Despite the ongoing privacy debate in tech, the Cupertino company's approach to privacy and security hasn't changed, especially when it comes to law enforcement.
You could be interested in
Christopher Wray, director of the FBI, claims that the FBI cannot access data that is stored on encrypted devices. However, the server Motherboard stated that the FBI director was giving false information. The report says police stations and federal agencies across the country are buying relatively inexpensive tools that allow them to unlock current iPhones and bypass all encryption.
But some iPhone owners are uneasy that lawmakers are clearly lying to the public, claiming they are still looking for ways to get new iPhones with the latest versions. iOS, and yet he can do it.
"It proves that even state and local police have access to this data in certain situations," said Matthew Green, an assistant professor and cryptographer at the Johns Hopkins Information Security Institute. "This seems to contradict what the FBI is saying about their inability to get into the phones."
It all boils down to a device called GrayKey from Grayshift that we told you about in this article. Of course, we cannot say with 100% certainty whether the police station can do it through him or something similar to him. The report is indeed interesting, but until it is confirmed by the investigators themselves or foreign journalists find out more details about it, we will of course not be sure.
So in another article (I think on idnes.cz) it was said that the device uses a jailbreak to upload a program to the phone that decrypts it. I see 2 problems here:
1) Jailbreak the latest versions iOS As far as I know, not yet.
2) If an alphanumeric phrase is used, the deciphering will take a long time. (provided that problem 1 can be bypassed somehow)
This is a password hash and its cipher combinatorics, so I'd say it doesn't matter what type of phrase it is
Honza Rössler We still have point 1
That smart box is usable in case 4 max. 6 digit numeric code. It is not stated anywhere, but in my opinion it is possible to exploit the error when it isstore enter the code without any limit on attempts. Some time ago I saw a video I think from China where someone tried it. This way you get the code to the phone and then access is easy. This won't be about jailbreak, IMHO. Ad a) it's not for new systems and deciphering the 4-digit code 9999 on that Chinese box took about 3 days. Even if I took into account some random number generator that could speed it up, for a 6-digit code it would still take weeks (more like months) and for an alphanumeric code longer than 8 characters it would take years. And the defense from the Apple it's very simple - just do the same as for the wrong attempts - after 3 block for a minute, after another 3 for 15 minutes... and after the 10th wipe format and bye...
I am under no illusions that there is an operating system that cannot be accessed. It's all about time and money
Like if it depends on JB then I'd say that's pretty bad luck because it's not as simple as it's been said here.
And if we are talking about breaking the encryption with a brute force, then of course it always works somehow, but the question is how long it takes and if we are talking about cases where time plays the biggest role, then this option is completely useless for any kind of investigation.
And we won't lie here. Any data you entrust to a third party, you can never be 100 percent sure that it is safe. Yes, Apple it probably plays this game best, but that's about it. Regardless of the fact that if you have the data in cloudu, which is my case, then it's about something else, because there they have to have Apple access to restore them to your device.