Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: CutePuppy; rarestia; DesertRhino
No, not exactly and necessarily "stolen," and getting them is not impossible, and because these are aimed at enterprises they are well worth the time to get / fake — and there have been successful MITM with fake or stolen CAs / EVCs in real life (e.g., search "fake certificates mite attack" without quotes) — but it's a separate subject.

Fake certificates will not work. Certificates are registered. A fake one will fail the registration test. This shows you don't know what your are talking about. Those are not the same thing at all. It has to be the Enterprise certificate for the company the device that distributed the software, one that is already on the iPhone, the certificate the ENTERPRISE issued, not some fake cobbled up. Those enterprise certificates are guarded like the crown jewels for obvious reasons. Enterprise updates are PUSHED out, not left to the employees to install at their leisure. This is a proof-of-concept idea, but not worth anything in the real world. . . except in Asia where such shenanigans exist because of these certificates are used with third party App Stores to install their non-Apple App Store apps. You DID notice the dateline didn't you? Asia.

As for "shooting the messenger", I generally post serious warnings on FreeRepublic for the Apple Ping list. This is not a serious problem. As Apple said, it is a feature. The likelihood of someone being able to exploit this is nil.

That's a nice fudge of real issues. As you well know, this request / warrant had nothing to do with encryption / decryption (which Apple kept putting emphasis on, to confuse the uninformed) — FBI didn't ask Apple to decrypt the contents of the disk, only to enable the access to the contents of the [encrypted] device bypassing the data destruction mechanism.

YOU are one of the uninformed. Encryption is protected in many ways, and one of those ways is to prevent access to the keys. The FBI was ordering Apple to unlock the means to the access the keys which WOULD decrypt the iPhone. Learn something before you post your drivel. Apple placed a hardware lockout to prevent that access. Removing it opened the way to getting at the keys to unlock the encryption. Security is always multifold, and removing any of it make it insecure. In fact, CutePuppy, it makes something that was impossible, completely possible. How is that not essential about decrypting the iPhone? That makes you one of the confused.

99 posted on 04/01/2016 3:04:34 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 96 | View Replies ]


To: Swordmaker

Again, read the post, do the search, and think about how the CheckPoint guys did crack Apple's MDM MITM flaw.

That's about all I can say any more on the subject. We obviously have different NDAs.

101 posted on 04/01/2016 3:20:22 PM PDT by CutePuppy (If you don't ask the right questions you may not get the right answers)
[ Post Reply | Private Reply | To 99 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson