Did law enforcement breakApple's encryption code? It appears that Apple lawyers now want to know how they did it? Does this undermine Apples argument?
Announcement
Collapse
No announcement yet.
Did Apple lose?
Collapse
X
-
Originally posted by shockmonster View PostDid law enforcement break Apple's encryption code? It appears that Apple lawyers now want to know how they did it? Does this undermine Apples argument?
You could say that Apple won because they did not give into the government's overreaching demands."Don't measure yourself by what you have accomplished, but by what you should accomplish with your ability."
-John Wooden
-
Originally posted by shockmonster View PostDid law enforcement breakApple's encryption code? It appears that Apple lawyers now want to know how they did it? Does this undermine Apples argument?
Apple did not think this through. They now have lost control of the narrative and have no legal right to the information of how law enforcement achieved it. I doubt the FBI will be sharing this information since they will be able to use it in other cases.
Comment
-
Both sides won.There are three rules that I live by: never get less than twelve hours sleep; never play cards with a guy who has the same first name as a city; and never get involved with a woman with a tattoo of a dagger on her body. Now you stick to that, and everything else is cream cheese.
Comment
-
Originally posted by ShockdaWorld View PostDoes any of this mean that my Apple stock is going to come the rest of the way out of the toilet?"Don't measure yourself by what you have accomplished, but by what you should accomplish with your ability."
-John Wooden
Comment
-
Originally posted by SB Shock View PostYes they did break their code. Anybody thinking it couldn't be broken is foolish.
Apple did not think this through. They now have lost control of the narrative and have no legal right to the information of how law enforcement achieved it. I doubt the FBI will be sharing this information since they will be able to use it in other cases.
That being said, I would expect it to take a year or two, which gives Apple enough time to close whatever door their coders left open.
Of course, Apple would have a head start if they knew how the FBI developed and used the exploit. I applaud the FBI for not telling them. Let Apple figure it out. I also did not think it was a good idea for Apple to share their encryption techniques with the FBI, just so there's full disclosure.
My only question would be more around whether Apple was already required to put a back door in their phones, as the Chinese have a law that requires all encryption on computers in their country to be 'approved' (i.e. give the state a backdoor into the encryption). I would expect that this law would extend to mobile devices as well.
Comment
-
The hole may not be a hole at all.
Assuming the FBI's computing resources are extensive (and you know they are), this could have been a hardware level hack followed by a software level attack on the unlock PIN on a supercomputer. In other words, don't hack the phone. Copy the contents of the phone's memory to a super computer running an emulator. Then brute force the password for ten attempts, then reset the emulated phone (which is simply a memory copy operation) and repeat trying the next 10 over and over until you succeed.
That's how I would have done it, assuming they have the resources I believe they do. Well I would run a simple calc to make sure that's feasible first.Kung Wu say, man who read woman like book, prefer braille!
Comment
-
Yeah, assuming the FBI has a supercomputer running at 10 gigaflops or better (late 90s/early 00s supercomputing speed), then they could crack an 8 character or smaller password in under 12 days, once they get the emulator working. It would take time to get the emulator working and the memory from the device copied over.Kung Wu say, man who read woman like book, prefer braille!
Comment
-
Originally posted by Kung Wu View PostThe hole may not be a hole at all.
Assuming the FBI's computing resources are extensive (and you know they are), this could have been a hardware level hack followed by a software level attack on the unlock PIN on a supercomputer. In other words, don't hack the phone. Copy the contents of the phone's memory to a super computer running an emulator. Then brute force the password for ten attempts, then reset the emulated phone (which is simply a memory copy operation) and repeat trying the next 10 over and over until you succeed.
That's how I would have done it, assuming they have the resources I believe they do. Well I would run a simple calc to make sure that's feasible first.
Comment
-
Originally posted by jdshock View PostIf I remember right, that's what McAfee suggested a month ago. He said it should only take a day or so with that procedure.Kung Wu say, man who read woman like book, prefer braille!
Comment
Comment