Posted on 05/19/2020 1:41:45 AM PDT by Swordmaker
Fox News
Attorney General William P. Barr and FBI Director Christopher Wray will hold a virtual press conference at the Department of Justice announcing updates in the criminal investigation of the Dec. 6, 2019, shootings at the Pensacola Naval Air Station in Florida which killed three U.S. Service members and wounded eight other Americans.
Video at link.
(Excerpt) Read more at youtu.be ...
If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.
Its time to finally end P.C. and stop the rise of those who are allowed to sink deeper and deeper into mental illness because no one had the balls to call out their anti social behavior.
Cute diversion from his Obama/Biden dismissal.
Does the new facial recognition password make it easier to unlock?
Go eff yourself Barr.
That is already decided. Elitist walk
Did they say what model of iPhone it was?
They could have been Obama’s sons!
17 of the 9/11 Al Qaeda flight crews were from Saudi Arabia.
And the security protocols put in place by Obama were still following the “apologizing for America” meme. Obama was and idiot. He’s still an idiot.
Three good American boys were wasted by these pecker-woods.
Do not train Saudi’s here in Pensacola. Train them over in Saud and make THEM pay for it . Those who were part of that cell and did not inform the US Navy authorities should be punished summarily. They are not US citizens and do not even deserve a military trial.
Are the co-conspirator trainees still in US custody?
AND arm all sailors on watch duty.
PLEASE! HAVE A HEART!
A brute force attack can hit on the first try, or can have to literally try every possible key.So you dont really know how long it will take, up to the maximum. I suppose the expectation, at any given point, is that youll have to try half of the remaining untried keys.
How does brute force work when the phone requires progressively longer intervals between password retries?
Exactly.
Didn’t the other 5 or 6 Muslims in his class take out their phones and film the terrorist attack? And I think they were just ‘sent home’ with no further penalty?
No, and there were two that were seized. I looked and could find no information on it.
You keep trying. . . These security companies have found a way around the memory erasure after so many tries, so they can keep trying, but they still have to wait. Even if they only have to wait for the 1.2 seconds hardware delay thats built in, it can take a long time to try every possible key. A complex ten character passcode made of 72 upper and lower case plus numeric plus ten symbols characters has 3,743,906,242,264,262,400 possible keys, At 1.2 seconds per try, it would take ~98,932,073,467 years to try all possible keys. A mere six character complex passcode has ~140 million keys would require ~3,681 years. A five character complex passcode would have ~2 billion passcodes. . . Which would take about 51 years to try every possible passcode at 1.2 seconds per try.
However, if our terrorist limited his passcode to the 28 letters in the Arabic Alphabet, in a five character passcode, then the we are looking at 28 to the fifth, 17,210,368 possible passcodes. Calculate it out at 1.2 per second and its ~5 ½ months to run all of the keys.
Ill bet thats what he did. Average crack time on an iPhone with brute force, no matter what form factor, whether numeric passcodes, or complex, is about 40% of the time it would take to run all the possible passcodes. Its lower than 50% because many stupid people use pattern passcodes such as 1234, or the corners, or a keyboard cross, or something knowable about them. These can be input into the cracking software and often hit. Also, humans tend to input number numbers lowest first, so algorithms have been written to imitate those tendencies.
No. For them to get it to unlock with facial recognition theyd need a live terrorist. That wouldnt work with a dead one. The terrorist has to actually actively LOOK at the iPhonef face sensor. A dead face doesnt work. FaceID has a 1,000,000 to 1 error rate, compared to the 10,000 to 1 error rate for TouchID, the fingerprint reading unlocking method Apple uses on its lower end iPhones. Most of those FaceID errors occur in younger, immature faces, where features have not become differentiated by maturity in adulthood, and mostly between siblings and/or children and their parents.
[Ill bet thats what he did. Average crack time on an iPhone with brute force, no matter what form factor, whether numeric passcodes, or complex, is about 40% of the time it would take to run all the possible passcodes. Its lower than 50% because many stupid people use pattern passcodes such as 1234, or the corners, or a keyboard cross, or something knowable about them. These can be input into the cracking software and often hit. Also, humans tend to input number numbers lowest first, so algorithms have been written to imitate those tendencies. ]
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.