Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

John McAfee Reveals How The FBI Can Unlock An iPhone In 30 Minutes
IBTimes ^ | March 3, 2016 | BY DAVID GILBERT

Posted on 03/02/2016 11:57:21 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 last
To: Swordmaker

Within Chinese borders on servers owned and operated by the communist government while also submitting their company to “security audits” by Chinese investigators.

Maybe that’s different. Maybe Apple will move all US data to servers at the NSA in the future.


41 posted on 03/03/2016 10:44:46 AM PST by Reaper19
[ Post Reply | Private Reply | To 36 | View Replies]

To: Reaper19
Maybe that’s different. Maybe Apple will move all US data to servers at the NSA in the future.

The NSA cannot get into Apple's devices either. Quit the snarky posts. You have no basis for any such claims. Try posting it about Google and Microsoft who have been cooperating.

42 posted on 03/03/2016 3:54:08 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 41 | View Replies]

To: palmer
If you can get the hash (maybe hard) you can get the passcode (easy).

Uh, no, not according to the mathematicians. The HASH is a one-way hash. You cannot derive the starting seed having from the ending hash. It's not possible.

43 posted on 03/03/2016 4:00:29 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Mannaggia l'America
Although I think this guy is a kook, he has later said that admittedly this is an oversimplification of what he thinks the solution is, basically because he had to dumb it down for "idiots" (i.e. reporters).

My understanding is that the FBI is not asking Apple to decrypt the phone. The FBI is asking Apple to produce a version of iOS that does not lock out or wipe the phone when an invalid passcode is used more than 10 times. Then they want to try to guess the passcode using brute force methods.

This is the coding equivalent to commenting out an "if" statement, to oversimplify it.

McAfee simplified it too far, especially his claiming the user passcode is somehow stored on the iPhone when it clearly is not. If he knew anything at all about it, he'd know that lack of storing the passcode is one of the simplest and first protections used today. It's akin to not putting the key to your house under the welcome mat.

The rest of your comment is essentially correct, but also simplified. They are not "asking", they are ordering Apple to do it. The FBI does not have the authority under any law to compel that.

44 posted on 03/03/2016 4:24:45 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 31 | View Replies]

To: dinodino

All they have to do is use a practice phone. Doesn’t work try another practice phone. I’m they can get plenty of them from the phone companies.


45 posted on 03/03/2016 4:29:09 PM PST by US_MilitaryRules (The last suit you wear has no pockets!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: nightlight7
I have cracked protected software of that kind many times. Namely, no matter what gets compared to what, there is a decision point in the code where the code takes different branch based on the result of comparison. To crack it, one forces the code in the debugger to take the "good" branch.

That still won't work to decrypt the iPhone, nightnight. The passcode is integral to the encryption/decryption process. The passcode is part of the four pieces of the entangled encryption key that will be built to decipher the data on the Flash drive. Without it, the data cannot be unencrypted and the iPhone cannot be unlocked. It is not just a matter of taking a different fork in the road.

46 posted on 03/03/2016 4:30:00 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 23 | View Replies]

To: ifinnegan
“It may be possible to read the device’s memory using electron microscopy techniques and import it into a virtual machine”

Explain this a bit more if you can.

The goal is to decrypt the phone's flash memory. The phone uses a dedicated AES encryption chip to encrypt/decrypt the memory. The 256-bit key is built by tangling together several sources, including the user's passcode, the device's unique ID (set during manufacture and not recorded), and an anti-replay counter. See Apple's iOS Security White Paper.

So, it would seem, if you know the unique ID and the replay counter, and the software algorithms used to combine then, you should be able to set up a brute-forcing environment external to the device, in which you try passcodes until you hit the right one.

Using the Apple hardware, it takes 80 milliseconds to try a key (they deliberately made the algorithm inefficient). 80 ms is fast for a human, but an eternity for brute-forcing. Even so, to try all four-digit passcodes takes only 14 minutes. To try all six-digit passcodes takes 100 times as long, or about a day. However, to try all 16-character alphanumeric codes takes 1.5e21 years. So, success depends on whether Farook was lazy and went for a 6-digit code, really lazy with a 4-digit code, or diligently chose a long pass phrase.

It's worth noting that, if you are able to do the brute forcing without having to use the actual phone, you should be able to achieve a substantial boost, by (1) porting the algorithm to faster hardware and (2) running many copies of the algorithm in parallel. Sounds like a job for Bluffdale.

Of course, this all depends on recovering the phone's burned in keys and replay counter from a system without a debugging interface. There are ways of doing that, but they are difficult and risk destroying the target. Here's a paper on the topic by two engineers at Chipworks, a Canadian reverse-engineering company.

47 posted on 03/03/2016 5:26:20 PM PST by cynwoody
[ Post Reply | Private Reply | To 27 | View Replies]

To: Swordmaker
My statement: If you can get the hash (maybe hard) you can get the passcode (easy).

Uh, no, not according to the mathematicians

Yes, you are correct in general. My statement should read: "if you can somehow get the hash and the salt, and if the passcode is short, then you can brute force it." In this particular case we have reason to believe the passcode is short. So if they could somehow get the hash out of the SoC flash and the salt (I don't know where that is stored but probably in the Soc flash), then the brute force would not take long.

There are a couple problems with my "plan". The biggest one is that you would probably destroy the SoC extracting the hash and salt and therefore make it useless. You would still need a working SoC to run the rest of the algorithm using the UiD. Without completing that, you would have nothing.

48 posted on 03/03/2016 6:02:39 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Swordmaker

Why doesn’t he just go to a store, buy an iPhone 5C, lock it, and crack it on video? He’s spent more time blathering about this than it would take him to prove it beyond doubt. Put up or shut up.


49 posted on 03/04/2016 4:42:49 AM PST by ReignOfError
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson