Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Drago

No back door? Do you know each of the encryption methods being used on the perps phones?

Have you ever received advertisements related to your recent conversations?


8 posted on 01/14/2020 9:22:00 PM PST by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 5 | View Replies ]


To: Gene Eric
No back door? Do you know each of the encryption methods being used on the perps phones?

I do. There are two phones, both iPhones, both of which have Apple’s built-in the hardware, state-of-the-art, 256bit Advanced Encryption Standard (AES) Encryption applied to all data on the devices. And yes, there is no back door, not the way iOS devices are designed.

Only the user knows the unlocking passcode which starts the rebuilding of the actual 256bit AES encryption key. That passcode is not even stored on the device it unlocks. Instead, when the user enters his passcode, a secretly stored, unknown randomly selected at manufacture algorithm takes that entered passcode and creates a one-way hash, compares the result to a hash that was stored in the device’s Secure Enclave when the user first created his passcode. If they match, the iOS device is unlocked and the Encryption Engine using another randomly selected algorithm then uses the stored hash and four other stored pieces of data (one of which was randomly created when the hash was first created using environmental factors) to re-construct the actual unknowable 256bit AES encryption key, which is never, ever stored on the device, or sent outside the Encryption Engine processor inside the Secure Enclave which itself exists inside the Apple A12 or A13 Bionic SoC IC Processor.

Without that user passcode being accurately entered, and you only get a maximum of ten attempts to get it right, with increasing wait timeouts after the first three, the iPhone is either bricked, or the data is permanently erased, depending on what the user decided should happen when someone tried to break into his device.

15 posted on 01/14/2020 10:25:25 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 8 | View Replies ]

To: Gene Eric

“ Have you ever received advertisements related to your recent conversations?”

Creepy isn’t it?


23 posted on 01/15/2020 12:17:57 AM PST by HollyB
[ Post Reply | Private Reply | To 8 | View Replies ]

To: Gene Eric
No back door? Do you know each of the encryption methods being used on the perps phones?

All iPhones have been data encrypted from the factory...and the newer ones use a "secure enclave" chip (since iPhone 5s). Once you set your sign in code/password even Apple can't get in without it (longer is better...4 digits could be brute forced if ""X" attempts then erase" isn't set-up on the phone). Apple gave the FBI the iCloud data for the Pensacola shooters' iPhone (Apple holds those encryption keys), but the actual phone has no backdoor.

https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf

28 posted on 01/15/2020 2:25:26 AM PST by Drago
[ Post Reply | Private Reply | To 8 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson