Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Donald Trump Calls on Apple to 'Step Up to the Plate' and Unlock iPhones Used by Florida Mass Shooter
MacRumors ^ | 1/14/1920 | Forum

Posted on 01/14/2020 8:46:59 PM PST by House Atreides

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 last
To: Alberta's Child

Why did Barr take so long to consider it a terrorist attack? It was obvious from the get go.

No, because these scumbag critters were calculating the benefits of it, which was to get the iphone back door open in the name of the war on terror.

This is just FISA v 2.0 they are pushing on us while pretending doing reviews on the current FISA abuses.


41 posted on 01/16/2020 1:58:54 AM PST by JudgemAll (Democrats Fed. job-security in hatse:hypocrites must be gay like us or be tested/crucified)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Alberta's Child

They only consider a muslim attack as terrorism or hate crime if it helps them puts the screws on us in return.

It has nothing to do with it. They are not serious about countering islamic terror, let a lone left wing democrat terrorism and seeking of arms monopoly the way the Nazi party did it.


42 posted on 01/16/2020 2:01:07 AM PST by JudgemAll (Democrats Fed. job-security in hatse:hypocrites must be gay like us or be tested/crucified)
[ Post Reply | Private Reply | To 27 | View Replies]

To: minnesota_bound
Maybe this will help get into the phone.

It takes next to no time to crack an iPhone’s passcode

The only problem with the NY POST article is it’s fake news based on wrong assumptions by their "expert," Matthew Green, who assumed that both GreyKey and Cellebrite could off-load the contents of the iPhone to a computer, then run software that would run through the permutations of possible passcodes, checking to see if it would unlock the device in essentially 0.078 seconds per passcode. Here’s Mathew Green’s tweeted chart they used as the basis for this article:

Matthew Green
@matthew_d_green Guide to iOS estimated passcode cracking times (assumes random decimal passcode + an exploit that breaks SEP throttling):

Unfortunately for the NY POST, Matthew Green, and his Tweet, assumptions don’t lead to truth. Mr. Green was ignorant of the very basic fact that Apple designed the system such that the encryption/decryption MUST be done on the device through the hardware ON THE DEVICE and cannot be offloaded to a computer. Further, to prevent the very machine inputting of passcode attempts by computer—it is a human interface, you know—Apple built in a hardware delay between passcode attempts of 1.3 seconds.

It is not possible for the system to accept another passcode before that delay is finished. Ergo, there is no possible way that a GreyKey or Cellebrite device can break into an iPhone by trying passcodes at the rate of one every eight hundredths of a second to equal Matthew Green’s cute little Chart. No, in actual fact, reality reared it’s head, debunking Mr. Green When Police officers who had seen both Cellebrite and GreyKey in operation reported that the average time to break a four digit passcode was more like two hours! That’s much more in line with 3,600 seconds per hour. . . And needing to go about 60% through the 10,000 possible passcodes four numeric digits allow before hitting the right one a 1.3 seconds per test.

The actual chart is this:

These figures (except for the last two, which they don’t bother to try) actually comport to the real experiences of authorities who have used the devices. Sorry to burst your fake news bubble.

By the way, a passcode made of a random five alphanumeric with symbol characters, even assuming Mr. Green’s 0.08 per second testing speed, would require over 600 years to try all possible passcodes.

43 posted on 01/16/2020 3:06:41 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Drago
I wonder if “Face ID” would work if you hold the corpse’s eyes open?!? ;-) I think someone tried to spoof “Touch ID” with fingerprint impressions, etc

To the first, no. To the second TouchID doesn’t use fingerprints. Unlike other phone fingerprint sensors Apple’s TouchID uses the pattern of the valleys and ridges of the subcutaneous fat pad underneath the surface. That’s why an image of a fingerprint won’t work no matter how they fake them up. It’s got to be the real living finger. Dead don’t cut it either.

44 posted on 01/16/2020 3:15:47 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson