Free Republic
Browse · Search
News/Activism
Topics · Post Article

It took them awhile, but iOS 13 will be out soon and will block it again. This means if you are really concerned about your iPhone/iPad security, use an alphanumeric and symbolic passcode of at least seven characters. This will block even Cellebrite’s system from cracking into your device. Cellebrite still uses a brute force approach to find your passcode, but we are talking about ~869,600,000 years to try all possible combinations of just seven characters of the 223 available from the iPhone’s virtual keyboard at one attempt every second. If I recall correctly, even bypassing the countdown clock, the Secure Enclave limits each attempt to 1.4 seconds so it’s even longer than that. Perhaps you could get by with only six, if you want them to give up during the life span of the Age, only ~3,900,000 years.
1 posted on 06/19/2019 7:36:21 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
Cellebrite claimed they can again break into iPhones and iPads. Now iOS 12.3 vulnerable. . . —PING!


APPLE SECURITY PING!

If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.

2 posted on 06/19/2019 7:39:52 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

So you are claiming Cellebrite can’t try all the same numbers and letters on iOS 12.3.1?


3 posted on 06/19/2019 7:43:13 PM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

It’s a mystery to me that more people don’t use (more than six) alpha/numeric/symbol characters in their passcode. It just takes a couple seconds longer.


4 posted on 06/19/2019 8:03:16 PM PDT by House Atreides (Boycott the NFL 100% — PERMANENTLY)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker; All
Folks, what Swordmaker does not understand is that what Cellebrite is using is not brute force on anything iOS 12.3 and under, but it’s using exploits against vulnerabilities.

In short, even if you have a 20 character password, the exploit gets around that.

Brute force is only used when exploits do not allow cracking the phone.

6 posted on 06/19/2019 8:34:03 PM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

check .... iOS 13 ? When ?


7 posted on 06/19/2019 8:43:15 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I imagine from the first second a new iPhone or updated iOS system is out, someone somewhere is throwing everything they have at it...just so they can tweet out that they’ve broken it.


8 posted on 06/19/2019 8:44:51 PM PDT by moovova
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I’m curious how their brute force attack can even run - since iOS flips its lid after only a few incorrect attempts...


18 posted on 06/19/2019 10:55:08 PM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Celebrite requires the user to have physical access to the phone.

Apple provides a way for the user to erase the phone before surrendering it, but it takes some time to execute.

The Find iPhone app allows for the user to remotely erase the phone, providing the phone is on and still connected to a network.

Apple also allows the user to set the phone for automatic erasure after 10 failed passcode attempts, which will defeat any brute force attack.

Compared to the rest of the market, Mac OS and iOS devices are damnably difficult to hack. Market prices for successful exploits reflect this. Apple exploits are orders of magnitude more costly.

HOWEVER, the Achilles heel for ALL devices using cellular communications is the Control Channel in cellular communications systems. To allow for roaming and interoperability among various vendors and systems, it is wide-open, unsecured, simple to access, and readily comprehended.

Those vulnerabilities will not permit access to your device, but they can monitor, capture, and spoof all incoming and outgoing traffic, as well as track your location.

There is nothing Apple, or any other cell phone vendor can do to close those vulnerabilities. They are the responsibility of the cellular providers, who have no real incentive to fix them.


19 posted on 06/20/2019 6:04:17 AM PDT by Natty Bumppo@frontier.net (We are the dangerous ones, who stand between all we love and a more dangerous world.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson