Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The FBI can’t unlock the Texas church shooter’s phone
Yahoo News ^ | 11/7/2017 | David Lumb

Posted on 11/07/2017 2:05:20 PM PST by detective

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-199 next last
To: Vermont Lt
There is nothing on his phone that will change anything. Not really sure I want the cops getting a back door to my phone.

Yup. It is an excuse. And a poor one at that. I know I don't want our feral government having a backdoor to my phone.

141 posted on 11/07/2017 5:50:22 PM PST by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 131 | View Replies]

To: Swordmaker
The one they paid $1,000,000 for in the San Bernardino terrorist case works only on the older iPhone 5c and backwards. It cannot work on the iPhone 5s and later that have the Secure Enclave. . . those are entirely different devices that have far more secure approaches to encryption than those older iPhones which were pretty secure themselves.

That's one of the reasons I upgraded my iPhone when I finally got around to it. That, and the fact that it was no longer able to get security updates because it was too ancient.

I was hoping you'd show up on the thread to combat the FUD.

142 posted on 11/07/2017 5:52:31 PM PST by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 138 | View Replies]

To: detective

“The FBI can’t unlock the Texas church shooter’s phone”

There are probably tons of 14 year old kids that can.
Give one $500 and they would get it done.


143 posted on 11/07/2017 5:53:16 PM PST by HereInTheHeartland (I don't want better government; I want much less of it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mass55th
I thought the FBI used a company in Israel to get into the iPhone(s) of the San Diego terrorists. The Feds filed a lawsuit to force Apple to turn over the unlocking procedures, but then withdrew the case when they were able to get "Cellebrite, a privately held Israeli company that specializes in transferring and extracting data from phones..." The FBI wouldn't confirm they'd used that company.

The FBI was on extremely shaky legal ground. They were not attempting to use a Warrant to get Apple to unlock the iPhone 5c, which was using an older iOS version, but an "All Writs Order" that was totally inappropriate to the case. It was essentially ordering Apple to do work that was beyond the power of the court to order. They were ordering Apple to CREATE an entirely new Operating System that would BREAK the security of iOS and then to GIVE IT TO THE FBI. This new operating system, call it FBiOS, would bypass all security. It was, by the court order, would remove all security that would protect and encrypt data, and would allow the FBI to install it on any Apple iOS. They claimed later they were only asking for THAT device. . . but that was NOT the wording of the All Writs court order.

All Writs Court Orders are usually used when you hire a locksmith to unlock a door or open a safe. It is used when you are requiring a business to do something they do in the NORMAL COURSE of their business. You cannot require them to do something they do not normally do. . . such as create a new operating system that would destroy their business model for the convenience of the court or a police agency. It also flew in the face of a FEDERAL LAW that SPECIFICALLY prohibited the courts from requiring a telecommunications manufacturer or carrier from disabling any encryption or security hardware or software for the benefit of LAW ENFORCEMENT agencies. That federal law was passed by Congress explicitly to prevent a Federal Judge from doing this. . . and the Supreme Court had already RULED a judge could NOT ORDER SUCH A THING. Apple was right to refuse to do it.

144 posted on 11/07/2017 5:54:20 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 34 | View Replies]

To: null and void
I *think* the finger just needs a pulse, it doesn't have to be alive.

No, it needs to be living. . . not just a pulse. It needs the subcutaneous fat cells to be filled with blood below the skin. It would take a lot of work to accomplish that. . . and it still won't work after five to 24 hours of not being unlocked. Then you'll have to use the passcode.

145 posted on 11/07/2017 6:02:09 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 41 | View Replies]

To: usurper
We need to pass legislation to ensure that teck companies maintain the keys so that legal warrants can be excised.

Modern encryption does not work that way. It is binary. It is either secure or it is not secure. Once you know there is a backdoor, the bad guys WILL find it. . . and the courts will reveal the backdoors to the defense attorneys. . . who cannot keep their mouths shut. EVERY SINGLE TIME a secure backdoor has been revealed, even under court seal, it has been compromised. That is just the reality. The only way to make certain that a passcode does not get revealed is to make it known only to one person. . . the user.

Put in another way to unlock a device and they are not secure.

