Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cellebrite Claims Its New Software Can Crack iPhones and iPads Running up to iOS 12.3
MacTrast ^ | Monday, June 17, 2019 11:25 am | By Chris Hauk

Posted on 06/19/2019 7:36:21 PM PDT by Swordmaker

Israeli forensics company Cellebrite – which has gained a reputation for unlocking mobile devices like the iPhone to obtain personal data without the passcode or biometrics – claims it can now unlock any iOS device running up to iOS 12.3.

The firm boasted of its capability in a tweet posted on Friday, which promoted UFED Premium, the latest version of its Universal Forensic Extraction Device.

(Excerpt) Read more at mactrast.com ...


TOPICS: Business/Economy; Constitution/Conservatism; Government; News/Current Events
KEYWORDS: applepinglist; cellebrite; ioscracking; security
Navigation: use the links below to view more comments.
first 1-2021-27 next last
It took them awhile, but iOS 13 will be out soon and will block it again. This means if you are really concerned about your iPhone/iPad security, use an alphanumeric and symbolic passcode of at least seven characters. This will block even Cellebrite’s system from cracking into your device. Cellebrite still uses a brute force approach to find your passcode, but we are talking about ~869,600,000 years to try all possible combinations of just seven characters of the 223 available from the iPhone’s virtual keyboard at one attempt every second. If I recall correctly, even bypassing the countdown clock, the Secure Enclave limits each attempt to 1.4 seconds so it’s even longer than that. Perhaps you could get by with only six, if you want them to give up during the life span of the Age, only ~3,900,000 years.
1 posted on 06/19/2019 7:36:21 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
Cellebrite claimed they can again break into iPhones and iPads. Now iOS 12.3 vulnerable. . . —PING!


APPLE SECURITY PING!

If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.

2 posted on 06/19/2019 7:39:52 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

So you are claiming Cellebrite can’t try all the same numbers and letters on iOS 12.3.1?


3 posted on 06/19/2019 7:43:13 PM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

It’s a mystery to me that more people don’t use (more than six) alpha/numeric/symbol characters in their passcode. It just takes a couple seconds longer.


4 posted on 06/19/2019 8:03:16 PM PDT by House Atreides (Boycott the NFL 100% — PERMANENTLY)
[ Post Reply | Private Reply | To 1 | View Replies]

To: House Atreides

I don’t even have one on my iPhone 10s. Just swipe and you are in!


5 posted on 06/19/2019 8:07:27 PM PDT by US_MilitaryRules (I'm not tired of Winning yet! Please, continue on!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker; All
Folks, what Swordmaker does not understand is that what Cellebrite is using is not brute force on anything iOS 12.3 and under, but it’s using exploits against vulnerabilities.

In short, even if you have a 20 character password, the exploit gets around that.

Brute force is only used when exploits do not allow cracking the phone.

6 posted on 06/19/2019 8:34:03 PM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

check .... iOS 13 ? When ?


7 posted on 06/19/2019 8:43:15 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I imagine from the first second a new iPhone or updated iOS system is out, someone somewhere is throwing everything they have at it...just so they can tweet out that they’ve broken it.


8 posted on 06/19/2019 8:44:51 PM PDT by moovova
[ Post Reply | Private Reply | To 1 | View Replies]

To: Squantos

Preview release doesn’t install on my iPhone 6.


9 posted on 06/19/2019 8:53:34 PM PDT by steve86 (Prophecies of Maelmhaedhoc O'Morgair (Latin form: Malachy))
[ Post Reply | Private Reply | To 7 | View Replies]

To: ConservativeMind
So you are claiming Cellebrite can’t try all the same numbers and letters on iOS 12.3.1?

I assume that they can. 12.3.1 did not address anything having to do with this. iOS 13 will. Perhaps iOS 12.4 will as well.

10 posted on 06/19/2019 8:54:15 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ConservativeMind
...Brute force is only used when exploits do not allow cracking the phone...

My personal strategy is two fold:

1. Don't put anything incriminating on my phone, and

2. I don't do criminal acts.

While this is actually not a perfect defense against being accused, it is pretty good, and if I then back it up by updating to the latest version of iOS I am reasonably secure.

11 posted on 06/19/2019 9:17:41 PM PDT by CurlyDave
[ Post Reply | Private Reply | To 6 | View Replies]

To: ConservativeMind
Folks, what Swordmaker does not understand is that what Cellebrite is using is not brute force on anything iOS 12.3 and under, but it’s using exploits against vulnerabilities.

ConservativeMind, I fully grasp what Cellebrite is doing. They have a chart of how long it will take to crack each length of various passcodes people use. That means they are only using the vulnerabilities to get past the time-out countdown clock that prevents one from making multiple tries.

Their own manuals time table sets down estimated times for average cracking of four numeric codes, six numeric codes, etc. They STILL have to crack the passcode to find build the key to the encryption. That passcode is buried inside the Secure Enclave as a ONEWAY hash code. To use that, one must find the passcode and unlock the device. It is NOT instantaneous.

From Ars Technica’s recent article on Cellebrite’s technique on breaking into iOS devices”

”Cellebrite cannot magically discover your passcode. They can bypass all the counters and lockouts, but, at the end of the day, they need to brute force your passcode. It can be easy, if you don't have one set or it is only four digits, or it can be difficult, if you set a complex passcode with letters and numbers. As long as your passcode is a sufficient length, then Cellebrite will spend forever trying to brute force it without success."

A vulnerability is not going to uncover a passcode that literally does not exist on the device, nor is it going to find a random number created and stored in the Secure Enclave, something that cannot output its data even to the iOS device’s own processor, when that passcode was first created, nor can it read a secure code buried in that Secure Enclave, again, because it is impossible for that component to be read or to write external from itself except in a very constrained way. . . To check if the oneway hash matches. Only then will the internal encryption engine processor assemble and output the 256 bit AES,128 byte decryption key, which is made of four disparate components using an unknown algorithm. Without that decryption key the data on the device is just so much gobbledegook!

To brute force the 256bit AES encryption key would require 6.52 X 10195 years with the fastest super computer currently available on earth.

Want to try again saying I don’t understand what Cellebrite is using? The fact is I fully understand how Apple’s security works and you don’t. I’ve read all of Apple’s white papers on security in iOS and the articles and manuals on both Cellebrite’s and GreyKey’s methodology and use.

12 posted on 06/19/2019 9:25:49 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Squantos
check .... iOS 13 ? When ?

Beta versions are in testing now, but gold version likely in September. For now, ignore ConservativeMind and use a complex alphanumeric/symbol passcode. Even a five character complex alphanumeric/symbol at one try per second would require ~17,000 years to try all potential passcodes. I think that may be long enough to discourage them. A four character, alphanumeric/symbol from the 223 character set, if you use obscure symbols and characters, would likely take up to 78 years to try every possible combination. Obscure characters just take more key presses or holds to get to.

13 posted on 06/19/2019 9:37:41 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: moovova
I imagine from the first second a new iPhone or updated iOS system is out, someone somewhere is throwing everything they have at it...just so they can tweet out that they’ve broken it.

Only Cellebrite and GreyKey have ever been successful. Both bought their exploits from a white hat hacking competition and so far no one has duplicated it. iOS 12chas been out nine months blocking both and they finally found a way to get around it again, but it will be closed.

14 posted on 06/19/2019 9:41:28 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: CurlyDave
I'm with you. I don't use banking apps. If someone wants to break in and read my emails or texts...I should probably apologize to them and buy them a beer. Heck, I've even jokingly said (while driving) that if the NSA et. al. is listening, I apologize for singing along with the radio...

In short, breaking into my phone wouldn't be worth the effort beyond seeing my slightly eclectic collection of humorous (to me anyway) memes.

However, given that it's Apple... I would expect the encryption to be top notch. I'd also expect there is a back door or two in there they could exploit if necessary. Perhaps one or more of these back doors has been compromised.

15 posted on 06/19/2019 10:20:16 PM PDT by ThunderSleeps ( Be ready!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

Forget about getting in line for Bagster - Will you marry me?


16 posted on 06/19/2019 10:25:44 PM PDT by jacquej ("You cannot have a conservative government with a liberal culture." (Mark Steyn))
[ Post Reply | Private Reply | To 14 | View Replies]

To: jacquej
Forget about getting in line for Bagster - Will you marry me?

LOL! My lovely lady might have some objections. . .

17 posted on 06/19/2019 10:29:46 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Swordmaker

I’m curious how their brute force attack can even run - since iOS flips its lid after only a few incorrect attempts...


18 posted on 06/19/2019 10:55:08 PM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Celebrite requires the user to have physical access to the phone.

Apple provides a way for the user to erase the phone before surrendering it, but it takes some time to execute.

The Find iPhone app allows for the user to remotely erase the phone, providing the phone is on and still connected to a network.

Apple also allows the user to set the phone for automatic erasure after 10 failed passcode attempts, which will defeat any brute force attack.

Compared to the rest of the market, Mac OS and iOS devices are damnably difficult to hack. Market prices for successful exploits reflect this. Apple exploits are orders of magnitude more costly.

HOWEVER, the Achilles heel for ALL devices using cellular communications is the Control Channel in cellular communications systems. To allow for roaming and interoperability among various vendors and systems, it is wide-open, unsecured, simple to access, and readily comprehended.

Those vulnerabilities will not permit access to your device, but they can monitor, capture, and spoof all incoming and outgoing traffic, as well as track your location.

There is nothing Apple, or any other cell phone vendor can do to close those vulnerabilities. They are the responsibility of the cellular providers, who have no real incentive to fix them.


19 posted on 06/20/2019 6:04:17 AM PDT by Natty Bumppo@frontier.net (We are the dangerous ones, who stand between all we love and a more dangerous world.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: House Atreides
It’s a mystery to me that more people don’t use (more than six) alpha/numeric/symbol characters in their passcode. It just takes a couple seconds longer.

Same here. Mine is simple for me to remember, but hard to guess. Since I use the fingerprint to authenticate most of the time, I don't even have to enter it very often. One thing I'd like to see as an option is the ability to change how often you do need to enter it. I'd feel better about having to enter it once a day. Would also like to have a wipe password, which would wipe the phone if it were used.

20 posted on 06/20/2019 6:33:58 AM PDT by zeugma (Power without accountability is fertilizer for tyranny.)
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-27 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson