Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Secret Memo Details U.S.’s Broader Strategy to Crack Phones (Link Only Due to Copyright concerns)
Bloomberg Business | February 19, 2016 — 2:00 AM PST | By Michael Riley

Posted on 02/20/2016 10:09:42 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-135 last
To: palmer

One small correction, often the IMEI is printed right on the SIM. So the FBI would not have to ask Verizon to look it up in the their database, they would simply remove the SIM and read it. But the point still stands the IMEI is not tied to the terrorist’s phone, it is tied to the terrorist’s SIM card. If Apple writes an security-bypass update tied to the IMEI, then FBI can put that SIM into any other phone and run Apple’s update on that phone. Either FBI personnel who wrote the court order are very stupid or they think the rest of us are too stupid to notice that.


121 posted on 02/22/2016 4:13:44 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 89 | View Replies]

To: Ray76
Those services use the device UID to ensure that only the latest versions are downloaded, and downloaded only once.

That is not correct. The UID never leaves the phone and in fact never leaves a small section of code running in flash.

It would be very easy to place the subject device and a server on their own network and provide updates to either the Low-Level Bootloader or iBoot, which ever counts the sign-on attempts. Rather than incrementing the counter every sign-on attempt, set it to 1.

The sign-on attempt counter is not maintained by the boot loader or any other part of the boot code. As you know, the passcode is entered and processed only after the phone is booted. Your suggestion is sort of interesting in one aspect which is to install a special bootloader to reset the attempt counter. Even if that were possible (which is doubtful), the FBI requests a passcode tester that works after the phone is booted. They do not want to reboot the phone for each test, that would be much too slow.

122 posted on 02/22/2016 4:20:40 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 98 | View Replies]

To: Swordmaker; Ray76
Ray76: The key is stored. It can be retrieved

Sword: What part of "The KEY IS NOT STORED ON THE DEVICE" do you fail to understand?????

Chill. The key is stored, but it is encrypted. See the link from my previous post. The way the key is recovered (decrypted) is by the process that Swordmaker described. That process can only be performed on the device with the correct UID (burned into HW) and correct passcode. Therefore retrieving the key alone is useless.

123 posted on 02/22/2016 4:26:16 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 102 | View Replies]

To: DesertRhino

It must be pretty secure. I have never been able to access my data on I cloud


124 posted on 02/22/2016 4:28:35 AM PST by bert ((K.E.; N.P.; GOPc;+12, 73, ....carson is the kinder gentler trump.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker; Ray76
A one-way HASH is a numerical representation of the KEY, sort of like a checksum, that is calculated FROM the key and it is ONE-WAY in that you cannot DERIVE THE KEY in any way from knowing the HASH. THAT is what is stored on the iOS device, not the KEY itself, Ray.

Just to reiterate, the AES key protecting the user's data is stored on the device but it is encrpyted and useless until it is decrypted. The way it is decrypted is a complex algorithm (complex so it can't be cryptoanalyzed). That algorithm requires the hash of the passcode (it is a salted hash for more security) and the UID burned into the HW. That way even if the key is retrieved it cannot be decrypted outside the phone by someone like the FBI.

125 posted on 02/22/2016 4:30:35 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 109 | View Replies]

To: Ray76
I've noticed that you are very good at research, and you seem to have access to methods of accomplishing this which are beyond me.

I have been meaning to ask you if it might be possible for you to find a piece of information.

Some years ago, I read that Thomas Jefferson heavily consulted Vattel's law of Nations when writing the Declaration of Independence. I read that either Jefferson's copy of the Declaration is heavily littered with notes on Vattel, or that Jefferson's personal copy of "Droit des Gens" is heavily littered with notes on the Declaration. (I don't remember which it was.)

I have been trying to corroborate this piece of information, because if it can be demonstrated to be true, it solidifies the argument that Vattel's definition of the word "citizen" is the one which was intended when the Declaration of Independence was written.

Do you have an corroboration for whether or not Jefferson wrote notes linking "Droit des Gens" with the Declaration?

126 posted on 02/22/2016 7:01:32 AM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 114 | View Replies]

To: Ray76

Actually Swordmaker and others have shown incredible patience as they logically dissected and rebutted your arguments.

What I find curious is that you utterly and completely refuse to criticize or even comment on the real cause of this mess - incompetent govt at all levels. Your belief in court orders borders on religous fanaticism. A person previously associated with the govt might have a bias toward ignoring its failings in all aspects of this terrorist attack.

Swordmaker and others, myself included, have pointed out that Apple was cooperating at trying to get the data onto the cloud when they were sabotaged by previous evidence tampering by the govt. Are those responsible for the tampering going to be fired or prosecuted?

Without the accidental [sic] tampering there would be no legal case with all its wonderful PR connotations that the govt is on one side while Apple and privacy supporters are siding with terrorists. The 35 page filing does come across as snarky and undignified - perhaps PR.


