Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Florida sheriff pledges to arrest CEO Tim Cook if Apple resists crypto cooperation LINK
Ars Technica | March 12, 2016 | by Cyrus Farivar

Posted on 03/12/2016 8:38:30 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-71 next last
To: some tech guy
or 2) The SoC was stupid enough to write incorrect guess count to flash (it’s not)

My guess is they increment the guess count before doing the hash or anything else. Thus even powering down the system at some opportune moment would not not stop the increment. The limit check can also be done before hashing. Likewise erasing the AES key. Lots of people claim that Apple erases the data. They do not, just the key in the SoC and that is done in a microsecond.

41 posted on 03/13/2016 6:28:07 AM PDT by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 40 | View Replies]

To: palmer

More:

Up until iOS8, I think, it was possible to get the UID with a couple of dirty tricks. Now it’s not possible without hardware hacks. I can still get it with bus dumps or very deep hacks, but it’s still useless unless you can guess the algorithm for hashing, AND you have to hack the physical hardware. That’s beyond my ability at home.


42 posted on 03/13/2016 6:31:36 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 39 | View Replies]

To: palmer

Bus analysis says that happens. I did think about power cycling the SoC before guess count was incremented, but analysis of timing said that your posit is correct. Pass/non-pass is stored before it’ll do any communication with the OS.


43 posted on 03/13/2016 6:34:11 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 41 | View Replies]

To: some tech guy

Fair enough...and I did find your post interesting :)


44 posted on 03/13/2016 6:37:37 AM PDT by fuzzylogic (welfare state = sharing consequences of poor moral choices among everybody)
[ Post Reply | Private Reply | To 35 | View Replies]

To: palmer

I’ll go a little further.

I can’t even *see* how many PBKDF2 runs iOS does with the password and salt (salt being the UID, I think). That is an attack vector, but a very very weak one. And you need the UID, which doesn’t appear on the bus until the SoC has done its malarkey.

Very solid system, IMHO. And that comes from a guy who used to design missiles.


45 posted on 03/13/2016 6:47:26 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 41 | View Replies]

To: some tech guy
So, I’m going to admit I was wrong.

Words you don't see very often these days. Typically, when posters realize they're wrong, they quietly leave the thread and never return.

You're a stand-up dude.

Anyhow, plenty of posters on this subject have chimed in with "I could hack that phone!" Looks like you actually tried. I appreciate your detailed efforts and where it was you hit a brick wall.

46 posted on 03/13/2016 6:55:17 AM PDT by Drew68
[ Post Reply | Private Reply | To 35 | View Replies]

To: Swordmaker

Ok, it boils down to this

An I phone is in reality a very small computer with a telephone ap. As a computer, it can be locked down and subject to a pass word for entry

At the office, in the cubicle or research lab, there are computers that are networked to the corporate or personal crown jewels. They are locked with a password.

If the I phone small computer can not be locked, then the reasoning must be that neither the cubicle nor the research computer can be locked.

There can be no computer security

When Apple protects the small computer with the telephone ap, Apple is protecting all computers with all aps.

It is just that simple


47 posted on 03/13/2016 6:55:58 AM PDT by bert ((K.E.; N.P.; GOPc;+12, 73, ....carson is the kinder gentler trump.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Drew68

Thank you. I’m a guy who will always admit when I mess something up, and I boasted, and tried to back it up.

Yeah, I failed. But *why* I failed was kinda interesting.

If it’s software then I always can hack it. Always. This was hardware, and I tried my best (which is pretty good) but couldn’t. Oh well.


48 posted on 03/13/2016 7:01:58 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 46 | View Replies]

To: bert

Wut?


49 posted on 03/13/2016 7:04:07 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 47 | View Replies]

To: some tech guy; bert
I think bert is saying (and he will correct me if I am wrong) that any authentication-protected content is either secure or it is not. In the small, localized iPhone system there is a separate processor to hold the (single) salt and perform hashing as part of decrypting the AES key. That processor is not accessible to attackers so the authentication cannot be brute forced or bypassed and the content is secured.

