“Apple offers a product that they do not hold the ability to unlock because the user alone knows how to unlock it.”
BS
Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.
BS
Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.
Well then, the USofA Givernment can unlock the phone themselves...
Apple offers a product that they do not hold the ability to unlock because the user alone knows how to unlock it.
.................................................
BS
Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.
*************************************************
Right. Then Im sure NSA will be right on it. /sarc
Yeah, but that costs a fortune.
OK for ‘national security” but far beyond the means of a person in a typical case.
And ‘typical cases’ are what matter in law IMO.
Funny.
Some friends are involved in a ‘typical case’, and everyone wants their phones contents used for evidence!
No, unfortunately neither Apple nor the NSA has that ability, even with the fastest supercomputer extant to date, or even a quantum computer. You obviously do not grasp the nature of single key encryption which is what is used on Apple iOS devices.
256bit AES encryption with a complex key such as an iOS device constructs from the users passcode, an internal device ID, a device model ID, and a completely random number generated from environmental variables when the actual encryption key was first generated (also stored in an inaccessible internal Secure Enclave inside the encryption engine) results in a variable length key that can be made up of any of the 223 characters available in the Apple virtual keyboard, and can be as long as 256 characters in length. Thats a huge encryption key. . . and it is NOT stored anywhere on the device where it could be found and read.
Thats means it is possible to have 223256 number of possible keys and only one will decipher the data.
Whats more, Mariner, the system is designed so you must try each key on the device. You have only ten tries before the data is erased. . . completely. No shadow data left to recover.
Using a hypothetical supercomputer that could try and test 50,000 keys per second, checking for readable data with each test, it would require 6.25 X 10195 years to try all possible keys. Lets multiply the speed of our hypothetical supercomputer by one trillion times. Youd think it would get done a lot faster and youd be right. It would finish in only 6.25 X 10169 years! This is the problem of very large numbers.
So, maybe we attack the terrorists passcode, much simpler. If hes stupid and has only a four digit numeric code, easy. Even with the built in delays, and we are careful, we can likely get in by defeating the delay system in under an hour. . . Thats the way the San Bernardino terrorists IPhone 5s was cracked.
But, I doubt newer iPhones are so easy. In fact, theres no doubt. That system doesnt work. Also, if hes smarter, hes using a six digit or more. Then, even if you could defeat the time outs and lockouts, youre talking one million possible with six digits, 100 million with seven, and so on. The time to try grows literally exponentially. If you add in alphanumeric and symbols, it becomes impossible. Again, they have to be tried on the device.
At some point the value of the data becomes not worth the effort.
Not only does Apple have the ability, so does NSA. And anyone else with supercompute capability.