At the end of September, very interesting information emerged from the case involving the San Bernardino terrorist who shot fourteen people with his wife at the end of last year. A computer expert from the University of Cambridge cloned the iPhone's memory chips, which gave him someoneThere are many ways to try to break the protection. Coincidentally, it was this method that the FBI had identified as unrealistic and that was why they were pushing for it. Apple, to give them the official "key" to all iPhones. As you can see, the FBI lied and Apple behaved properly. However, this article is not about the FBI…
You could be interested in
Terrorist Farook and his wife managed to kill 14 people before they were both killed by police. They then secured his iPhone 5C, from which she tried for a long time to extract something that could help in the investigation. This then led to the subsequent dispute with Applem, but I'm sure you all know him well - he filled the front pages of all technology magazines for half a year. As we already know, the FBI is on the phone got it i without help Applu. But it was never revealed how they managed to do it.
The aforementioned Cambridge University professor spent 4 months trying to replicate the entire process and find out if it was really possible to get into the phone somehow. In the video below, you can see how he proceeds to extract the NAND memory chips, through which he then tries to obtain information after figuring out how the entire internal circuitry of the phone works. After finding this information, he managed to clone the entire memory module, thereby obtaining someonethe possibility of trying to hack into it.
The phone's memory chip was mounted on a special board (costing about $100), which allowed for constant "backup and restoration" of data from this chip. The procedure was that Professor Skorobogatov tried to break the access, then the memory module was blocked due to several invalid unlocking attempts. The professor thus created a new clone that no longer remembered the number of attempts to break it, and so he could enter potential combinations again. In the end, it took him about 40 hours to guess the four-digit code. This technique is called NAND Mirroring and the FBI has declared it unusable. As you can see, anything goes if you want it to. This procedure should also be applicable to newer iPhonech, although they should be addressed a little more thoroughly memory protection. What is controversial, however, is that this result was achieved by a "mere" college professor "at home on his knees", while the behemoth FBI, which has an essentially unlimited budget and technology, could not cope with it.
Source: with the BBC
This "mere" university PhD student is a class in his field and is quite famous in the circle of people who deal with IT professionally, unlike the popular Petr Mára... who, by the way, recently released another great video about Apple Watch. :)
That's why the word "mere" is in quotation marks. I didn't mean to diminish its relevance in any way.anceven in the field. If he were not of such capacity, he would hardly have worked at Cambridge. "Mere" was used due to the comparison of an individual against a huge, state-paid, agency :)
?
well, if I have a text password, it probably won't be "any iphone in 40 hours"