If this phone had been any later model than the 5c the FBI could have just used the terrorists thumb to unlock the phone.
Not necessarily. TouchID is supposed to only work with a live finger even though people supposedly have shown it work. Plus, you only get three attempts before it requires passcode. How many times have you messed up with a live finger?
Not true. Thermal image has been proven worked on Touch ID. Also, you got 5 attempts, not 3. btw, it's irrelevant to this case because the phone is 5c.
Can't wait to hear about the fake data they extract from the phone and the fake terror plot they are able to foil as a result.
Lies, lies, bullshit, and more lies.
Thinking the same. However, I rather let them lie about data extracted from the phone and no longer have a reason to force Apple to hack the iOS in the future. I doubt that they can recover any data from NAND. They can extract the encrypted data in binary but successfully decrypting a highly encrypted assembly language to human readable one will be very unlikely in this case. Apple probaby assessed this in their chip design.
If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.
You're right, on the 6/6s, with the secure enclave, this is essentially impossible.
On the 5s though, which this phone is, it's certainly possible, though incredibly difficult.
It is a 5c with no secure enclave and no touch id.
What the FBI wanted Apple to do was a software hack. With software hacks you can access phones WITHOUT possession. And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.
Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
Oh clueless one.... If you are going to post, try to keep up. A software hack/backdoor jeopardizes EVERYONE's iPhone, and therefor your most private information making us vulnerable to all kinds of malfeasance, including identity theft and financial loss, and even much worse. That should scare the shit out of you.
What the FBI wanted Apple to do was a software hack. With software hacks you can access phones WITHOUT possession. And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.
Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
Troll alert. Any reply to this guy is a waste of time and pixels
This is the type of hacking I want to see. Hardware hacks. This means you need possession of the phone.
If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.
Theoretically, we could ensure that if you haven't used you phone recently there is always information missing that is needed to decrypt the phone, and which must be supplied by you. In practice, though, it's very hard to resist an adversary with unlimited resources who has physical possession of your hardware. In the iPhone, for example, secret keys are stored in a secure hardware enclave, and released if biometric (fingerprint) data is correct. If your adversary has sufficient resources, they will be able to read the secret keys directly from the secure enclave. No chip is un-probe-able if your adversary has sufficient resources.
The FBI is probably going to come out in the next few weeks saying that their attempts at unlocking the phone through mirroring did not succeed and as a result, now after trying all options, Apple has no choice but to comply with the court order and provide a compromised OS.
This is the type of hacking I want to see. Hardware hacks. This means you need possession of the phone.
If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.Only until quantum computers come out a quantum computer with just 512 qubits(somewhat like transistors) can break any encyption known to mankind within an instant . Its Physics
Comments
btw, it's irrelevant to this case because the phone is 5c.
I doubt that they can recover any data from NAND. They can extract the encrypted data in binary but successfully decrypting a highly encrypted assembly language to human readable one will be very unlikely in this case. Apple probaby assessed this in their chip design.