Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Blueflag
"Obviously ‘someone’ knows how to get past 256 encryption when the key is missing/removed."

I doubt its anything like that. What is most likely is that they cloned(Nand Cloned?) the entire contents of the phone and emulated it in a virtual machine. They try 10 tries at the pin, if it bricks, they kill the virtual machine and spawn a new one. Rinse, repeat until they get a valid pin.

Clearly it takes some pretty sophisticated techniques to accomplish this but it's faster than trying to brute force a 256bit key, which it's essentially impossible as we know it today.

28 posted on 03/28/2016 6:04:44 PM PDT by Malsua
[ Post Reply | Private Reply | To 24 | View Replies ]


To: Malsua

Might be a novel way - create ‘billions’ of virtual machines and brute force them. You don’t need to copy the data, just enough of the OS and the keystore ... until one opens. Create and discard in a ‘wave’ as they brick, freeing up prior disk space and processor power.

Finally you guess right ad win the PowerBall.

Probably could be done on a few terabytes of fast solid state disk space and an obscene amount of RAM.

Clever.

I like the way you think ...


29 posted on 03/28/2016 6:09:58 PM PDT by Blueflag (Res ipsa loquitur: non vehere est inermus)
[ Post Reply | Private Reply | To 28 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson