Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple can’t decrypt your iPhone: Why it matters
MacWorld.com ^ | Nov 3, 2015 4:00 AM | By Glenn Fleishman

Posted on 11/03/2015 3:25:33 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-28 last
To: dennisw
Actually the NSA has some supercomputers that I believe can break any decryption. Its just that it takes time and hogs the computer and they want it to be easier.

No, DennisW, the current state of the art of supercomputers does not have the capability to break 256 bit AES encryption by any known means. The only known means of breaking such a cypher is brute force, trying every possible key until the right key is found. No known algorithm which can find that key by any known mathematical means . . . no one has found such a means. Your belief does not make it so. I am not going to repeat the proof and the math again, but even a supercomputer that can try 3 trillion possible keys a year. . . or even multiply that by 3 trillion times, you are still talking about time not even geographical time scale but on an cosmological time scale. If we stick to the 3 trillion possible keys per year capability of supercomputers available to us today, the time scale is currently 5.62 undecillion (5.62 X 10195) years, for such a supercomputer to try every possible key in a 256 bit AES encryption.

In other words, it is not even possible to do.

21 posted on 11/03/2015 6:14:55 PM PST by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Swordmaker

Your assumption that brute force is the only way to break the encryption is flawed.


22 posted on 11/03/2015 8:21:42 PM PST by Henry Hnyellar
[ Post Reply | Private Reply | To 21 | View Replies]

To: Swordmaker
Swordmaker said: "In other words, it is not even possible to do. "

I understand what you are saying about 256-bit AES encryption.

Is that the level of encryption protecting a user's data on a newer iphone?

My wife's iphone requires her to enter a 4 digit PIN number to start. That is certainly not 256 bits. How would she make use of this very strong encryption as described in this article?

23 posted on 11/03/2015 8:26:41 PM PST by William Tell
[ Post Reply | Private Reply | To 21 | View Replies]

To: Swordmaker

I’m reading this document which will probably educate me in this matter:
https://www.apple.com/business/docs/iOS_Security_Guide.pdf


24 posted on 11/03/2015 8:54:16 PM PST by William Tell
[ Post Reply | Private Reply | To 21 | View Replies]

To: William Tell
Is that the level of encryption protecting a user's data on a newer iphone?

The data on iPhones and other iOS 8 and iOS 9 devices have been encrypted to AES 256 bit encryption since Apple started using those versions. It doesn't matter what level of passcode you are using to unlock your iPhone or iPad. Whether you use 4 or 6 numbers, or choose to use a more complex passcode of alphanumeric characters with other symbols, the passcode you use will be entangled with a 128 character UUID that is imbedded inside the A8 or A9 processor of the device. That passcode and UUID are used to construct the 256 bit AES key to encrypt the data.

If she wants a more complex passcode, go into settings, TouchID and Passcode, you'll be required to enter your current passcode, then select passcode options, again you'll have to enter your current passcode, you can then select from four digit, six digit, or complex pass code options. You can then change your wife's passcode, after selecting your option.

25 posted on 11/03/2015 8:57:42 PM PST by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 23 | View Replies]

To: William Tell
I’m reading this document which will probably educate me in this matter:

For instructions on how to reset your passcode, this is like using an A-bomb to swat a fly. . . LOL! It is a good start to understand Apple's concepts of security though. There are other papers that go into more depth. This is a very good one for an over view, though.

26 posted on 11/03/2015 9:07:56 PM PST by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker

Thanks. I am not going to argue with you on that!!! For sure. So when the US Government cannot break Apple encryption then this is literally true. It just cannot be broken except maybe with some good luck in a brute force attempt....


27 posted on 11/04/2015 5:09:52 PM PST by dennisw (The first principle is to find out who you are then you can achieve anything -- Buddhist monk)
[ Post Reply | Private Reply | To 21 | View Replies]

To: dennisw
It just cannot be broken except maybe with some good luck in a brute force attempt....

I think the modifier "good" is a bit too weak for the kind of luck they would need. . . "miraculous" would be more useful modifier to the word "luck" in this instance, or "totally unbelievable," or "downright f'ing faked" luck, would be more likely, when you are looking at those kinds of cosmologically huge time frames.

28 posted on 11/04/2015 5:43:07 PM PST by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 27 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-28 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson