IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New All you need to know about the Apple phone encryption case
--

Drew
New gumment uber alles, you have no right to remain silent
always look out for number one and don't step in number two
New Cringley's take...
The FBI v. Apple isn’t at all the way you think it is

http://www.cringely.com/2016/02/19/the-fbi-v-apple-isnt-at-all-the-way-you-think-it-is/


and a good movie for you paranoids! (Safe House, 1998)

http://www.imdb.com/title/tt0120051/?ref_=fn_al_tt_3
New Interesting. Thanks.
New That's some high-stakes poker, if true
--

Drew
New If so, maybe that autopsy should be reconsidered...
With barely 3 days between him croaking and the order being filed, maybe he got a little help after all.

http://arstechnica.com/tech-policy/2014/12/feds-want-apples-help-to-defeat-encrypted-phones-new-legal-case-shows/

The Feds have been taking this road for over a year. The difference is that the earlier motions ordered "reasonable effort" while the current one tells them explicitly what to do and how to go about it. They want something that runs from RAM without modifying iOS, so in essence, an app that can disable the software security features. Good luck keeping that confined to one device.

And, AFAIK, he's plain wrong about the backups. The backup key is also based on the inaccessible hardware key. The only way to avoid brute forcing the lot is to restore them to the same device they originated on.
New Presumably when Apple was developing this hardware encryption...
they presumably had a software emulator or VM or something when they were developing and testing this stuff.

I don't think Apple said to their coders: "Here's a gross of iPhones. Don't make too many mistakes when you're coding and testing the encryption stuff - these things don't grow on trees...."

;-)

I dunno.

But it makes no sense to me that they've developed something that can't be simulated or bypassed. IOW, I wouldn't be surprised if there was provision for a "software simulation of the hardware key" during development and that that conceivably could be added back under subpoena.

I'm just speculating though. I have no inside information.

Cheers,
Scott.
New The phones don't brick
You just lose the data on the 10th incorrect attempt.

The whole thing of not being able to bypass the encryption was Apple's biggest marketing push for the latest incarnations. Even if Apple has emulators, the actual hardware is designed not to release its secrets.

I did misread the part covering the backups earlier. Only the user's keychain is protected by the hardware key. The Feds do seem to have the contents, except for the last 6 weeks. But... some smartypants at the FBI had the County reset the password to the iCloud account, so trying to get the phone to make an auto-backup is out.

Nice summary of the design:
http://yro.slashdot.org/comments.pl?sid=8756397&cid=51524693

[The separate Secure Enclave is not present on the 5C in question, but it has the precursor present on the main SoC processor.)
New Here's the (other) thing about this case
They know who did it.
They know it wasn't part of a larger plot.
They know who they were communicating with.
They know what websites they were on.

What are they allegedly looking for?

And by the way, we should probably stop calling them terrorists. They might have thought they had a cause, but so did the OKC bombers, and that's what we call them: "bombers".

Stop saying that unlocking this phone is about terrorism.
--

Drew
New It is about the legal landgrab
Set the precedent that the All Writs Act can be used to make anyone do pretty much anything for any reason (this is a fishing expedition after all.) The Feds have been pushing its envelope for a while and have drawn some pretty stiff rebukes for the overreach. Terrierists!!!1!2 seems to have been the perfect cover to make this push stick.

(Ironically, wasn't abuse of Writs of Assistance one of the reasons behind the American Revolution?)
New Now that is a Bingo!
Alex

"There is a cult of ignorance in the United States, and there has always been. The strain of anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that "my ignorance is just as good as your knowledge."

-- Isaac Asimov
New Conspiracy theory ++
We all know they don't really need Apple to unlock this phone. They can crack it themselves, but want to maintain plausible deniability. And even if they can't crack it, they know this was not part of an organized movement.

Unless ...

What if they CAN'T crack it, but want criminals to jump through hoops avoiding phones?

What if they DON'T know these two were lone nuts and are just trying to avoid a panic?
--

Drew
New I haven't read a lot about this...
The thing about having the spooks crack the phone (which they probably can do, given enough time and resources) is that any evidence they collect couldn't be used in court.

Having the FBI and/or Apple do it wouldn't raise issues about "sources and methods" which are the no-go line when it comes to national intelligence agencies. There would be ways for the FBI and/or Apple to collect the evidence in a way that could be used in court cases.

I think that's the bottom line here - they want evidence they can use to try to convict any other people who may have been involved and contacted after the last iCloud backup...

My $0.02.

Cheers,
Scott.
New Except
This is about his work phone. They both had personal phones which they destroyed before the attack. Chances that anything useful is on the work phone is rather slim. Plus, any people contacted would be available from the telco/ISP, so that can't be it.
New They had the phone with them before and after the attack, before they were killed.
The Feb 16 court filing (p. 4 of the PDF file).

I'm not convinced this is just a fishing expedition or just a desire to set a precedent. Maybe so. We'll see.

Cheers,
Scott.
     All you need to know about the Apple phone encryption case - (drook) - (14)
         gumment uber alles, you have no right to remain silent -NT - (boxley)
         Cringley's take... - (dmcarls) - (8)
             Interesting. Thanks. -NT - (Another Scott)
             That's some high-stakes poker, if true -NT - (drook)
             If so, maybe that autopsy should be reconsidered... - (scoenye) - (5)
                 Presumably when Apple was developing this hardware encryption... - (Another Scott) - (4)
                     The phones don't brick - (scoenye) - (3)
                         Here's the (other) thing about this case - (drook) - (2)
                             It is about the legal landgrab - (scoenye)
                             Now that is a Bingo! -NT - (a6l6e6x)
         Conspiracy theory ++ - (drook) - (3)
             I haven't read a lot about this... - (Another Scott) - (2)
                 Except - (scoenye) - (1)
                     They had the phone with them before and after the attack, before they were killed. - (Another Scott)

Body piercings don't have this type of torque though.
59 ms