Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: palmer
On the issue of unique id's, swordmaker is correct that there is no JTAG access. Not sure where that came from, but it's a red herring.

Thanks for the information that furthered mine. The JTAG was brought up in a quotation that Ray posted. . . so I challenged if he even knew what it was. I knew he didn't know it was a way to poll the silicon to test for function, etc. He tossed it out trying to show he was "ept" when he really wasn't. The point apparently was that it could be a means of finding the code or UID and GID, etc., when Apple had already anticipated that.

My understanding is that to get a true random number seed, Apple has used the microphone, camera, and accelerometer sensors to poll when the AES encryption is first generated to get input to put into the random number generator. To be assured of re-creating the same thing later, they store that seed that was created in the same location the HASHes are stored.

129 posted on 02/22/2016 11:04:09 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contIDinue....)
[ Post Reply | Private Reply | To 119 | View Replies ]


To: Swordmaker

That makes sense. The best way to get a cryptographically sound random key is to pull in high entropy sources like noise in microphones or noise in camera CMOS sensors. Basically make it impossible for an adversary to recreate. If they store that as a seed for a pseudorandom number generator that would be a sound way of restoring the AES key when it is needed.


131 posted on 02/23/2016 2:52:23 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 129 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson