI. - part 2.
« Reply #2 on: April 08, 2016, 06:08:50 PM »
Aside from the April Fool jokes, there has been some rial response to the question: 'How Did they Crack It?'
From PC Mag:
Senators Briefed on How FBI Cracked iPhone.
From CNN:
We bought 'a tool' to hack iPhone
(Also with video of Apple CEO Tom Cook.)
No clue as to the price.   8)