146 posted on 11/07/2017 6:06:59 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 44 | View Replies]

To: detective

What do they expect to find? Trump on speed dial? Kiddie porn? (Lest we forget he killed babies in the church)


147 posted on 11/07/2017 6:13:52 PM PST by NormsRevenge (Semper Fi - Monthly Donors Rock!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

My phone is boring. I am more worried about being exposed as a typical 50 something white guy from the stix.


148 posted on 11/07/2017 6:22:52 PM PST by Vermont Lt (Burn. It. Down.)
[ Post Reply | Private Reply | To 141 | View Replies]

To: beergarden
Exactly! I have no clue why you would use your fingerprint as stupid for commercial use. The only time you use or provide fingerprints is for passports and law purposes and NEVER for commercial purposes. Now Apple have a copy of your fingerprint in storage.

Nope, Apple does not have your fingerprint in storage.

In fact the TouchID sensor does not even use your fingerprints.


149 posted on 11/07/2017 6:30:59 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Swordmaker

so they have the killer’s body so they have his subcutaneous tissue to open the phone.


150 posted on 11/07/2017 6:37:56 PM PST by Chickensoup (Leftists today are speaking as if they plan to commence to commit genocide against conservatives.)
[ Post Reply | Private Reply | To 149 | View Replies]

To: HereInTheHeartland

If some kid could do it, it would have been done loooong before now.


151 posted on 11/07/2017 6:44:43 PM PST by Coronal
[ Post Reply | Private Reply | To 143 | View Replies]

To: Chickensoup

Blood has to be flowing through the tissues for it to work. Even if it did, it’s been more than 24 hours since he was killed, so the PIN would still be needed.


152 posted on 11/07/2017 6:48:14 PM PST by Coronal
[ Post Reply | Private Reply | To 150 | View Replies]

To: Swordmaker

Androids it is the person who buys it that puts a pass code in. This is an iPhone in question. If I am not mistaken not even tech support from Apple can help because of privacy policy in that is in place.


153 posted on 11/07/2017 6:58:49 PM PST by Biggirl ("One Lord, one faith, one baptism" - Ephesians 4:5)
[ Post Reply | Private Reply | To 115 | View Replies]

To: Swordmaker

I think a couple of months ago Rush on his show talked about that you cannot get Apple tech support for pass code disclosure because of its strict company policy on privacy.


154 posted on 11/07/2017 7:05:57 PM PST by Biggirl ("One Lord, one faith, one baptism" - Ephesians 4:5)
[ Post Reply | Private Reply | To 149 | View Replies]

To: itsahoot

Which the new iPhone X has.


155 posted on 11/07/2017 7:14:33 PM PST by Biggirl ("One Lord, one faith, one baptism" - Ephesians 4:5)
[ Post Reply | Private Reply | To 116 | View Replies]

To: Vermont Lt
My phone is boring. I am more worried about being exposed as a typical 50 something white guy from the stix.

As is mine. Doesn't really matter. The government has no business prying into it without my consent.

156 posted on 11/07/2017 7:21:52 PM PST by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 148 | View Replies]

To: rdcbn
These can be tough to break

"Tough" is not the word I would use. "Impossible" is the word I would use.

On an iPhone, with the fact that if you don't get the passcode in ten tries, the data is erased, your only choice is to attempt to brute force break the 256bit AES encryption. The key to that is NOT the user's passcode.

The encryption key is constructed by the iOS Encryption Engine processor and is composed of FOUR elements, only one of which is related to the user's passcode.

  1. The DID: a Device ID: This ID is the same for all devices the IC is installed in and is burned to the Secure Enclave IC when it is made.
  2. The UUID: a Universally Unique ID, an identifying code made up of unique characters assigned randomly at the time the Secure Enclave memory integrated Circuit is first burned in the silicon. No record of this ID is ever kept at the IC maker or anywhere.
  3. A truly random number generated from environmental sensors such as the device's cameras, microphones, position sensors, and gps, when the user first inputs or bypasses inputing his AppleID. This too is stored in the Secure Enclave.
  4. The One-Way Hash of the user's passcode (or a default number used when a user elects to not enter a passcode). This, too is stored in the Secure Enclave. Note that the user's passcode can be anything from a four to six digit number all the way to a 256 character password, which can use all 223 characters that are available on the virtual iOS keyboard. I would not recommend trying to remember a passcode of that length. LOL! However, you could if you wanted.

