Apple unlikely to learn details of San Bernardino iPhone exploit

Posted:
in General Discussion edited April 2016
Apple, in an effort to protect customers against a heretofore unknown iPhone vulnerability, has sought information regarding a working encryption exploit used by the Justice Department in its investigation into the San Bernardino terror attacks. A new report, however, suggests the passcode bypass technique will likely remain secret.




Citing sources within the Obama administration, Reuters reports the foreign company that helped investigators break into an iPhone used by terror suspect Syed Rizwan Farook maintains sole legal ownership of the undisclosed exploit, meaning it is highly unlikely that Apple will learn of the method.

According to the report a White House procedure for assessing which digital security flaws should be aired in public, and which should remain secret, is not designed to handle vulnerabilities discovered and owned by private companies. Dubbed the Vulnerabilities Equities Process, the system was put in place to foster inter-agency discussion about discovered technology flaws. Specifically, the process weighs the benefits of publicly announcing a flaw that could otherwise be kept secret and subsequently used for surveillance operations or digital evidence gathering.

The iPhone exploit used to successfully access Farook's iPhone cannot be debated without consent from its owner, sources said. Further, former VEP manager Rob Knake and other government sources believe it unlikely that the FBI itself knows exactly how the method works.

A federal magistrate judge in February ordered Apple to assist the FBI in accessing Farook's device, but the company refused. The ensuing court battle sparked contentious debate over the intersection of national security and privacy, with critics saying the government's request was illegal and constituted overreach. Arguments for both sides were rendered moot after an outside party presented officials with an effective iPhone workaround last month.

Contrary to today's report, sources told The Washington Post that the FBI hack came courtesy of a shadowy group of hackers, who sold the vulnerability to investigators for a one-time fee. That information was then used to build custom hardware capable of extracting data off the target device. Whether the security researchers who made the discovery retain ownership in such a scenario is unknown.

For its part, Apple said it will not sue the FBI for information about its workaround, noting the flaw will soon be obsolete. Apple is continually working on stronger encryption methods with each successive iOS iteration and hardware refresh, while FBI Director James Comey recently went on record as saying his agency's exploit only works on iPhone 5c handsets and older.

Comments

  • Reply 1 of 20
    mac_128mac_128 Posts: 3,454member
    I guess this means Apple just announced EOL for the iPhone 5c.
  • Reply 2 of 20
    Doesn't this fall under the DMCA? The device is encrypted and they're breaking encryption.
  • Reply 3 of 20
    NY1822NY1822 Posts: 621member
    Now we are back to the story of "a foreign company that helped"....can they pick one story and stick to it...
  • Reply 4 of 20
    charlitunacharlituna Posts: 7,217member
    Doesn't this fall under the DMCA? The device is encrypted and they're breaking encryption.
    You think the Feds care about that
  • Reply 5 of 20
    Really, how long do the Feds ever keep a secret before it "leaks". 
  • Reply 6 of 20
    NY1822 said:
    Now we are back to the story of "a foreign company that helped"....can they pick one story and stick to it...

    Well, it's all speculation as to who actually helped the FBI, so the press will keep going with whatever they can latch on to.
    spacekid
  • Reply 7 of 20
    Who says and can prove that the hack was actually successful ?
    Claiming it was would be an excellent way for the FuzzyBI to save face.
  • Reply 8 of 20
    wood1208wood1208 Posts: 2,913member
    This may be good reason to upgrade to IOS 9.3.1 and iphones 5S and newers.
  • Reply 9 of 20
    spacekidspacekid Posts: 183member
    Doesn't this fall under the DMCA? The device is encrypted and they're breaking encryption.
    No, they didn't break encryption. They likely accomplished what they stated, defeating the 10 missed password attempt auto erase function.
  • Reply 10 of 20
    dewmedewme Posts: 5,373member
    This is simply another small example of how the zero-day exploit marketplace operates. These exploits are the currency in a global marketplace that most people don't know exists. It's heavily funded by governments around the world and is powered by armies of shady characters wearing hats with various shades between white and black. Some are in it for money and fame and some are in it for mom, apple pie, and waving the flag. The 5C exploit is but one grain of sand in a growing mountain of exploits being stockpiled by every government cyber army and cyber mercenary on the planet. The further adoption of IoT is only going to make these stockpiles get even larger and larger over the next decade. We will soon look back on the 5C exploit as a pea shooter grade concern compared to what's coming next.
  • Reply 11 of 20
    spacekidspacekid Posts: 183member
    If Apple was serious about making the iPhone more resistant to hacking, they would hire third parties to try and break it and fix those problems.
  • Reply 12 of 20
    rob53rob53 Posts: 3,251member
    spacekid said:
    If Apple was serious about making the iPhone more resistant to hacking, they would hire third parties to try and break it and fix those problems.
    It wouldn't be worth the money. There are enough "security researchers" out there who actually work with Apple and other computer companies, sending them vulnerability information before they announce the vulnerabilities to the public. Some give Apple more time than others. No computer system will ever be unhackable. The trick is to make it as secure as possible and be able to fix issues as quickly as possible. Different companies have different track records on being able to to do this quickly. Apple fixes many quickly while taking longer on others. 

    The only safe computer is one that's empty, turned off, and sent out to deep space--at least for the time being.
  • Reply 13 of 20
    I've not seen any evidence that they were successful at all.
  • Reply 14 of 20
    lkrupplkrupp Posts: 10,557member
    The FBI got the hack from somebody. Apple has tons of money to pay that somebody tens times what the FBI paid. And that somebody has an ego the size of Texas. All hackers do. Somebody will spill the beans sooner rather than later. Do we not think that Apple has moles and informants who move in the dark corners of the Internet looking for iOS and OS X hacks for sale? Both Apple and the FBI have unofficially clammed up. We have no idea what’s going on in the back room. 

    The title of this article is complete nonsense. Apple IS likely to learn the details, just not from the FBI. Sheesh!
    edited April 2016
  • Reply 15 of 20
    lkrupplkrupp Posts: 10,557member

    spacekid said:
    If Apple was serious about making the iPhone more resistant to hacking, they would hire third parties to try and break it and fix those problems.

    Care to tell us which platform has better security than iOS? I mean since you claim Apple is not serious about security...
  • Reply 16 of 20
    flaneurflaneur Posts: 4,526member
    Really, how long do the Feds ever keep a secret before it "leaks". 
    This coming November 22, it will be 53 years and counting . . .
    ai46
  • Reply 17 of 20
    flaneur said:
    Really, how long do the Feds ever keep a secret before it "leaks". 
    This coming November 22, it will be 53 years and counting . . .
    Lack of knowledge isn't considered keeping a secret. Now the CIA might have been keeping a secret for 53 years and counting. 

    Edit*****
    I just reread the original text and realised it saet Feds not FBI


    edited April 2016
  • Reply 18 of 20
    thrangthrang Posts: 1,009member
    If this required physical access to the phone by some serious brains (no other exploits have been reported that I'm aware of), who cares? This is largely a non-issue for just about everyone. I'm more concerned of over-the-air hacks of transmissions, cloud infiltration, or local hacks...none of which have been reported if people take the available precautions. This dead terrorist used a 4 -digit password, correct? Anyone calculate how long it would take for a long alpha-numeric password to be "guessed", say 15-20 characters, like Shiza!64melOnh*eaD?
    edited April 2016
  • Reply 19 of 20
    flaneurflaneur Posts: 4,526member
    flaneur said:
    This coming November 22, it will be 53 years and counting . . .
    Lack of knowledge isn't considered keeping a secret. Now the CIA might have been keeping a secret for 53 years and counting. 

    Edit*****
    I just reread the original text and realised it saet Feds not FBI


    Yep, and it's hard to see that the Bureau was anything but complicit in the cover-up. For the good of the country, of course.
  • Reply 20 of 20
    dewmedewme Posts: 5,373member
    spacekid said:
    If Apple was serious about making the iPhone more resistant to hacking, they would hire third parties to try and break it and fix those problems.
    They already do, as does every vendor that is serious about security does.
    edited April 2016
Sign In or Register to comment.