'NAND mirroring' could let FBI break into iPhone without Apple's help, researchers say

13»

Comments

  • Reply 41 of 51
    fallenjtfallenjt Posts: 4,054member
    rob53 said:
    crosslad said:
    If this phone had been any later model than the 5c the FBI could have just used the terrorists  thumb to unlock the phone.
    Not necessarily. TouchID is supposed to only work with a live finger even though people supposedly have shown it work. Plus, you only get three attempts before it requires passcode. How many times have you messed up with a live finger? 
    Not true. Thermal image has been proven worked on Touch ID. Also, you got 5 attempts, not 3.
    btw, it's irrelevant to this case because the phone is 5c.
    edited March 2016
  • Reply 42 of 51
    fallenjtfallenjt Posts: 4,054member
    pmz said:
    Can't wait to hear about the fake data they extract from the phone and the fake terror plot they are able to foil as a result.

    Lies, lies, bullshit, and more lies.
    Thinking the same. However, I rather let them lie about data extracted from the phone and no longer have a reason to force Apple to hack the iOS in the future. 
    I doubt that they can recover any data from NAND. They can extract the encrypted data in binary but successfully decrypting a highly encrypted assembly language to human readable one will be very unlikely in this case. Apple probaby assessed this in their chip design. 
    edited March 2016
  • Reply 43 of 51
    icoco3icoco3 Posts: 1,474member

    bsimpsen said:
    If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.
    You're right, on the 6/6s, with the secure enclave, this is essentially impossible.

    On the 5s though, which this phone is, it's certainly possible, though incredibly difficult.
    It is a 5c with no secure enclave and no touch id.
  • Reply 44 of 51
    freerangefreerange Posts: 1,597member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    Oh clueless one.... If you are going to post, try to keep up. A software hack/backdoor jeopardizes EVERYONE's iPhone, and therefor your most private information making us vulnerable to all kinds of malfeasance, including identity theft and financial loss, and even much worse. That should scare the shit out of you.
    tallest skilicoco3
  • Reply 45 of 51
    waverboywaverboy Posts: 106member
    sog35 said:


    What the FBI wanted Apple to do was a software hack.  With software hacks you can access phones WITHOUT possession.  And with a backdoor you can access MILLIONS of phones at the same time. In your home. IN your bedroom. That is what I'm afraid of.


    Why does it matter to you if the FBI can access private data on suspicion of criminal actively ? Why are you "afraid" ?
    Troll alert. Any reply to this guy is a waste of time and pixels
    tallest skilnolamacguyurahara
  • Reply 46 of 51
    normmnormm Posts: 653member
    bsimpsen said:
    sog35 said:
    This is the type of hacking I want to see.  Hardware hacks.  This means you need possession of the phone.
    If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.
    Theoretically, we could ensure that if you haven't used you phone recently there is always information missing that is needed to decrypt the phone, and which must be supplied by you.  In practice, though, it's very hard to resist an adversary with unlimited resources who has physical possession of your hardware.  In the iPhone, for example, secret keys are stored in a secure hardware enclave, and  released if biometric (fingerprint) data is correct.  If your adversary has sufficient resources, they will be able to read the secret keys directly from the secure enclave.  No chip is un-probe-able if your adversary has sufficient resources.
  • Reply 47 of 51
    CMA102DLCMA102DL Posts: 121member
    Did the FBI find the dormant cyber pathogen in Farook''s work phone or did they lie to us again?
    edited March 2016
  • Reply 48 of 51
    CMA102DLCMA102DL Posts: 121member
    The FBI is probably going to come out in the next few weeks saying that their attempts at unlocking the phone through mirroring did not succeed and as a result, now after trying all options, Apple has no choice but to comply with the court order and provide a compromised OS. 
    edited March 2016
  • Reply 49 of 51
    Keep the FBI, NSA, GCHQ, MI6, MOSSAD, Aman and Shin Bet and any other government funded, police state departments out of our personal devices.
    tallest skil
  • Reply 50 of 51
    bsimpsen said:
    sog35 said:
    This is the type of hacking I want to see.  Hardware hacks.  This means you need possession of the phone.
    If Apple did the secure enclave correctly in the iPhone6/6s, it'll take something far more sophisticated than NAND mirroring to crack. They'll have to de-cap the chip and try to probe. And it's fairly easy to make a chip unprobe-able, so even that avenue can and will be cut off in the future. Uncrackable encryption is here to stay.Only until quantum computers come out a quantum computer with just 512 qubits(somewhat like transistors) can break any encyption known to mankind within an instant . Its Physics
Sign In or Register to comment.