Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
I will admit I am not a tecky guy.

But when you say"the data processor does not have access to the Secure Enclave I simply don't believe that. The 'Secure enclave" is a database accessible somehow. Every database is accessible.

74 posted on 09/22/2017 4:04:39 PM PDT by FatherofFive (Islam is EVIL and needs to be eradicated)
[ Post Reply | Private Reply | To 73 | View Replies ]


To: FatherofFive
But when you say"the data processor does not have access to the Secure Enclave I simply don't believe that. The 'Secure enclave" is a database accessible somehow. Every database is accessible.

You say you are not a "techy guy" so when techy people tell you it is NOT CONNECTED to the data processor, you should believe it when they tell you IT IS NOT CONNECTED TO THE DATA PROCESSOR. There literally is no way the processor that disconnected to cellular, WIFI, or the Bluetooth radios and uses Apps can reach the data that is in the Secure Enclave.

This is like you thinking that an unplugged TV can still be turned on, and with no cable or antenna, can still receive programing, even though it is not plugged in to anything and has no power.

That is WHY it is called the Secure Enclave, FoF. There is even a limited, dedicated processor which is the only way that memory in the Secure Enclave can be read or written to. . . and that processor is limited by HARDWARE in what it can send to the rest of the device from what is in that SECURE ENCLAVE, which is essentially a go or no go signal, or the decryption key for the 256 bit AES encrypted data on the storage device. . . and that processor has no access to apps, storage, or radios.

Then, the data is ENCRYPTED by a very secure encryption that exists only on the dedicated Processor. . . and the data is stored in a one way HASH. That means you can extract that results of that one way HASH but you cannot RECONSTRUCT the image it was built from by knowing the hash. You have to also have the key and the algorithms and that still won't help you reconstruct the original data the HASH was made from. That's why its called a "one way" hash. It's all designed so having the contents of the Secure Enclave does no good to someone who somehow DOES get those contents. Do you get it now????

The fact is that your claim that "every data base is accessible" is simply not true. You can say such a thing, but saying it does not make it true.

The FBI, using the expertise of a third-party Israeli security company, was able to break into ONE iPhone, a then three year old obsolete iPhone 5c in the San Bernardino Terrorist case, one with an earlier far less secure version the Secure Enclave called the "Encryption Engine," which lacked the dedicated processor of later iPhones, running a much less robust iOS, and that effort cost over a million dollars and taking almost six months of effort. All that to crack into just one iPhone which did not have even fingerprint protection, just four-digit passcode protection.

79 posted on 09/22/2017 5:35:29 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 74 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson