Posted on 04/01/2016 11:21:19 PM PDT by Swordmaker
All signs are pointing to Cellebrite, an Israeli company, as the mysterious "outside party" that helped agents unlock the iPhone used by the San Bernardino terrorist.
An elite group of engineers at Cellebrite -- led by a "brilliant" hacker in Seattle -- helped the FBI crack the iPhone 5C last week, according to two people with direct contact to the team.
Everyone at the company has since been forced to sign non-disclosure agreements to remain silent about the matter, one of them said.
Additionally, government records now show that Cellebrite landed its biggest contract ever with the FBI -- one worth $218,000 -- the very same day the FBI announced it successfully hacked Syed Farook's iPhone.
And last week, Tel Aviv newspaper Yediot Ahronot, citing anonymous sources, said Cellebrite was the outside party.
But on Friday, two law enforcement officials, speaking on condition of anonymity, told CNN the "outside party" was not Cellebrite.
(Excerpt) Read more at money.cnn.com ...
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
Re: nondisclosures
Well, somebody had to have said something, otherwise this info about cellebrite would not have come out.
I have, unfortunately, found anti Israelis on the right among acquaintances in my life. It’s not ENTIRELY the left.
Israel and the US work hand in hand to defeat terrorism and share many of the same values.
Even after Obama CRUSHED the long time belief that Israel has some nefariously strong say in American politics, it is still believed by some.
Obama has cast them aside and I will be glad when Trump or Cruz embraces them again. Please don’t make this an anti trump or cruz thread.
FIGHT BACK
lets make everyone at Cellulite(or whatever)
an internet celebrity
how do we do that?
Wake me up if they break an iPhone 6s.
our FBI has got to be the dumbest organization on the face of the earth. Why would you brag about busting the security on a phone? It only puts a patch fix on the front burner for Apple. The coders at Apple are going to fix it “real good” now. The FBI should have not said a word about the successful hacking. They should have kept that little secret in their deck of tricks to be used until it was closed by Apple.
Tell me, how do you patch making 10,000 image copies of an iPHone, then automating the entry of 4 pin unlock codes through an emulator of each image until you've successfully found the right combination to unlock the phone?
There isn't a security patch in the world that can stop that on ANY O/S platform.
Fingerprint reader, facial recognition can also be cracked (notice usage of the word CRACKED and not "Hacked" here.)
Sometimes it really doesn't take a whole lot of computer/coding/security knowledge to crack one's way into something, just common sense, logic and reason.
The SHOCKING part of this whole story is that such doesn't exist inside the FBI apparently.
I'd bet you that it's already happened, but then I really don't think we'll ever hear about it at this point. Likely someone with some common sense and reason finally got to the FBI and told them to STFU about figuring out how to crack it.
That and they were told to finally stop acting "stupidly" and telegraphing just how dumb they were vis a vis lacking any common sense, logic and reason.
Although he was correct that attaching a cable to the phone and being able to hijack the protocols the phone uses to communicate with the computer also provide a means to "crack" the phone.
Still, I stand by my assertion that the simplest means of cracking the phone was the method I described above. Didn't take a whole lot of technical knowledge to do it either.
Sometimes the simplest explanations for things are the most probable.
There is absolutely no proof they actually hacked the iPhone, other than their claim, but then again they claimed they only wanted to hack one iPhone. Hard to know what to believe from the FBI.
Wonder if cellibrite could find Bozo's real birth certificate or college records?
The reason is that making the image in the first place is not a piece of cake. The location of the data where the one-way hash that is stored in stead of the actual four digit passcode is protected from being read from outside by anything that can run on the iPhone's data processor, from anything run in the iPhone's RAM, and on later models, from anything that can probe from the exterior of the device.
Normal methods used in the past to read such data are destructive, one shot approaches and Apple has made it a requirement that any attempt to decrypt the data on such an iPhone must be done on the iPhone as the processor, protected Secure BootROM, TouchID reader, and Secure Enclave are registered with each other and any modification of any one of those ICs, such as removal, additions, or changes of any kind, forces the iPhone to erase the stored data and re-syncing from a backup, (the TouchID will no longer work as a TouchID fingerprint sensor if replaced with a 3rd party or even Apple part from another iPhone without re-registration) after restoring the registrations of the ICs which only Apple authorized service centers can do.
The newer ICs in question designed by Apple, including the A7, A8, A9 processor and the Secure Enclave sub-processor are multilayer ICs with the EEPROM segments located in a buried area where they cannot be read by any laser surface scanning process, which was what was most likely used on the older Encryption Engine sub-processor used in the A6 processor of the iPhone 5C of the San Bernardino terrorist case to read the one-way hash and algorithm used to create it. In other words, that technique could not work on any later iPhone.
iPhone's running on iOS 9 or later default to a SIX digit passcode instead of a four digit, making the process more difficult. It's 1,000,000 possible combinations. The user can also opt for a complex passcode as well using alphanumeric plus every symbol or accented alphabetic character accessible on the virtual keyboard. That's 223 characters. Using just six of those, there'd be 2236 possible combinations: 122,978,496,247,489 possible passcodes. Add one more character to your passcode and that's 27,424,204,663,190,047 combinations.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.