iOS 12.1 Forensics Imaging
Who did study the iOS 12 Security Guide and want to join this topic?
I wholeheartedly support community efforts to progress iOS unlocking, just remember
1. Apple will read anything you post here and patch away any problems/issues you will find and talk about in public.
2. Apple really did do a very thorough job and invested countless resources into designing (and re-designing) and implementing these data protection measures into phones, advancing with each iOS version and hardware generation. It is very well protected.
3. You're mixing some very different challenges, each of which broken is a groundbreaking achievement on their own
- Passcode bruteforce (bypassing SEP enforcement / breaking crypto / whatever)
- USB restricted mode bypass (running code on a locked device)
- PAC bypass (breaking the crypto?)
If you do decide to progress in the open, I'd suggest focusing on one challenge to begin with, and wish you the best of luck.
I am aware of Apple and also the 3 different questions impact. But first we have to solve a general problem.
How can we OPENLY collaborate without Apple OBSERVING?
See my subject. The wall first has to be analyzed, how to break this dilemma.
Good crypto withstands all breaking and is open as open, everybody can read on iacr.org about the news.
So, lets discuss how to break the dilemma of O and O, openly.
My personal opinion Generally speaking ForensicFocus.com "focuses" on forensic imaging and analysis of electronic evidence rather than cracking encryption.
Having said that, I am aware many members of ForensicFocus have specialized encryption cracking capabilities (PassCodeUnlock for one) not available to the general public.
I rely upon my forensic software companies to develop decryption and security by-pass capabilities and believe that my annual software maintenance payments go to support the development of such.
As a U.S. citizen I am actually happy that Apple has such excellent encryption technology to protect the job security of Apple employees. I personally have no interest in activities that could potentially risk Apple's company health even though I do not work for Apple (I do not own their stock either).
Please do not be offended by my interpretation of your desire to "ruin Apple's Jericho Wall" but one could interpret such desires as a desire to destabilize Apple the company, which I personally vehemently oppose.
Perhaps your efforts might be better served working for a company such as Elcomsoft or Cellebrite, etc.?
My intention is to find a way for digital forensics e.g. law enforcement or gov I work for. Apple built a very powerful 'Wall'. But there is a problem in the future if Apple decides to completely block the Lightning Port. Cellebrite can unlock today, but what if Apple really closes the door? Then all running forensics on iDevices are blocked-out.
To prepare in understanding very deep the iOS Security structure is a preparation for this block-out.
I want to ruin the Wall - not Apple.
Hi everyone, I'd like to echo the sentiments of UnallocatedClusters here from a site admin perspective. At Forensic Focus our remit is digital forensic evidence acquisition and analysis, rather than breaking encryption, so this topic of discussion doesn't fit very comfortably with the site's aims.
understand and apologize deeply