An algorithm, also stored on the Secure Enclave, is used to entangle the user's passcode into the concatenated UUID, DID, and Random Number (these three total 128 characters before the user's passcode Hash is entangled). In any case, the actual key is padded by the algorithm to at least 144 characters in length to do the encryption decryption EACH TIME THE USER INPUTS A CORRECT PASSCODE, although it can be longer when the user's passcode is entangled.

Once you start to understand the way brute force solving of a 256bit Advanced Encryption Standard (AES) works, you start to realize why "Impossible" is the word to use. The ONLY way to crack a 256 bit AES encryption is to try every possible key until you find the one that works by seeing if you get something intelligent, usable, or translatable when you apply a trial key.

The number of key possibilities is a number that is literally higher than astronomical. For example, if one were to use all 223 characters possible in a string of 256 characters, you get a possible 223256 possible keys you will need to try to find the solution to the encryption, if you were just using a user input key.

How long would it take to try every possible combination of characters and numbers and symbols that could have been used to encrypt your databy brute force, n o? Good question. Because that is what would be required, unless they can force YOU to reveal your passcode.

Let's assume your shooter's iPhone Passcode was a short, but complex, 16 character code. Recall, however, that it was entangled with the iPhone's 128 character UUID, so the base is now 16 + 128 or 223144, not quite so large as the that previous number, but still huge. . . and quite a bit larger than a Googol.

1,­052,­019,­282,­033,­700,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,000,000,000,000,000,000,000,000,000,000,000.000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000

That's 1.052 duovigintillion possible combinations, give or take a few.

If the government's supercomputer could check 50,000 passcodes every second against the data, checking to see if anything made sense, It could therefore test 1.5 TRILLION possible passcodes a year. Let's grant the government agency a 33% faster supercomputer and say they could check 2 TRILLION passcodes a year, OK? That means it would take their supercomputer only a mere. . .

5,260,096,410,168,500,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,­000,000,000,000,000,000, 000,000,000,000,000,000,000,000.000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 YEARS

to check all the possible passcodes to decipher your encrypted file that had been encoded with your 16 character complex passcode entangled with a 128 character UUID, DID, and environmental random number. It is possible they could, if they were outrageously lucky, get the data deciphered next week, but it more likely will take them a good portion of 5.26 Billion vigintillion (10^195) Years to break into one iPhone's data. Double, triple, quintuple, or even multiply the speed of the government's super computer by a factor of 1 trillion. . . it makes only infinitesimal differences in the amount of time it would take to break your passcode on one iPhone. That's the law of very large numbers at work.

It's estimated that the entire Universe will die a heat death and devolve into a soup of quarks and sub-atomic particles by a mere 4.7 X 1080 years. . . yet we are looking at more than THREE TIMES THAT TIME SPAN. That's why "Impossible" is a good word. . . and that's for only a complex 16 character passcode.

157 posted on 11/07/2017 7:33:14 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 63 | View Replies]

To: IndispensableDestiny; mass55th
The iPhone 5c from that case used the A6 chip. Starting with the A7 (they are up to A9), it's not clear that even Apple can get into the phone.

Actually Apple is up to the A11 on the iPhone 8 and 8+ and iPhone X that were released in the last month. . . plus they both have the Neural Engine, capable of doing 600 billion decision per second. . . which is what drives the 3D facial recognition mapping which is 1,000,000 to one against any false reading, where the TouchID is only 50,000 to one.

158 posted on 11/07/2017 7:38:54 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 72 | View Replies]

To: Yaelle
That should be the solution. For chain of command, after a warrant, Apple builds a small LE room in Cupertino HQ. in it is what they need to unlock a phone used in a crime.

Someone kidnaps a key Apple management employee or a family member and holds them hostage until the algorithms, software, hardware, or schematics of how to unlock an iOS device are delivered to them. . . Once the technology exists for the good guys, it won't be long before it's available to the bad guys. Apple iOS devices are no longer secure. The best solution is to never create it in the first place. Just because Apple can create it, and should they? If Apple does, then Apple is back to square one for over 800 Million iOS devices and their users. Trust is what differentiates Apple on privacy from all the rest. Destroy that and they destroy their brand.

159 posted on 11/07/2017 7:52:16 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 66 | View Replies]

To: KC Burke
I say give me the phone and the dead killer. I will put his hand under my arm for two minutes— bingo 98.6.

It doesn't work on temperature sensing. Otherwise, good idea. Thanks for playing.

160 posted on 11/07/2017 8:00:51 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 98 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-199 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson