CKA Forums
Login 
canadian forums
bottom
 
 
Canadian Forums

Author Topic Options
Offline
CKA Uber
CKA Uber
 Vancouver Canucks
User avatar
Profile
Posts: 30650
PostPosted: Mon Mar 28, 2016 5:01 pm
 


Title: FBI breaks into iPhone of San Bernardino shooter without Apple's help
Category: Law & Order
Posted By: andyt
Date: 2016-03-28 16:57:23


Offline
CKA Uber
CKA Uber


GROUP_AVATAR
User avatar
Profile
Posts: 14747
PostPosted: Mon Mar 28, 2016 5:01 pm
 


Kind of new this was gonna happen given the help they were getting.


Offline
CKA Uber
CKA Uber
User avatar
Profile
Posts: 21611
PostPosted: Mon Mar 28, 2016 5:57 pm
 


:|


Last edited by Public_Domain on Mon Feb 24, 2025 10:37 am, edited 1 time in total.

Online
CKA Moderator
CKA Moderator
User avatar
Profile
Posts: 53889
PostPosted: Tue Mar 29, 2016 6:13 am
 


Public_Domain Public_Domain:
Though frankly I wouldn't be stunned if some guy somewhere could break into an ecrypted iPhone.


Any device that encrypts data in a 'secret' manner must have the encryption key stored locally. Any system, such as a website that encrypts traffic between two points, shares a key between those points.

If the key is local, as in the case of a phone, then all it takes is sorting through the memory of the device to find the key. Easy sounding, hard to do. But because the key is local, then it's retrievable. That's the same way DVD and Bluray encryption were broken.

The method that many think they are using to break the phone is to make a virtual copy of the phone, and brute force the thousands of possible passwords. Then they can either replace the bit of code that would 'brick' the phone with code that won't brick the phone, or restore another virtual copy of the phone's memory and keep trying.

The really brute force approach is to shave the back of the integrated circuit off (or use acid if it's ceramic), put probes on the chip and find the place the password is stored. But that's generally for custom made or ASIC chips.


Offline
CKA Super Elite
CKA Super Elite
 Vancouver Canucks
User avatar
Profile
Posts: 9445
PostPosted: Tue Mar 29, 2016 6:38 am
 


Public_Domain Public_Domain:
Cut to ten years from now, WikiLeaks releases documents showing secret court orders that barred Apple to silence about their forced assistance with the case.

Would you be surprised?

Apple and et cetera never admited to their backdoors, because they're legally forbidden. They spoke against it while being forced to capitulate. It's incredible what kind of BS happens right before our eyes.

Though frankly I wouldn't be stunned if some guy somewhere could break into an ecrypted iPhone.

Image
FBI: We need back door access to an IPhone.
Apple: We can't give you access to the phone in question.
FBI: Sure you can, we will make request in Federal Court Tim Cook will fight it, after months of grandstanding the FBI will announce they were able to access the phone without Apple's help and drop the case. In the end Apple wins as it's great public relations fighting to protect consumers privacy.
Apple: Deal!


Last edited by BRAH on Wed Mar 30, 2016 10:04 am, edited 2 times in total.

Offline
CKA Moderator
CKA Moderator
 Vancouver Canucks


GROUP_AVATAR
User avatar
Profile
Posts: 65472
PostPosted: Tue Mar 29, 2016 8:58 am
 


DrCaleb DrCaleb:
Any device that encrypts data in a 'secret' manner must have the encryption key stored locally.


Nope. RSA and Microsoft have had keys stored on external devices for around ten years now.

Bitlocker can use a USB to store the encryption key separate from the computer that is encrypted and I use that method to secure my important stuff at home.


Online
CKA Moderator
CKA Moderator
User avatar
Profile
Posts: 53889
PostPosted: Tue Mar 29, 2016 9:08 am
 


BartSimpson BartSimpson:
DrCaleb DrCaleb:
Any device that encrypts data in a 'secret' manner must have the encryption key stored locally.


Nope. RSA and Microsoft have had keys stored on external devices for around ten years now.

Bitlocker can use a USB to store the encryption key separate from the computer that is encrypted and I use that method to secure my important stuff at home.


'Device' in the sense of a phone. It has to be able to retrieve the key at will, and there is no guarantee of external or remote storage. No sane developer would ever assume that the key could be stored off the device on a mobile phone, because then there is always the chance of not being able to retrieve it.

Oh, did I just imply there were sane developers? :oops: :lol:


Offline
CKA Moderator
CKA Moderator
 Vancouver Canucks


GROUP_AVATAR
User avatar
Profile
Posts: 65472
PostPosted: Tue Mar 29, 2016 9:15 am
 


On smart phones my agency uses a Field Force Management (FFM) application that recovers the key from our servers if the phone is enabled in our environment. If it isn't then any attempt to access a network with the phone wipes it clean.

The downside is that you can't open these phones when they're out of range.

The San Bernardino shooter's agency has the same FFM app but they had not deployed it at the time of the shooting.

Betcha' they have now. 8)


Online
CKA Moderator
CKA Moderator
User avatar
Profile
Posts: 53889
PostPosted: Tue Mar 29, 2016 9:25 am
 


I've heard of that app. Sounds like a decent tool.

I've got encryption on both my Blackberries. 10 bad passwords, and they give up the magic blue smoke. Plus I can remote wipe them.

But my screen background is a note on how to return the phone to me in exchange for a $100 bill. For 12 hours only, then the phone is a paperweight. :)


Offline
CKA Moderator
CKA Moderator
 Vancouver Canucks


GROUP_AVATAR
User avatar
Profile
Posts: 65472
PostPosted: Tue Mar 29, 2016 10:42 am
 


I'm paranoid on security. If my phone ever gets lost I don't want it back.

The Trojan Horse wasn't a fairy tale. :idea:


Online
CKA Moderator
CKA Moderator
User avatar
Profile
Posts: 53889
PostPosted: Tue Mar 29, 2016 10:51 am
 


BartSimpson BartSimpson:
I'm paranoid on security.


Everyone who works in security is. Occupational hazard. ;)

The worst part is, we limit ourselves because we don't want to appear too paranoid, yet we know we are only just skating by and hoping for a lucky break.

Now I see stories that the FBI say they are perfectly willing to go to court to get all players in the tech industry to remove encryption - and on the same fucking page, the FBI is warning us that internet connected cars are a security risk! Sorry boys and girls, you can't have it both ways!


Offline
CKA Moderator
CKA Moderator
 Vancouver Canucks


GROUP_AVATAR
User avatar
Profile
Posts: 65472
PostPosted: Tue Mar 29, 2016 10:57 am
 


Yep. The next car we buy I already have plans to sanitize all the cell phone, WLAN, and Bluetooth from it. No way in hell am I risking that.


Online
CKA Moderator
CKA Moderator
User avatar
Profile
Posts: 53889
PostPosted: Tue Mar 29, 2016 11:16 am
 


BartSimpson BartSimpson:
Yep. The next car we buy I already have plans to sanitize all the cell phone, WLAN, and Bluetooth from it. No way in hell am I risking that.


Hehe, I read another article today and thought of you and that exact situation. Volvo wants to move away from keys and FOBs all together, and just put an app on your smart phone to control the car! You can then text people, and give them the ability to drive your car for a period.

What could possibly go wrong? :lol:

http://www.gizmag.com/volvo-keyless-acc ... one/41909/


Offline
CKA Moderator
CKA Moderator
 Vancouver Canucks


GROUP_AVATAR
User avatar
Profile
Posts: 65472
PostPosted: Tue Mar 29, 2016 11:19 am
 


Yet another reason why I won't be buying one of the new Chinese-made Volvos.


Post new topic  Reply to topic  [ 14 posts ] 



Who is online

Users browsing this forum: No registered users and 20 guests




 
     
All logos and trademarks in this site are property of their respective owner.
The comments are property of their posters, all the rest © Canadaka.net. Powered by © phpBB.