Apple Unlocking iPh...
 
Notifications
Clear all

Apple Unlocking iPhones vs US Government

84 Posts
18 Users
0 Reactions
11.5 K Views
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
 

Data is information is intelligence.

Its all about power.

Gov will win.


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Data is information is intelligence.

Its all about power.

Gov will win.

… and then there will likely be some more unknown knowns, again.
https://en.wikipedia.org/wiki/There_are_known_knowns
https://en.wikipedia.org/wiki/There_are_known_knowns#Reaction

jaclaz


   
ReplyQuote
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
 

MDM9615M (Broadcom) LTE modem (iPhone 5c) debug possibilities… (knowns)


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

trewmte is right EXAMINATION PROCEDURES IN EMERGENCY CASES

There are based on the assumtion of device backdoored and unknown content 4 possibilities to think about

1. device not breakable - no unknown content
2 device not breakable - unknown content
3. device breakable - no unknown content
4. device breakable - unknown content

In cases 1 and 2 further damage cannot be prevented one think, but only 2 is right.
In cases 3 and 4 further damage can be prevented only by 4 as 3 is useless.

I learned from two security examiners yesterday of this backdoor (?) or design flaw (?) or something else (?) in the operation of locked iPhone where Siri is involved.

1) Lock iPhone. Ask Siri what time is. Tap clock. Tap +. Type ZZ. Select All, Share. Tap messages. Press Home button. Nobody tell the FBI ) Works on some phones only…

2) It works unless Siri is not accessible via locked screen. )

The above is a discussion between examiners and not found in web-link editorials.

Not 100%, but could be useful to know for EXAMINATION PROCEDURES IN EMERGENCY CASES.


   
ReplyQuote
kacos
(@kacos)
Trusted Member
Joined: 10 years ago
Posts: 93
 

I learned from two security examiners yesterday of this backdoor (?) or design flaw (?) or something else (?) in the operation of locked iPhone where Siri is involved.

1) Lock iPhone. Ask Siri what time is. Tap clock. Tap +. Type ZZ. Select All, Share. Tap messages. Press Home button. Nobody tell the FBI ) Works on some phones only…

2) It works unless Siri is not accessible via locked screen. )

The above is a discussion between examiners and not found in web-link editorials.

Not 100%, but could be useful to know for EXAMINATION PROCEDURES IN EMERGENCY CASES.

It is a vulnerability
http//seclists.org/fulldisclosure/2016/Mar/15


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

It is a vulnerability http//seclists.org/fulldisclosure/2016/Mar/15

Thanks kacos


   
ReplyQuote
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
 

securitweek.com released Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9.2.1 see here

iOS PassCode Bypass vulns

transcript here

vulnerability lab's website item


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

securitweek.com released Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9.2.1 see here

iOS PassCode Bypass vulns

transcript here

vulnerability lab's website item

Excellent, thank Rolf.


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

A further contribution this time using inkjet printer to access iPhone using target's fingerprint.

http//gizmodo.com/how-to-easily-hack-a-smartphone-with-an-inkjet-printer-1763261331


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Effaceable storage?
https://www.aclu.org/blog/free-future/one-fbis-major-claims-iphone-case-fraudulent

One of the FBI’s Major Claims in the iPhone Case is Fraudulent

The largest chip on the back (outlined in red above) is the NAND flash, where all the data is stored, including both the encrypted filesystem and the Effaceable Storage.

The FBI can simply remove this chip from the circuit board (“desolder” it), connect it to a device capable of reading and writing NAND flash, and copy all of its data. It can then replace the chip, and start testing passcodes. If it turns out that the auto-erase feature is on, and the Effaceable Storage gets erased, they can remove the chip, copy the original information back in, and replace it. If they plan to do this many times, they can attach a “test socket” to the circuit board that makes it easy and fast to do this kind of chip swapping.

If the FBI doesn't have the equipment or expertise to do this, they can hire any one of dozens of data recovery firms that specialize in information extraction from digital devices.

jaclaz


   
ReplyQuote
Page 7 / 9
Share: