Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Judge Orders Apple to Help the FBI Hack San Bernardino Shooter's iPhone
gizmodo ^ | 02/16/2016 | Chris Mills

Posted on 02/16/2016 7:16:12 PM PST by BenLurkin

According to the AP, it mandates Apple to supply the FBI with software that would prevent the iPhone from being permanently locked after too many unsuccessful password attempts.

Apple has long maintained that following iOS 8, it can’t access information on a passcode-encrypted device. This ruling is kind of a way around that: it’s not mandating Apple to break the encryption per se, just help the FBI with what I assume is a very boring brute-force attack. Let’s just hope the passcode isn’t 1234.

(Excerpt) Read more at gizmodo.com ...


TOPICS: Computers/Internet
KEYWORDS: apple; california; farook; fbi; iphone; sanbernadino; sanbernardino; waronterror

1 posted on 02/16/2016 7:16:12 PM PST by BenLurkin
[ Post Reply | Private Reply | View Replies]

To: BenLurkin

This judge is a moron.

L


2 posted on 02/16/2016 7:18:00 PM PST by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker

It’s called a subpoena.. big deal... I work in IT Security - we do it all the time.. Apple has procedures for this just like everyone else.. this is not news...


3 posted on 02/16/2016 7:21:49 PM PST by acw011 (Great Goooogly Mooogly!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Lurker

Why?


4 posted on 02/16/2016 7:22:25 PM PST by Steven Scharf
[ Post Reply | Private Reply | To 2 | View Replies]

To: BenLurkin

Look for the “government needs a back door” crowd to cite this.


5 posted on 02/16/2016 7:23:19 PM PST by Rurudyne (Standup Philosopher)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

Here is a comment I swiped from tele1234 on the AppleInsider site.

“I don’t think so. Apple uses a dedicated chip to store and process the encryption. They call this the Secure Enclave. The secure enclave stores a full 256-bit AES encryption key.

“Within the secure enclave itself, you have the device’s Unique ID (UID) . The only place this information is stored is within the secure enclave. It can’t be queried or accessed from any other part of the device or OS. Within the phone’s processor you also have the device’s Group ID (GID). Both of these numbers combine to create 1/2 of the encryption key. These are numbers that are burned into the silicon, aren’t accessible outside of the chips themselves, and aren’t recorded anywhere once they are burned into the silicon. Apple doesn’t keep records of these numbers. Since these two different pieces of hardware combine together to make 1/2 of the encryption key, you can’t separate the secure enclave from it’s paired processor.

“The second half of the encryption key is generated using a random number generator chip. It creates entropy using the various sensors on the iPhone itself during boot (microphone, accelerometer, camera, etc.) This part of the key is stored within the Secure Enclave as well, where it resides and doesn’t leave. This storage is tamper resistant and can’t be accessed outside of the encryption system. Even if the UID and GID components of the encryption key are compromised on Apple’s end, it still wouldn’t be possible to decrypt an iPhone since that’s only 1/2 of the key.

“The secure enclave is part of an overall hardware based encryption system that completely encrypts all of the user storage. It will only decrypt content if provided with the unlock code. The unlock code itself is entangled with the device’s UDID so that all attempts to decrypt the storage must be done on the device itself. You must have all 3 pieces present: The specific secure enclave, the specific processor of the iphone, and the flash memory that you are trying to decrypt. Basically, you can’t pull the device apart to attack an individual piece of the encryption or get around parts of the encryption storage process. You can’t run the decryption or brute forcing of the unlock code in an emulator. It requires that the actual hardware components are present and can only be done on the specific device itself.

“The secure enclave also has hardware enforced time-delays and key-destruction. You can set the phone to wipe the encryption key (and all the data contained on the phone) after 10 failed attempts. If you have the data-wipe turned on, then the secure enclave will nuke the key that it stores after 10 failed attempts, effectively erasing all the data on the device. Whether the device-wipe feature is turned on or not, the secure enclave still has a hardware-enforced delay between attempts at entering the code: Attempts 1-4 have no delay, Attempt 5 has a delay of 1 minute. Attempt 6 has a delay of 5 minutes. Attempts 7 and 8 have a delay of 15 minutes. And attempts 9 or more have a delay of 1 hour. This delay is enforced by the secure enclave and can not be bypassed, even if you completely replace the operating system of the phone itself. If you have a 6-digit pin code, it will take, on average, nearly 6 years to brute-force the code. 4-digit pin will take almost a year. if you have an alpha-numeric password the amount of time required could extend beyond the heat-death of the universe. Key destruction is turned on by default.

“Even if you pull the flash storage out of the device, image it, and attempt to get around key destruction that way it won’t be successful. The key isn’t stored in the flash itself, it’s only stored within the secure enclave itself which you can’t remove the storage from or image it.

“Each boot, the secure enclave creates it’s own temporary encryption key, based on it’s own UID and random number generator with proper entropy, that it uses to store the full device encryption key in ram. Since the encryption key is also stored in ram encrypted, it can’t simply be read out of the system memory by reading the RAM bus.

“The only way I can possibly see to potentially unlock the phone without the unlock code is to use an electron microscope to read the encryption key from the secure enclave’s own storage. This would take considerable time and expense (likely millions of dollars and several months) to accomplish. This also assumes that the secure enclave chip itself isn’t built to be resistant to this kind of attack. The chip could be physically designed such that the very act of exposing the silicon to read it with an electron microscope could itself be destructive.

“It comes down to: “Do you want to allow criminals to access your iPhone so that law enforcement can also access a criminal’s iPhone?” I certainly don’t.

“The feds would get further doing some social engineering on the guy, or building one of these.”

This commenter really knows his stuff!


6 posted on 02/16/2016 7:24:11 PM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin
IF THE FOURTH AMENDMENT DOESN'T MEAN THINGS CAN BE ACCESSED BY A WARRANT IT DOESN'T MEAN ANYTHING.
7 posted on 02/16/2016 7:25:44 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

Based on this description, I would say that the FBI is SOL o this one.


8 posted on 02/16/2016 7:34:33 PM PST by SubMareener (Save us from Quarterly Freepathons! Become a MONTHLY DONOR!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: BenLurkin

If Apple is following their own declared encryption protocols, they can’t help the FBI at all, unless they just make some of their supercomputers available for brute force number crunching. Though I rather imagine that NSA has capabilities in that area that they don’t want anyone to know about.


9 posted on 02/16/2016 7:42:06 PM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Talisker

Wouldn’t surprise me if this phone was cracked weeks ago, and this fiction was created to lull the accomplices into a false sense of security.


10 posted on 02/16/2016 7:44:47 PM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: BenLurkin

The FBI is interested in the San Bernadino shooter’s iPhone? Is this the same FBI that never bothered to secure the shooter’s apartment or secure the evidence in the apartment? The apartment which the media then ransacked and contaminated. That FBI? I don’t know who is more incompetent, the FBI, the media attempting to report this story, or the judge who is clueless about encryption.


11 posted on 02/16/2016 7:45:59 PM PST by Flick Lives (One should not attend even the end of the world without a good breakfast. -- Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

President Skroob:
“1, 2, 3, 4, 5? That’s amazing! I’ve got the same combination on my luggage!”


12 posted on 02/16/2016 8:19:38 PM PST by 2CAVTrooper (Democrats... BETRAYING America since 1828.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

First, I very much enjoyed your explanation. Second, I have a nutty idea. If the psychotic moslems still lived in crapistan, we wouldn’t need to decrypt the phone.


13 posted on 02/16/2016 8:21:25 PM PST by DesertRhino ("I want those feeble minded asseLike this s overthrown,,,")
[ Post Reply | Private Reply | To 6 | View Replies]

To: DesertRhino

Read my post - I stole the text from another site, and gave full credit to the original author.


14 posted on 02/16/2016 8:23:32 PM PST by proxy_user
[ Post Reply | Private Reply | To 13 | View Replies]

To: mrsmith

Your shouting message I assume means you believe that the 4th amendment means the cops have a right to succeed?

A warrant just gives them a right to search your house. A warrant does not mean you have to give them the front door key or assist them in ANY way, whatsoever. They can beat down the door. They can jimmy the lock. They can try everything.
But they cannot make you open the door, and they cannot make a law that you cannot put a very tough modern lock on your door.

But this control freak government thinks it has a god given right to every single personal scrap on data and information in the country.


15 posted on 02/16/2016 8:30:40 PM PST by DesertRhino ("I want those feeble minded asseLike this s overthrown,,,")
[ Post Reply | Private Reply | To 7 | View Replies]

To: proxy_user

Got it, thanks anyway sir.


16 posted on 02/16/2016 8:31:46 PM PST by DesertRhino ("I want those feeble minded asseLike this s overthrown,,,")
[ Post Reply | Private Reply | To 14 | View Replies]

To: Steven Scharf

Because Apple is unable to “hack” any of their products. So he’s ordering them to turn over copyrighted source code. Apple should fight this all the way to SCOTUS and beyond if necessary.

L


17 posted on 02/17/2016 8:22:15 AM PST by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 4 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson