Loving this thread, perhaps we should give it it's own rather than hijacking the OP's topic of IP-BOX and 6 digit passcodes!
Maybe Jamie could split the posts to a new thread?
In the meantime, JFYI
http//
jaclaz
Thank you guys. I'm a little confused. If a Search Warrant or Court Order is so powerful that all software/hardware manufacturers will cooperate with LE, why forensic guys suffers…
Take IP-Box for example, no disrespect to IP-Box, if a Search Warrant or Court Order works so fine, then we don't need IP-Box anymore. We could ask Apple to unlock Suspect's phone first, and then ask those Apps manufacturers to give us anything we want in the phone. That will be easier. We don't have to worry about encryption or self-deconstruct or something like that.
Anyone could give me a real case scenario that Court Order makes Apple cooperate with LE to working on a case? Please specify who issue the Court Order, and who the LE is. What I'm trying to say is that even if Apple would cooperate with FBI or CIA or Home Land Security Dept., will Apple also support other country' LE???
There is 2 ways to unlock/decode/open whatever you call it, the IOS phones/devices
A- Hard way, buy expensive tools, hire super LE Pro. and waste alot of time and @ the end
you MAY or MAY NOT unlock it or find what you are looking for.
B- Easy way, 20v power cable connected to the suspect, for 20sec. and he will tell you what the PIN CODE is.
very simple equation here.
some how i disagree with someone here which am sure will go n reply here to this post again.
There is 2 ways to unlock/decode/open whatever you call it, the IOS phones/devices
A- Hard way, buy expensive tools, hire super LE Pro. and waste alot of time and @ the end
you MAY or MAY NOT unlock it or find what you are looking for.B- Easy way, 20v power cable connected to the suspect, for 20sec. and he will tell you what the PIN CODE is.
very simple equation here.
some how i disagree with someone here which am sure will go n reply here to this post again.
While the techniques you propose are discussed in such books as Schneier(1996) 'Applied Cryptography' and commonly referred to as the rubber hose technique, there are clearly a number of ethical and legal issues around the use of such techniques. In addition to this, you may have noticed from browsing this forum that it is in fact a technical forum, run and contributed to by intellectual minds from across the world, from law enforcement to private practice and therefor such discussions on the use of torture to illicit passcodes falls well outside of the scope of discussion here.
There is 2 ways to unlock/decode/open whatever you call it, the IOS phones/devices
A- Hard way, buy expensive tools, hire super LE Pro. and waste alot of time and @ the end
you MAY or MAY NOT unlock it or find what you are looking for.B- Easy way, 20v power cable connected to the suspect, for 20sec. and he will tell you what the PIN CODE is.
very simple equation here.
some how i disagree with someone here which am sure will go n reply here to this post again.
While the techniques you propose are discussed in such books as Schneier(1996) 'Applied Cryptography' and commonly referred to as the rubber hose technique, there are clearly a number of ethical and legal issues around the use of such techniques. In addition to this, you may have noticed from browsing this forum that it is in fact a technical forum, run and contributed to by intellectual minds from across the world, from law enforcement to private practice and therefor such discussions on the use of torture to illicit passcodes falls well outside of the scope of discussion here.
I have to AGREE with you here Mark, you are right, and whatever i said is one of the options which in SOME places used.
As a matter of fact, and coming back to the main subject Question here, i have a point of view when it comes to IOS latest updates and so.
I really don`t know why i have a feeling from inside that tells me Apple for example are doing some kind of UNDERGROUND deals with some companies (for example here http//
dealing with Apple Controller Encryption and how it works was my primary study for some long time now, and for sure there might be a way to go through it, some people MAY or MAY NOT discovered it, and for those who DISCOVERED it they prefer to keep it UNDISCOVERED to make some $$$$$ or i dono…
its a long story to tell,
Thnx Mark > have a nice day/weekend
Thank you guys. I'm a little confused. If a Search Warrant or Court Order is so powerful that all software/hardware manufacturers will cooperate with LE, why forensic guys suffers…
Take IP-Box for example, no disrespect to IP-Box, if a Search Warrant or Court Order works so fine, then we don't need IP-Box anymore. We could ask Apple to unlock Suspect's phone first, and then ask those Apps manufacturers to give us anything we want in the phone. That will be easier. We don't have to worry about encryption or self-deconstruct or something like that.
Anyone could give me a real case scenario that Court Order makes Apple cooperate with LE to working on a case? Please specify who issue the Court Order, and who the LE is. What I'm trying to say is that even if Apple would cooperate with FBI or CIA or Home Land Security Dept., will Apple also support other country' LE???
It's a good point. If the manufacturer is in the US, and the crime happened in the UK what good is a court order issued in the UK.
One way a court order could be "recognised" across borders would be via the MLAT (Mutual Legal Assistance Treaty or international LOR (Letter of Request). As long as the crime in the originating country is also a crime in the destination country, this legislation may be effective, however it is also rather time consuming and bureaucratic.