**This is where the NAND chip is typically desoldered, dumped into a file (likely by a chip reader/programmer, which is like a cd burner for chips), and then copied so that if the device begins to wipe or delay after five or ten tries, they can just re-write the original image back to the chip. **
Wait, is this saying our intell ppl had to get Israeli intell ppl to tach them how to mirror a chip? Shouldn’t we already know how to do this?
The whole FBI/Apple thing is a Red Herring.
Anyone in the reverse engineering industry, yes there is a whole industry based on this technology, can access the data on the phone as long as it is in their physical possession. I absolutely refuse to believe the a nation state as advanced as the US and agencies like the FBI to not have the same capabilities. This is the same technology used to read the contents of a physically damaged device.
The DOD is well aware of this technology so any electronic device used by them must undergo rigorous testing to assure that once destructed the device is unreadable. (this is not as easy as one may think). Please check out MIL-HDBK 115 for more information.
ANY memory can be read directly from the silicon with the proper care and tools.
Therefore: it is my supposition that the FBI wants to gain access to devices NOT in their possession.
Are these the same people who created Stuxnet?
Are these the same people who created Stuxnet?
If I were Apple, I’d be very concerned if they get into the chip and find the names of the Brussels bombers.
You could step through each clock cycle and find the instructions to wipe the disk and simply re-architect the simulator to bypass that code sequence and start over.
Some MIT guys hacked an XBox several years ago simply by dumping all the code and data from the bus.
Pinging dayglored and Shadow Ace for their ping lists. . .
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me