In a large system there can be a HSM. Those are typically only used to store keys rather than perform any authentication steps such as salting and hashing. But they can be used for that. And even large systems without HSMs can have strong security for that step, for example storing salts in a separate secure database firewalled from any other system except for the hashing system.

The caveat with the larger systems is they are comprised of general purpose operating systems, with the exception of the HSM. Those OSs can be hijacked or reimaged to provide a back door. Yet they are considered secure and very often are. Attackers are left with social attacks on the human weak link. Thus if those systems can be secured, an iPhone can also be secured.

50 posted on 03/13/2016 8:06:20 AM PDT by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 49 | View Replies]

To: palmer

well, actually your well described authentication-protected paragraph was over my head.

I actually had in mind say the EPA and EXXON. I see no difference between the FBI demanding Apple break the encryption on the I phone and say the EPA confiscating EXXON computers and demanding Dell or Microsoft break the encryption to reveal e mail or proprietary secrets thought to be climate change subversive

I see no difference between the hand held and the desk bound computers


51 posted on 03/13/2016 8:35:07 AM PDT by bert ((K.E.; N.P.; GOPc;+12, 73, ....carson is the kinder gentler trump.)
[ Post Reply | Private Reply | To 50 | View Replies]

To: bert
Yes, no difference. Heres another example:

Very unlikely to have any kind of back door. EPA can demand all they want but unless the owner types the correct passcode they are out of luck,
52 posted on 03/13/2016 8:41:00 AM PDT by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 51 | View Replies]

To: palmer

I never thought I’d meeting someone who “gets it” on FR. Thank you FRiend.


53 posted on 03/13/2016 8:42:26 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 50 | View Replies]

To: bert

There’s a huge difference and it’s very important.

Apple would find it very hard to do this.

I could break Apple’s encryption if I had the key. I tried today, and couldn’t make the phone give up the key.

Other people know the keys. For example, I’m the only person within my company with the key to HIPAA. And that’s fine. That’s how it should be.

Those phones are locked down hard. Very hard.


54 posted on 03/13/2016 8:47:03 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 51 | View Replies]

To: some tech guy; Swordmaker
More fool me.

I must disagree. You made a foolish claim, yes. But, you were man enough to back down when you found out the claim was foolish.

You are not a fool. Thank you for being honest in your results, FRiend.

55 posted on 03/13/2016 8:48:57 AM PDT by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: some tech guy

Lots of people here understand security and policy, many better than me. They might not comment very much however if there are various trolls throwing around red herrings.


56 posted on 03/13/2016 9:08:07 AM PDT by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 53 | View Replies]

To: MortMan

Thank you. The respect people have shown when I admit failing has been eye-opening.

I love you guys and gals.

I tried my best, and believe me, I’m pretty good at this.


57 posted on 03/13/2016 9:09:16 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 55 | View Replies]

To: palmer

Hey palmer, thank you especially.


58 posted on 03/13/2016 9:11:42 AM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 56 | View Replies]

To: some tech guy

Well don’t feel bad!
Apple told the court it would take a team w/up to 6-8 programmers less than a month for them to do what the FBI wants.
Even assuming a very high-ball estimate that’s a whole lot more information and manpower than you can apply!

It’s not just about judicial precedence. Easy, universal encryption is just going to get more common.
There’s a valid need for it- but how can the courts do their job if more and more evidence is beyond their reach?


59 posted on 03/13/2016 9:32:37 AM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 35 | View Replies]

To: some tech guy
Everything which is insecure is not trusted in this system, which is a great way of doing things.

Yup. It was really engineered well. It's one of the main reasons I have an iPhone rather than an android. I have an android tablet I use primarily as a book reader, but it doesn't get any important information copied to it.

60 posted on 03/13/2016 10:47:30 AM PDT by zeugma (Vote Cruz!)
[ Post Reply | Private Reply | To 40 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-71 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson