Announcement

Collapse
No announcement yet.

FBI asks Apple to hack iPhones from San Bernadino attacks

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • FBI asks Apple to hack iPhones from San Bernadino attacks

    This could open up a whole new can of worms. The FBI needs to figure this out on their own.


    Last night, a California court ordered Apple to assist the FBI in hacking an iPhone. It’s an unprecedented request, one with potentially huge repercussions for the privacy and security of every Apple customer. This morning, Apple CEO Tim Cook posted an impassioned defense of encryption, and signaled the legal battles to come.

    The iPhone at hand belonged to one of the San Bernardino shooters, the couple who took 14 lives in an attack last December. But the open letter to Apple customers posted on Apple’s website early Wednesday morning is significant in that it doesn’t just respond to this court order and incident, specifically, but to the importance of encryption at large.

    “For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe,” writes cook in the lengthy response. “We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.”

    Cook’s referring to Apple’s default encryption, first implemented with iOS 8, which ensures that a third-party has no way to access your files. They’re protected by an encryption key tied to your password. That Apple is just as blind to your photos and texts as the FBI also helps explain the unique nature of the court request. Rather than impel Apple to unlock the phone, the FBI wants Apple to help it develop a way to “bruteforce” the password—guess until it finds a match—without triggering a mechanism that deletes the key that decrypts the data. Currently, 10 wrong password tries will make the iPhone’s data inaccessible forever. The FBI would like to lift that restriction, along with the mandatory delays between password attempts that will slow their progress considerably.

    While this isn’t a “backdoor” in the traditional sense, Cook argues that it amounts to one.

    “The FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation,” says Cook. “In the wrong hands, this software—which does not exist today—would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. ”

    In his missive, Cook vows to fight any attempts to weaken the iPhone’s encryption.

    “In today’s digital world, the ‘key’ to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it,” says Cook. “Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.” Anything that helps the FBI compromise the security of an iPhone, in other words, also helps any bad actors.

    “The government suggests this tool could only be used once, on one phone,” Cook continues. “But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks—from restaurants and banks to stores and homes. No reasonable person would find that acceptable.” Cook further calls out the government for relying on an 18th century law—the All Writs Act of 1789—to justify an expansion of distinctly modern-day powers.

    The company had previously responded to the questionable use of the All Writs Act in a filing in a similar encryption case last October. “The All Writs Act may not apply here because, among other reasons, the bounds of mandatory law enforcement assistance have already been drawn by the Communications Assistance for Law
    Enforcement Act (CALEA),” wrote Apple’s lawyers at the time, “and because Apple does not own or control the device in question.”

    Apple has yet to take any official next steps, but an appeal seems likely. It already has the support of the Electronic Frontier Foundation, an organization focused on digital rights. “We are supporting Apple here because the government is doing more than simply asking for Apple’s assistance,” says EFF’s Kurt Opsahl in a statement. The group plans to file an amicus brief in support of the Cupertino company.

    Given the high profile of both Apple and the case involved, these proceedings seem likely to be many Americans’ first real introduction to the encryption fight that has loomed for some time. Cook has laid out the pro-encryption case in a way that’s accessible, tangible, and immediate. What’s not clear is whether that will be enough for the courts—or its customers—to rally behind.


  • #2
    Yup. I'm siding with Apple on this.
    "Self-government won't work without self-discipline." - Paul Harvey

    Comment


    • #3
      I'm with apple as well
      I wear a Fez. Fez-es are cool

      Comment


      • #4
        Interesting personal side note:

        A few weeks ago, I let my daughter play with my phone and she bit the Touch ID button which is where your fingerprint is scanned to unlock the phone.

        The TouchID is completely separate from the phone, when you add your fingerprint, you're not adding it to the phone, you're adding it to just the TouchID scanner device, that way its not stored on the phone. When each phone is created, it stores a hash key on the TouchID scanner, why?

        If I were to steal your phone but could not unlock it, I could just replace the TouchID device with one that has my finger print stored on it, and unlock the phone. To prevent this, each phone has a unique hash key that ties it to the TouchID that comes with it to prevent man in the middle and replacement attacks.

        I was not able to swap out the TouchID because you have to get the phone reprogrammed to support the new scanner.

        They did this for free, but I thought it was interesting how far they go to protect users.

        Comment


        • #5
          You know some agency(ies) in our government have the capability to do what the FBI wants, its just none of them will share their toys lol.

          Comment


          • #6
            Originally posted by jakesford View Post
            You know some agency(ies) in our government have the capability to do what the FBI wants, its just none of them will share their toys lol.
            It is a lot harder to compromise more recent phones that have had security in them from the ground up, versus older phones that were built with first to market in mind. I doubt there are any with these capabilities just yet.

            Comment


            • #7
              I know local agencies have a fit with iPhones. Glad the FBI is also.

              Comment


              • #8
                Originally posted by abecx View Post
                It is a lot harder to compromise more recent phones that have had security in them from the ground up, versus older phones that were built with first to market in mind. I doubt there are any with these capabilities just yet.
                Good to know, and I'm completely with Apple's position on this.

                Comment


                • #9
                  This story is bullshit. They can get into any phone.

                  Comment


                  • #10
                    Early in WWII, Polish and British cryptanalysts cracked Germany's Enigma cipher. The US cracked Japan's PURPLE code.

                    The hard part wasn't deciphering the encrypted intercepts. The hard part was keeping Germany and Japan convinced that their transmissions were not being used against them.
                    When the government pays, the government controls.

                    Comment


                    • #11
                      Originally posted by ftp View Post
                      This story is bullshit. They can get into any phone.
                      I don't believe they can.

                      Comment


                      • #12
                        Originally posted by ftp View Post
                        This story is bullshit. They can get into any phone.
                        If they could they wouldn't have gone to court over it.
                        I don't like Republicans, but I really FUCKING hate Democrats.


                        Sex with an Asian woman is great, but 30 minutes later you're horny again.

                        Comment


                        • #13
                          Originally posted by 46Tbird View Post
                          Early in WWII, Polish and British cryptanalysts cracked Germany's Enigma cipher. The US cracked Japan's PURPLE code.

                          The hard part wasn't deciphering the encrypted intercepts. The hard part was keeping Germany and Japan convinced that their transmissions were not being used against them.
                          I too watched the Britishname Complicated movie "The Imitation Game".

                          Comment


                          • #14
                            Hopefully it leads them to more rag heads
                            Originally posted by Da Prez
                            Fuck dfwstangs!! If Jose ain't running it, I won't even bother going back to it, just my two cents!!
                            Originally posted by VETTKLR


                            Cliff Notes: I can beat the fuck out of a ZR1

                            Comment


                            • #15
                              i agree with apple's (public) stance on this, however i have to believe at some level the .gov will get what they want. we can create things like stuxnet but can't unh4x0r an iphone?

                              Comment

                              Working...
                              X