Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Ray76
The key is stored. It can be retrieved.

What part of "The KEY IS NOT STORED ON THE DEVICE" do you fail to understand?????

How many times do you have to be told that very simple fact before it sinks into what is becoming obvious is a very THICK SKULL?

This is one more thing you think you know that you don't.

102 posted on 02/21/2016 9:51:31 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 93 | View Replies ]


To: Swordmaker

> “The KEY IS NOT STORED ON THE DEVICE”

Really? Apple says otherwise. In fact, YOU said otherwise:

The UID, a Device Group ID (GID), and the user’s input passcode all make up only HALF of the AES key. The other HALF is made up of initially read random inputs from the camera, microphone, and accelerometer, as well as other sensors at the first startup which are combined by an algorithm and then stored for use thereafter. Those stored random inputs are combined with the UID, GID, and user’s Passcode, all entangled to actually create the large alphanumeric and symbol KEY for the encryption, from which a comparison HASH is made and stored.

http://www.freerepublic.com/focus/news/3399810/posts?page=84#84


104 posted on 02/21/2016 10:16:37 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 102 | View Replies ]

To: Swordmaker

If you are unable to discuss things civilly then the discussion is over.


105 posted on 02/21/2016 10:17:38 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 102 | View Replies ]

To: Swordmaker; Ray76
Ray76: The key is stored. It can be retrieved

Sword: What part of "The KEY IS NOT STORED ON THE DEVICE" do you fail to understand?????

Chill. The key is stored, but it is encrypted. See the link from my previous post. The way the key is recovered (decrypted) is by the process that Swordmaker described. That process can only be performed on the device with the correct UID (burned into HW) and correct passcode. Therefore retrieving the key alone is useless.

123 posted on 02/22/2016 4:26:16 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 102 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson