IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Cringley's take...
The FBI v. Apple isn’t at all the way you think it is

http://www.cringely.com/2016/02/19/the-fbi-v-apple-isnt-at-all-the-way-you-think-it-is/


and a good movie for you paranoids! (Safe House, 1998)

http://www.imdb.com/title/tt0120051/?ref_=fn_al_tt_3
New Interesting. Thanks.
New That's some high-stakes poker, if true
--

Drew
New If so, maybe that autopsy should be reconsidered...
With barely 3 days between him croaking and the order being filed, maybe he got a little help after all.

http://arstechnica.com/tech-policy/2014/12/feds-want-apples-help-to-defeat-encrypted-phones-new-legal-case-shows/

The Feds have been taking this road for over a year. The difference is that the earlier motions ordered "reasonable effort" while the current one tells them explicitly what to do and how to go about it. They want something that runs from RAM without modifying iOS, so in essence, an app that can disable the software security features. Good luck keeping that confined to one device.

And, AFAIK, he's plain wrong about the backups. The backup key is also based on the inaccessible hardware key. The only way to avoid brute forcing the lot is to restore them to the same device they originated on.
New Presumably when Apple was developing this hardware encryption...
they presumably had a software emulator or VM or something when they were developing and testing this stuff.

I don't think Apple said to their coders: "Here's a gross of iPhones. Don't make too many mistakes when you're coding and testing the encryption stuff - these things don't grow on trees...."

;-)

I dunno.

But it makes no sense to me that they've developed something that can't be simulated or bypassed. IOW, I wouldn't be surprised if there was provision for a "software simulation of the hardware key" during development and that that conceivably could be added back under subpoena.

I'm just speculating though. I have no inside information.

Cheers,
Scott.
New The phones don't brick
You just lose the data on the 10th incorrect attempt.

The whole thing of not being able to bypass the encryption was Apple's biggest marketing push for the latest incarnations. Even if Apple has emulators, the actual hardware is designed not to release its secrets.

I did misread the part covering the backups earlier. Only the user's keychain is protected by the hardware key. The Feds do seem to have the contents, except for the last 6 weeks. But... some smartypants at the FBI had the County reset the password to the iCloud account, so trying to get the phone to make an auto-backup is out.

Nice summary of the design:
http://yro.slashdot.org/comments.pl?sid=8756397&cid=51524693

[The separate Secure Enclave is not present on the 5C in question, but it has the precursor present on the main SoC processor.)
New Here's the (other) thing about this case
They know who did it.
They know it wasn't part of a larger plot.
They know who they were communicating with.
They know what websites they were on.

What are they allegedly looking for?

And by the way, we should probably stop calling them terrorists. They might have thought they had a cause, but so did the OKC bombers, and that's what we call them: "bombers".

Stop saying that unlocking this phone is about terrorism.
--

Drew
New It is about the legal landgrab
Set the precedent that the All Writs Act can be used to make anyone do pretty much anything for any reason (this is a fishing expedition after all.) The Feds have been pushing its envelope for a while and have drawn some pretty stiff rebukes for the overreach. Terrierists!!!1!2 seems to have been the perfect cover to make this push stick.

(Ironically, wasn't abuse of Writs of Assistance one of the reasons behind the American Revolution?)
New Now that is a Bingo!
Alex

"There is a cult of ignorance in the United States, and there has always been. The strain of anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that "my ignorance is just as good as your knowledge."

-- Isaac Asimov
     All you need to know about the Apple phone encryption case - (drook) - (14)
         gumment uber alles, you have no right to remain silent -NT - (boxley)
         Cringley's take... - (dmcarls) - (8)
             Interesting. Thanks. -NT - (Another Scott)
             That's some high-stakes poker, if true -NT - (drook)
             If so, maybe that autopsy should be reconsidered... - (scoenye) - (5)
                 Presumably when Apple was developing this hardware encryption... - (Another Scott) - (4)
                     The phones don't brick - (scoenye) - (3)
                         Here's the (other) thing about this case - (drook) - (2)
                             It is about the legal landgrab - (scoenye)
                             Now that is a Bingo! -NT - (a6l6e6x)
         Conspiracy theory ++ - (drook) - (3)
             I haven't read a lot about this... - (Another Scott) - (2)
                 Except - (scoenye) - (1)
                     They had the phone with them before and after the attack, before they were killed. - (Another Scott)

I seem to remember a rather Stupid rendition sometime back.
61 ms