127 posted on 02/22/2016 8:31:35 AM PST by DuhYup
[ Post Reply | Private Reply | To 105 | View Replies]

To: Swordmaker

Apple vs. FBI: 9 Updates in the Fight Over a Killer’s Locked iPhone
MEDIA | By Joan E. Solsman on February 22, 2016 @ 5:26 pm

http://www.thewrap.com/apple-vs-fbi-9-updates-fight-locked-iphone/


128 posted on 02/22/2016 8:40:38 PM PST by Grampa Dave (Trump the lying RNC/GOPe Open Borders elite thugs! Say no to their candidates! faGo TRUMP!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: palmer
On the issue of unique id's, swordmaker is correct that there is no JTAG access. Not sure where that came from, but it's a red herring.

Thanks for the information that furthered mine. The JTAG was brought up in a quotation that Ray posted. . . so I challenged if he even knew what it was. I knew he didn't know it was a way to poll the silicon to test for function, etc. He tossed it out trying to show he was "ept" when he really wasn't. The point apparently was that it could be a means of finding the code or UID and GID, etc., when Apple had already anticipated that.

My understanding is that to get a true random number seed, Apple has used the microphone, camera, and accelerometer sensors to poll when the AES encryption is first generated to get input to put into the random number generator. To be assured of re-creating the same thing later, they store that seed that was created in the same location the HASHes are stored.

129 posted on 02/22/2016 11:04:09 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIDinue....)
[ Post Reply | Private Reply | To 119 | View Replies]

To: DuhYup
Actually Swordmaker and others have shown incredible patience as they logically dissected and rebutted your arguments.

Thanks DuhYup

130 posted on 02/23/2016 12:00:30 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIDinue....)
[ Post Reply | Private Reply | To 127 | View Replies]

To: Swordmaker

That makes sense. The best way to get a cryptographically sound random key is to pull in high entropy sources like noise in microphones or noise in camera CMOS sensors. Basically make it impossible for an adversary to recreate. If they store that as a seed for a pseudorandom number generator that would be a sound way of restoring the AES key when it is needed.


131 posted on 02/23/2016 2:52:23 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 129 | View Replies]

To: Swordmaker

Microsoft founder Gates backs FBI in encryption fight with Apple

Published February 23, 2016 FoxNews.com
Facebook539 Twitter0 livefyre Email Print

The clash between Apple and FBI heats up

Microsoft founder Bill Gates has broken with other Silicon Valley giants by backing the FBI in its battle with Apple over hacking into a locked iPhone as part of the investigation into last December’s San Bernardino terror attack.

In an interview with the Financial Times published Tuesday, Gates said a court order requiring Apple to help the FBI access a work phone belonging to gunman Syed Farook was “ a specific case where the government is asking for access to information. They are not asking for some general thing, they are asking for a particular case.”

Gates went on to compare the FBI request to accessing bank and telephone records. However, he added that the government must be subject to rules about when it can access such information.

I hope that we have that debate so that the safeguards are built and so people do not opt, and this will be country by country. [to say] it is better that the government does not have access to any information. Gates said.

The San Bernardino County-issued iPhone 5C was used by Farook, who with his wife, Tashfeen Malik, killed 14 people at an office holiday party in December before they died in a gun battle with police. The government said they had been at least partly inspired by ISIS.

http://www.foxnews.com/tech/2016/02/23/microsoft-founder-gates-backs-fbi-in-encryption-fight-with-apple.html


132 posted on 02/23/2016 7:30:25 AM PST by Grampa Dave (Trump the lying RNC/GOPe Open Borders elite thugs! Say no to their candidates! Go TRUMP!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: palmer
That makes sense. The best way to get a cryptographically sound random key is to pull in high entropy sources like noise in microphones or noise in camera CMOS sensors. Basically make it impossible for an adversary to recreate. If they store that as a seed for a pseudorandom number generator that would be a sound way of restoring the AES key when it is needed.

The problem with any computer is finding a way to generate a truly random number when one needs one that is not some how infected with a human's biases toward something. Even this method has a built in bias against low random numbers simply because it uses three or more inputs and combines the sampled "noise" which will result in a seed that inherently will result in a random number seed higher than what a truly random number could be if you accept that a truly random number could include "1" in its set. That choice was human based in its bias toward larger random number seeds, but it's certainly an acceptable bias.

133 posted on 02/23/2016 10:01:52 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIDinue....)
[ Post Reply | Private Reply | To 131 | View Replies]

To: Grampa Dave
Microsoft founder Gates backs FBI in encryption fight with Apple

This is called a "Appeal to authority" fallacy. Bill Gates has no standing to have an opinion more than any other individual, he's retired from Microsoft, but his fortune would be increased by any improvement in the competitive environment if Apple were taken down a peg or two.

I am curious what his take would be if Farook had been using a County Issued Windows Phone?

134 posted on 02/23/2016 10:06:18 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIDinue....)
[ Post Reply | Private Reply | To 132 | View Replies]

To: Swordmaker
The probability distribution of those sources may not be even, and you want to have as close to white noise (uniform distribution) as possible or a completely even chance of any number in the range being picked. There are a few tricks to make distributions more even, the main one is hashing since hash output is uniform.

Now I see wikipedia lists hashes as one of the "Software whitening" tricks to make random numbers more uniform. But it is certainly a nontrivial issue and hashing is not the first choice.

135 posted on 02/23/2016 5:37:44 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 133 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-135 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson