Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Dalberg-Acton
"Does this mean Apple devices have a “back door”?"

No it means there are clever ways of brute forcing. Grayshift can still break any iOS up to 12.

If this raghead islime was using iCloud, then Cellebrite can probably break into it.

18 posted on 01/14/2020 11:16:07 PM PST by StAnDeliver (CNN's Dana B: "Show of hands: Coverage for undocumented immigrants?" ***all Democrat hands raised***)
[ Post Reply | Private Reply | To 3 | View Replies ]


iSlime was unlikely to have had a password that escaped the first likely 1000 passes for an iSlime from Saud. Not exactly 'think out of the box' types.

Mentioned previously, the House of Saud only sends either royals or top 'businessmen' sons to aviation school. Note that the AP said the Saudi's even paid for iSlimes gun training, which he picked up in an Air Force military sales training course.

19 posted on 01/14/2020 11:28:54 PM PST by StAnDeliver (CNN's Dana B: "Show of hands: Coverage for undocumented immigrants?" ***all Democrat hands raised***)
[ Post Reply | Private Reply | To 18 | View Replies ]

To: StAnDeliver
No it means there are clever ways of brute forcing. Grayshift can still break any iOS up to 12.

No, there are caveats on both GreyKey’s, and Cellebrite’s brute force iOS system. First of all, neither of them can touch an iPhone with an up-to-date iOS installed. That means any iPhone that can accept iOS 13 or higher is invulnerable to both systems, but you did mention "break up to 12".

One piece of good news there is 55% of iPhone users worldwide are on iOS 13 or higher. In the US it’s about 75%. So, if your iPhone can use iOS 13, upgrade.

The other caveat is that both GreyKey and Cellebrite are still brute force systems that must use the device’s own system. They have just found a vulnerability that lets them turn off the time-out delays and eventual bricking or erasure of the devices. They can keep trying passcode as long as they want. . . or as long as the prosecution is willing to tie up one of the machines. This is crucial if you want your data private.

For either of these unlocking systems, the average time to unlock an iOS device that has a four digit passcode is around two hours. Sometimes they get it right away, because they’re programmed to try obvious patterns people use, four corners, a cross, specific number patterns, etc. However, four digits can only have 10,000 combinations, so you’d think a computer could whip through that in no time. It could, but Apple has thrown a skunk into Cellebrite and GreyKey’s party. Apple won’t let it try keys at a computer’s speed. This is a human interface and runs at people speed! Apple built in a 1.3 second delay between trying passcodes. Too bad, so sad, Cellebrite and GreyKey.

What does this mean for us poor privacy loving Apple owning Freepers? First of all, if either of these two systems had to go all the way from 0000 to 9999 to find the passcode in a four digit passcode with a 1.3 second delay, it would take them a little over 3 ½ hours to test all ten thousand possible passcodes. Great, you say, that’s not a big deal. Nope, it’s not.

But what if you went up to six digits, or one million possible passcodes? That’s 100 times longer to try every possible one, or ~350 hours! That’s 14 ½ days, 24 hours a day. . . Getting interesting?

Perhaps a seven digit passcode might be of better use. . . 10,000,000 passcodes. ~3500 hours, 146 days, 24 hours per day. . .

Hmmmmm, dare we go for 8 digits, 100,000,000 passcodes, ~35,000 hours, almost 4 years, 24 hours per day. Good thing Apple makes good devices that last.

Keep in mind we are just using ten numeric digits for our passcodes. What would happen if we turned on complex passcodes and added alphabetical characters to the passcodes?

Let’s just go back to six character, easy to remember. Now we are working with 26 lowercase and 26 uppercase and 10 numbers. . . 62 characters. Where before we had only 106 = 1,000,000 possible passcodes, now we have 626 = 56,800,235,584 possible passcodes. 56.8 billion possible passcodes with just six characters. . . And testing at one every 1.3 seconds. That means it would take Cellebrite or GreyKey only 2,147 years to try every possible passcode.

How about an eight character passcode? 628 = 218,340,105,584,896 possible passcodes. 218.3 trillion possible passcodes! Only a mere increase to 9,000,575 years to try every possible passcode at one every 1.3 seconds!

If we toss in a few symbols to our Alphanumeric mix, the number of possible passcodes and time to break goes astronomical. Apple allows 223 characters to be input from the iPhone keyboard and your passcode can be a totally absurd 256 characters. Insane, I know. . . but that would give you a possible 223256 passcodes to drive Cellebrite and GreyKey out of business.

26 posted on 01/15/2020 1:19:03 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 18 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson