Data is information is intelligence.
Its all about power.
Gov will win.
Data is information is intelligence.
Its all about power.
Gov will win.
… and then there will likely be some more unknown knowns, again.
https://
https://
jaclaz
MDM9615M (Broadcom) LTE modem (iPhone 5c) debug possibilities… (knowns)
trewmte is right EXAMINATION PROCEDURES IN EMERGENCY CASES
There are based on the assumtion of device backdoored and unknown content 4 possibilities to think about
1. device not breakable - no unknown content
2 device not breakable - unknown content
3. device breakable - no unknown content
4. device breakable - unknown contentIn cases 1 and 2 further damage cannot be prevented one think, but only 2 is right.
In cases 3 and 4 further damage can be prevented only by 4 as 3 is useless.
I learned from two security examiners yesterday of this backdoor (?) or design flaw (?) or something else (?) in the operation of locked iPhone where Siri is involved.
1) Lock iPhone. Ask Siri what time is. Tap clock. Tap +. Type ZZ. Select All, Share. Tap messages. Press Home button. Nobody tell the FBI ) Works on some phones only…
2) It works unless Siri is not accessible via locked screen. )
The above is a discussion between examiners and not found in web-link editorials.
Not 100%, but could be useful to know for EXAMINATION PROCEDURES IN EMERGENCY CASES.
I learned from two security examiners yesterday of this backdoor (?) or design flaw (?) or something else (?) in the operation of locked iPhone where Siri is involved.
1) Lock iPhone. Ask Siri what time is. Tap clock. Tap +. Type ZZ. Select All, Share. Tap messages. Press Home button. Nobody tell the FBI ) Works on some phones only…
2) It works unless Siri is not accessible via locked screen. )
The above is a discussion between examiners and not found in web-link editorials.
Not 100%, but could be useful to know for EXAMINATION PROCEDURES IN EMERGENCY CASES.
It is a vulnerability
http//
It is a vulnerability http//
seclists.org/fulldisclosure/2016/Mar/15
Thanks kacos
securitweek.com released Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9.2.1 see here
transcript here
securitweek.com released Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9.2.1 see here
iOS PassCode Bypass vulns transcript here
vulnerability lab's website item
Excellent, thank Rolf.
A further contribution this time using inkjet printer to access iPhone using target's fingerprint.
http//
Effaceable storage?
https://
One of the FBI’s Major Claims in the iPhone Case is Fraudulent
…
The largest chip on the back (outlined in red above) is the NAND flash, where all the data is stored, including both the encrypted filesystem and the Effaceable Storage.The FBI can simply remove this chip from the circuit board (“desolder” it), connect it to a device capable of reading and writing NAND flash, and copy all of its data. It can then replace the chip, and start testing passcodes. If it turns out that the auto-erase feature is on, and the Effaceable Storage gets erased, they can remove the chip, copy the original information back in, and replace it. If they plan to do this many times, they can attach a “test socket” to the circuit board that makes it easy and fast to do this kind of chip swapping.
If the FBI doesn't have the equipment or expertise to do this, they can hire any one of dozens of data recovery firms that specialize in information extraction from digital devices.
…
jaclaz