Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cops Are Confident iPhone Hackers Have Found a Workaround to Apple’s New Security Feature
Motherboard.vice.com ^ | June 14, 2018 | By Joseph Cox and Lorenzo Franceschi-Bicchierai

Posted on 06/15/2018 3:34:22 PM PDT by Swordmaker

“Grayshift has gone to great lengths to future proof their technology and stated that they have already defeated this security feature in the beta build.”


Image: Malwarebytes

Apple confirmed to The New York Times Wednesday it was going to introduce a new security feature, first reported by Motherboard. USB Restricted Mode, as the new feature is called, essentially turns the iPhone’s lightning cable port into a charge-only interface if someone hasn’t unlocked the device with its passcode within the last hour, meaning phone forensic tools shouldn’t be able to unlock phones.

Naturally, this feature has sent waves throughout the mobile phone forensics and law enforcement communities, as accessing iPhones may now be substantially harder, with investigators having to rush a seized phone to an unlocking device as quickly as possible. That includes GrayKey, a relatively new and increasingly popular iPhone cracking tool. But forensics experts suggest that Grayshift, the company behind the tech, is not giving up yet.

“Grayshift has gone to great lengths to future proof their technology and stated that they have already defeated this security feature in the beta build. Additionally, the GrayKey has built in future capabilities that will begin to be leveraged as time goes on,” a June email from a forensic expert who planned to meet with Grayshift, and seen by Motherboard, reads, although it is unclear from the email itself how much of this may be marketing bluff.

“They seem very confident in their staying power for the future right now,” the email adds.

(Excerpt) Read more at motherboard.vice.com ...


TOPICS: Crime/Corruption; Government; News/Current Events
KEYWORDS: apple; appleiphone; applepinglist; iphone; police; privacy; security
Navigation: use the links below to view more comments.
first 1-2021-31 next last

1 posted on 06/15/2018 3:34:22 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

OK, so eliminate the hour. Make it necessary for the phone to be in unlocked state when attaching a USB device.


2 posted on 06/15/2018 3:39:56 PM PDT by PapaBear3625 (Go go Godzilla)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
Cellebrite and GreyShift, maker of GreyBox, are telling police agencies they are confident their devices breaking iOS security on iPhones and iPads will continue to work after Apple upgrades the Lightning port to only accept data access after the passcode has been input for one hour. The only way it COULD STILL possibly work is if the breaking devices connected to the port could unlock the iPhone during the single hour available for data use after it had been been unlocked with a passcode, otherwise, neither one of them could pass any data at all in or out through the lightning port. —PING!


Apple iOS Security and Privacy Ping!

If you want on or off the Mac Ping List, Freepmail me.

3 posted on 06/15/2018 3:46:23 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PapaBear3625
OK, so eliminate the hour. Make it necessary for the phone to be in unlocked state when attaching a USB device.

Might not be a bad idea.

4 posted on 06/15/2018 3:47:55 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

The Russians have already probably figured out a way to hack it.


5 posted on 06/15/2018 3:50:34 PM PDT by BBell (not drinking, just a smart a$$)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I don’t use a passcode with my iphone. so what does this mean for me?


6 posted on 06/15/2018 4:04:58 PM PDT by SendShaqtoIraq
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

At my company Apple needs to be contacted. They get back to us in 2 to 10 days. Grayshift does this in 10 minutes or less...


7 posted on 06/15/2018 4:12:31 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

To: SendShaqtoIraq
I don’t use a passcode with my iphone. so what does this mean for me?

You don't trade nude photos with Anthony Weiner? Probably means you don't have data to speak of on your phone.

Most of us with smart phones have financial info like account numbers, credit card numbers, and other contact info relevant to our well-being. I would not want anyone to be able to drain my bank accounts, or mess with my financial well-being. Nor would I want anyone pretending to be me trying to interact with my family and friends. Imagine what a bad person could do if they spoofed being you?

8 posted on 06/15/2018 4:39:56 PM PDT by roadcat
[ Post Reply | Private Reply | To 6 | View Replies]

To: minnesota_bound

At my company Apple needs to be contacted. They get back to us in 2 to 10 days. Grayshift does this in 10 minutes or less...


Apple might have a few more customers than Grayshift...


9 posted on 06/15/2018 4:49:25 PM PDT by hanamizu
[ Post Reply | Private Reply | To 7 | View Replies]

To: PapaBear3625
OK, so eliminate the hour. Make it necessary for the phone to be in unlocked state when attaching a USB device.

However, if one uses a six digit numeric passcode, it takes more than an hour for any of the unlocking schemes to find the passcodes. The iOS device's Lightning port will stop passing data after an hour, thereby stopping the unlocking device dead in its tracks. The only devices still vulnerable would be those they could get a search warrant within an hour that had only a four digit passcode.

Times to crack an iPhone Passcode using brute force with GreyBox:

Best choice is to select complex passcode and use a mix of numbers, upper and lowercase letters, and symbols. For example: T5#v@&8>

While an 8 digit number has 10,000,000 possible combinations of a set of ten numbers of 0 to 9 in each position, 108, a combination of letters, numbers and the characters available on the iOS keyboard is much larger. There are 223 numbers, upper and lower case alphabetic characters plus foreign characters, and symbols available from the virtual keyboard on an iOS device. Thus the potential passcode combinations are 2238, or slightly more than 6.1 quintillion possible passcode combinations.

Given the 92 days worst case scenario to crack an 8 digit numeric passcode, a complex alphanumeric plus symbol passcode using the GreyBox would require a mere 152.8 BILLION years to crack. . . even now.

But 8 digits is overkill for what's really necessary. . . I think the time to crack a six character complex passcode would be sufficient. That has only 123 Quadrillion possible passcodes which the Greybox would need to crack. That would take only 1.5 million years or so to crack the average case six character passcode, not even the worst case passcode of 7 million years. . . before Apple does the upgrade at the end of this month.

A five character complex passcode has ~551,470,000,000 possible passcodes. That would take about 13,800 years in the worst case scenario or around 6,500 years in the average case.

Use that and I don't think we'd have much to worry about before the authorities or bad guys get at our private stuff.

10 posted on 06/15/2018 4:51:19 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: BBell
The Russians have already probably figured out a way to hack it.

The Russians haven't before. Both of the solutions here have come our of Israel.

11 posted on 06/15/2018 5:06:59 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: SendShaqtoIraq
I don’t use a passcode with my iphone. so what does this mean for me?

If you don't you should. Without a passcode and someone steals your iPhone or you lose it, they have access to everything. You can't lock it or brick it.

12 posted on 06/15/2018 5:08:16 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: minnesota_bound
At my company Apple needs to be contacted. They get back to us in 2 to 10 days. Grayshift does this in 10 minutes or less...

BS. Minnesota_Bound. Grayshift only sells to law enforcement. . . they don't sell to "companies."

I manage a company that calls Apple and we are connected immediately, never a hold, or a wait of more than a couple of minutes to talk to a human being in the US.

Grayshift doesn't NEED to call back if you've bought their product. It's either in your police department, or it's on line for you.

Quit lying.

13 posted on 06/15/2018 5:13:19 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

Onlu use 6 digits on both my phones BUT 4TH wrong entry bricks the phone permanently....you learn to pay attention

Secondly, i can remote wipe either in about 30 seconds from any other phone


14 posted on 06/15/2018 5:14:50 PM PDT by Manuel OKelley
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

The Russians use free lance hackers. They must not have the Israeli hackers on their payroll yet.


15 posted on 06/15/2018 5:18:54 PM PDT by BBell (not drinking, just a smart a$$)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

That description of the passcodes was simply elegant. Other than account numbers etc, I don’t have anything fun to steal. No naked 13 year olds on Epstein Island, no delivery records of my cocaine shipments, no connections to the Baeder Meinhoff gang, etc.
So I don’t see the FBI needing to attack my phone, but those passcodes are simply elegant.

Unless of course saying something defiant or scornful or rude on FR becomes a crime. Then I’ll be on the run I guess.


16 posted on 06/15/2018 6:06:32 PM PDT by DesertRhino (Dog is man's best friend, and moslems hate dogs. Add that up. ....)
[ Post Reply | Private Reply | To 10 | View Replies]

To: PapaBear3625

Exactly. Or allow the user to make it a selectable, shorter time. Like when the screen saver kicks in.


17 posted on 06/15/2018 6:34:38 PM PDT by Secret Agent Man ( Gone Galt; Not averse to Going Bronson.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

We do not use Grayshift nor did I say. If you read the article you would have understood this.


18 posted on 06/15/2018 8:49:51 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker
However, if one uses a six digit numeric passcode, it takes more than an hour for any of the unlocking schemes to find the passcodes. The iOS device's Lightning port will stop passing data after an hour, thereby stopping the unlocking device dead in its tracks.

I'm still failing to understand why Apple would provide the ability to pass in the unlocking password via USB, rather than manually at the screen. Or why Apple would continue to allow password attempts at USB speed after a small number of attempts.

19 posted on 06/16/2018 4:23:34 AM PDT by PapaBear3625 (Go go Godzilla)
[ Post Reply | Private Reply | To 10 | View Replies]

To: PapaBear3625

I’m not sure why Apple allows any access when the phone is locked. When I plug my phone in, I have no access to any files on the phone until I unlock it. Then, the internal/external SD cards show up in my computer.


20 posted on 06/16/2018 8:53:48 AM PDT by Svartalfiar
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson