tenly
About
- Username
- tenly
- Joined
- Visits
- 19
- Last Active
- Roles
- member
- Points
- 258
- Badges
- 1
- Posts
- 710
Reactions
-
Apple employees threaten to quit if forced to build GovtOS, report says
To brute force the password it has to be done on the iPhone and its hardware takes a minimum of 80 mili-seconds between attempts. That means that it could take thousands of years to break a 8 character alphanumeric password.
You're right. I knew about the 80ms delay between attempts but I accidentally did the math for an 8 digit NUMERIC password instead of ALPHA-numeric. (It worked out to about 3 months.)ppietra said:
To brute force the password it has to be done on the iPhone and its hardware takes a minimum of 80 mili-seconds between attempts. That means that it could take thousands of years to break a 8 character alphanumeric password.tenly said:You missed my point. If you read my whole message, you'd see i said it takes 30 min or less to crack a 4 digit passcode, but thousands of years to crack a well-chosen passphrase. 8 characters does not constitute the "well chosen passphrase i was referring to". There are a number of ways to create a well-chosen passphrase and its not as easy as people think - mostly because it has to be easy enough to be memorized and typed occasionally but should be long (>32 characters), not contain any names, dates or words from the dictionary or even any acronyms based upon famous quotes or popular song lyrics - because those things are already built into some of the better brute force attack tools. The best passphrase would be to join together 3 or 4 good passwords - each of which are a meaningless mix of numbers, letters and special characters - but this is hard to remember and hard to type accurately. The context that I mentioned 8 characters in was to suggest that 8 characters might be the longest passcode/passphrase that the FBI would be "okay" with since they could brute force it in a "reasonable" amount of time.
If you switch to alphanumeric - even without any punctuation, you have 62 possible values for each of the 8 characters instead of 10. Unless my math is still wrong, that would be about 553,000 years to iterate through all possible combinations. 7 characters would take 8,900 years, 6 characters - 144 years, 5 characters - 2.3 years and 4 characters - 13.7 days.
So I guess the only thing that works in my original example would be to say that "the FBI could go after legislation that would force Apple to limit passphrases to 4 characters so that they can be able to unlock them in a reasonable amount of time!l
Thanks for pointing out my mistake. -
Apple employees threaten to quit if forced to build GovtOS, report says
dinoone said:
Not if they have insurance - but from what I see, the Hippocratic oath only applies when the patient has insurance and a drug plan.... Withholding care from someone that will die without it is pretty much the same as administering a lethal poison in the same way that a lie of omission is still a lie.- Can a government compel a pharmaceutical company and its researchers, who took Hippocrates oath to save lives of all, to create or facilitate the creation of a poison necessary to execute a death penalty? -
Apple employees threaten to quit if forced to build GovtOS, report says
CMA102DL said:Peter H said:I have a question: why not let the FBI create the software they want, and then apple signs it software with the key? That way Apple doesn't get involved with making something they don't want to, and their keys never make it to the FBI.
-
Apple employees threaten to quit if forced to build GovtOS, report says
JeffA2 said:OttoReverse said:No Jeff that is not the case at all. The FBI are asking Apple to create a version of iOS that allows infinite attempts at the password. If such a version were created and subsequently stolen/leaked it could be used on any other iPhone. Hence the "skeleton key" that opens all the locks analogy.
The other issue Apple has is where does this end? At first the FBI said this is just for this one phone but them Comey (spelling?) admitted they would want to use such a compromised version many many times. So that would compel Apple to constantly maintain a compromised version of iOS in perpetuity.
What we have here is a procedure for producing a key for any specific phone, not a skeleton key. The difference is fundamental.
Your second point that Apple will be asked to do this over and over is probably correct. However, even the FBI admits that the utility of this approach is short-lived. All Apple has to do render it obsolete is require a PIN during DFU. I would expect them to add this to upcoming iOS update very soon.
I don't think that a PIN during DFU can be done - or that any mechanism can be created that would render it impossible for Apple to replace the boot firmware. The code that boots up the phone, displays your wallpaper, prompts you for your passcode, keeps track of the number of failed attempts and the software that actually wipes your phone all has to be unencrypted in order for it to run. Sure - all of your data is safely encrypted and can't be unlocked until the correct passcode is entered - but all of that pre-login stuff I just listed HAS to run PRIOR to the user logging in and therefore cannot be made secure. It's protected by Apple signing the code - so it can't be replaced by just any old hacker - but I think that Apple will always have the capability to replace or update that code - if they had physical access to the device. What I don't quite understand though is - *IF* Apple created the modified code that disables the auto-wipe - and codes it in such a way that it ONLY will execute on the phone with this exact UUID - and signs it (because they have to sign it for the phone to execute it)..,, Why wouldn't they just be able to invalidate the signature after a couple of days pass rendering that code useless forever after - even on that one phone it was written for?
I think that both sides are lying and exaggerating. The pro-FBI side is claiming that it's only one phone - which we all know is bullshit.... But the pro-Apple side is exaggerating the risk of this code escaping into the wild. It may not be possible to keep it from escaping - but it is possible to make it completely useless to anyone that does manage to steal a copy of it.
I'm definitely pro-Apple in this argument - but not because I'm scared of this one little piece of code. I'm scared about the precedent it sets and all the future little bits of code the FBI demands be written with ever increasing scopes and durations of validity! -
Apple employees threaten to quit if forced to build GovtOS, report says
OttoReverse said:JeffA2 said:Your analogy is also incorrect. Apple is not being asked to create a skeleton key. They are being asked to create a procedure for unlocking phones. The software itself -- the 'key' in your parlance -- only fits a single lock. But the procedure could be used to create other keys for other phones. But -- and here's the big difference -- each of those new keys must be separately authorized by a warrant and a subsequent court order. Then that specific 'key' must signed by Apple before it will open the lock. That means there is judicial review for each individual case. That's exactly the type of protection guaranteed by the US constitution.
Disabling the auto-wipe to allow unlimited attempts isn't the issue at all. It's the precedent that it would set - that the government can force Apple to compromise their own product at the whim of the government that we're fighting against. If the government gets this precedent, there will be a non-stop flow of demands from the government that invade our privacy further and further until one day in the not so distant future people will think of privacy as a myth or a legend and not be able to comprehend that it ever existed.